Systems and methods are disclosed for receiving, for each of the multiple zones,an entering count of persons that entered the zone during a time period and an exiting count of persons that exited the zone during the time period, and/or computing, for each second level zone of one or more second level zones, a percentage of persons that traveled a direct path from the first level zone to the second level zone based on the exiting count of persons that exited the first level zone and the entering count of persons that entered the second level zone. In other examples, behavioral personas can be assigned to persons within the zone based on the time the person is within the zone.
A dual RFID and AM label or tag, and method for making the same, including a first housing portion comprising a first bio-degradable material and having a side wall defining a cavity, a second housing portion comprising a second bio-degradable material and connected to the first housing portion, an acousto-magnetic resonator sized to moveably fit within the cavity, and an RFID label associated with one of the first housing portion or the second housing portion.
G06K 19/02 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the selection of materials, e.g. to avoid wear during transport through the machine
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
A radio frequency identification (RFID) label includes a textile sheet having affixed thereto a conductive wire pattern and a RF chip. The textile sheet includes a first end portion, a. second end portion, and a middle portion arranged between the first and second end portions. The conductive wire pattern includes a first part affixed to the first end portion, a second part affixed to the second end portion, and third part affixed to the middle portion and coupled to the first and second parts of the conductive wire pattern, The RF chip is attached on the middle portion and positioned on a. first face of the textile sheet and coupled to the third part of the conductive wire pattern. The first and second end portions are folded toward the first face of the textile sheet such that the first and second parts of the conductive wire pattern are covered by the middle portion.
G06K 19/02 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the selection of materials, e.g. to avoid wear during transport through the machine
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
5.
SYSTEM AND METHOD FOR AUTOMATED OPT-IN FOR TRACKING INDIVIDUALS
A device may include one or more memories, individually or in combination, having instructions; and one or more processors, individually or in combination, configured to execute the instructions and cause the system to: detect a person entering an area, generate a notification requesting that the person check-in with an electronic device associated with the area; and display the notification.
Systems and methods are disclosed for alerting suspicious activity in an establishment, including detecting, based on using machine learning to process video received from one or more cameras in the establishment, potential suspicious activity occurring in the establishment, and displaying, on a public view monitor near a location of the potential suspicious activity and based on detecting the potential suspicious activity, an indication of the potential suspicious activity.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
7.
METHODS AND SYSTEMS FOR TRIGGERING ACTIVITY DETECTION IN RETAIL ESTABLISHMENTS
Systems and methods are disclosed for assisting a security system in detecting activities in an establishment including receiving, from a device carried by an employee associated with the establishment, a wireless signal indicating an activity to be detected, obtaining, based on the wireless signal, location information for the activity, and operating, based on the wireless signal, one or more sensors of the security system to detect the activity at a location identified based on the location information.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
8.
METHODS AND SYSTEMS FOR AUTOMATED SUSPECT IDENTIFICATION IN RETAIL ESTABLISHMENTS
Systems and methods are disclosed for identifying a suspect in an activity at an establishment, including obtaining, from a video of the activity, an image identifying the suspect, and identifying the suspect as a criminal in the video of the activity or other videos of activities.
Examples described herein generally relate to a system and. method for dynamically displaying a holographic image based on a tag detection. The system includes a sensing device configured to detect an identifier from a tag associated with an article. The system includes a computer system including one or more memories storing computer-executable instructions and one or more processors coupled, to the one or more memories and, individually or in combination, configured to: store a. status of articles, each article associated with a tag and an identifier; and select an image based on a location of tire sensing device and the status of the article. The system includes a holographic display configured to project the image.
A bar code may be integrated with a product, and a management platform may be configured to: receive a query for the mode information of the RFID chip via the bar code, identify the RFID chip based on the bar code; and transmit an indication of a mode of the RFID chip. The bar code may include a two-dimensional code, a quick response (QR code), a three-dimensional code, and/or any graphical or visual machine-readable code.
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
11.
PRIVACY FOR RADIO-FREQUENCY IDENTIFICATION (RFID) TAG
A bar code (120) may be integrated with a product (116), and a management platform (123) may be configured to: receive a query for the mode information of the RFID chip (118) via the bar code, identify the RFID chip based on the bar code; and transmit an indication of a mode of the RFID chip. The bar code may include a two-dimensional code, a quick response (QR code), a three-dimensional code, and/or any graphical or visual machine-readable code.
G06K 17/00 - Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups , e.g. automatic card files incorporating conveying and reading operations
G06K 19/073 - Special arrangements for circuits, e.g. for protecting identification code in memory
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
G06K 19/08 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
12.
INDEXABLE DISPENSING MACHINE WITH REMOTE ONLY PURCHASING CAPABILITY
Methods, systems, and apparatuses for dispensing remotely purchased merchandise, including offering merchandise for purchase by a customer via a network, assigning a dispensing code associated with purchased merchandise to the customer after the customer purchases the merchandise, checking the validity of a dispensing code for a dispensing machine, dispensing the purchased merchandise via the dispensing machine if the dispensing code is valid, and updating an index to reflect that the purchased merchandise was dispensed.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G07F 7/08 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card
G07F 9/00 - Details other than those peculiar to special kinds or types of apparatus
G07F 9/02 - Devices for alarm or indication, e.g. when emptyAdvertising arrangements in coin-freed apparatus
G07F 17/40 - Coin-freed apparatus for hiring articlesCoin-freed facilities or services for devices for accepting orders, advertisements, or the like
Example implementations include a method, apparatus and computer-readable medium for automated sprinter detection, comprising receiving one or more images from one or more image sensors associated with a security system. The implementations further include identifying a person in the one or more images. Additionally, the implementations further include calculating an acceleration of the person based on tracking of the person in the one or more images. Additionally, the implementations further include identifying the person as a sprinter based on the acceleration. Additionally, the implementations further include causing autonomous execution of one or more sprinter response actions in response to identifying the person as the sprinter.
Example implementations include a method, apparatus and computer-readable medium for person detection by a computer device, including retrieving, from a database of suspicious persons, a profile of a person detected in at least one image, wherein the profile lists crime incidents associated with the person. The implementations include determining, using the profile, a scale of crimes committed by the person based on an amount of time between incidents of a certain type, wherein the certain type is one of theft at a store or theft of a particular product type. The implementations include determining a rank of the person in the database of suspicious persons based on a frequency and the scale of crimes committed by the person compared to other suspicious persons, and transmitting, to a second computer device, the retrieved profile and a notification that indicates that the person is detected when the rank exceeds a threshold rank.
G06V 10/74 - Image or video pattern matchingProximity measures in feature spaces
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06V 40/20 - Movements or behaviour, e.g. gesture recognition
G06V 40/50 - Maintenance of biometric data or enrolment thereof
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 31/00 - Predictive alarm systems characterised by extrapolation or other computation using updated historic data
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
H04N 23/66 - Remote control of cameras or camera parts, e.g. by remote control devices
H04N 23/69 - Control of means for changing angle of the field of view, e.g. optical zoom objectives or electronic zooming
H04N 23/695 - Control of camera direction for changing a field of view, e.g. pan, tilt or based on tracking of objects
16.
SYSTEMS AND METHODS FOR SELF-SERVICE ACCESS TO SECURED MERCHANDISE BY A TRUSTED CUSTOMER
Facilitating trusted customer access to secure locking compartments allowing authorized removal of items from a retail facility where the items are stored in the secure locking compartments. Use of a PMCD to obtain authorization based on recognition as a trusted customer is included. The authorization is then checked at a secure locking compartment and if validated, removal of secured items is permitted by unlocking.
G06F 21/36 - User authentication by graphic or iconic representation
G06Q 30/06 - Buying, selling or leasing transactions
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04W 12/47 - Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
17.
ELECTRONIC ARTICLE SURVEILLANCE SECURITY DEVICE AND KIT
An electronic article surveillance security device includes an antenna assembly configured to fit within a housing member, wherein the antenna assembly comprises a first antenna, a transmitter, and a receiver respectively configured to transmit a first signal to an electronic article surveillance tag device and to receive a second signal from the electronic article surveillance tag device. Additionally, the device includes a bracket member connected to the antenna assembly and configured to secure the antenna assembly, and a securing mechanism connecting the bracket member to a surface.
An electronic article surveillance security device includes an antenna assembly configured to fit within a housing member, wherein the antenna assembly comprises a first antenna, a transmitter, and a receiver respectively configured to transmit a first signal to an electronic article surveillance tag device and to receive a second signal from the electronic article surveillance tag device. Additionally, the device includes a bracket member connected to the antenna assembly and configured to secure the antenna assembly, and a securing mechanism connecting the bracket member to a surface.
Aspects of the present disclosure relate generally to a vision system that detects objects moving in an environment. The vision system detects objects that crossed a boundary of an environment during a first period of time, and determines a count of objects that crossed the boundary in a first direction. The vision system retrieves historical egress and ingress data for a second period of time corresponding to the first period of time. The historical egress and ingress data comprises a detected historic count of crossings in the first direction and a corrected historic count of crossings in the first direction. The vision system calculates an error rate for the second period of time based on a ratio of the detected historic count and the corrected historic count, and determines a corrected count for the first period of time by adjusting the count using the error rate.
Apparatus and methods for self-checkout at a retail establishment includes receiving, by a sensor gate and from a payment processing device, purchase transaction information related to a purchase by a customer. The sensor gate scans customized label attached to each article possessed by the customer located in a surveillance zone of the retail establishment. The sensor gate compares information contained in the customized label with the received purchase transaction information.
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
Example implementations include a method, apparatus and computer-readable medium for person detection in a security system, comprising receiving a video stream captured by a camera installed in an environment. The implementations further include identifying a first person in one or more images of the video stream. Additionally, the implementations further include extracting a plurality of visual attributes of the first person that do not include personal identifiable information from the one or more images, wherein the personal identifiable information is a data point unique to the first person that can identify the first person without any other data points. Additionally, the implementations further include encoding the plurality of visual attributes into a first signature representing the first person. Additionally, the implementations further include generating a security alert in response to the first signature corresponding to a second signature of a second person tagged as a security risk.
G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestriansBody parts, e.g. hands
G06V 10/40 - Extraction of image or video features
G06V 10/74 - Image or video pattern matchingProximity measures in feature spaces
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
22.
SYSTEMS AND METHODS FOR PERSON DETECTION AND CLASSIFICATION
Example implementations include a method, apparatus and computer-readable medium for person detection in a security system, comprising receiving a video stream captured by a camera installed in an environment. The implementations further include identifying a first person in one or more images of the video stream. Additionally, the implementations further include extracting a plurality of visual attributes of the first person that do not include personal identifiable information from the one or more images, wherein the personal identifiable information is a data point unique to the first person that can identify the first person without any other data points. Additionally, the implementations further include encoding the plurality of visual attributes into a first signature representing the first person. Additionally, the implementations further include generating a security alert in response to the first signature corresponding to a second signature of a second person tagged as a security risk.
G06V 10/56 - Extraction of image or video features relating to colour
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestriansBody parts, e.g. hands
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
A secured article may include a tag set comprising a first tag and a second tag, each tag attached to the article. A secured article may include a disablement structure. A secured article may include attached to the article in physical proximity to the first tag. A secured article may include in electromagnetic relationship with the second tag. A secured article may include disabling operation of the second tag absent altering the electromagnetic relationship.
An article security device that is selectively removable from an article, the article security device may include a security tag and an elongate member movably connected with the security tag and having an elongate member first end and a elongate member second end. The elongate member may be configured to contain or to be contained by at least a portion of the article. The security device may further include a selectively removable locking member that is configured to connect to the elongate member second end to enable the security device to be selectively removable from the article, wherein the selectively removable locking member includes a locking mechanism having a locked position relative to the elongate member second end and an unlocked position relative to the elongate member second end.
A secured article may include a tag set comprising a first tag and a second tag, each tag attached to the article. A secured article may include a disablement structure. A secured article may include attached to the article in physical proximity to the first tag. A secured article may include in electromagnetic relationship with the second tag. A secured article may include disabling operation of the second tag absent altering the electromagnetic relationship.
Systems and methods for determining and using electronic tag motion may include a database storing a plurality of last read signal strength values and phase values for each electronic tag, for each antenna, for each polarization, and for each frequency of transmission. Based on the information in the database, the system may make a more accurate determination whether an electronic tag is moving or stationary, as compared to conventional methods used for determining motion of electronic tags.
G01S 13/75 - Systems using reradiation of radio waves, e.g. secondary radar systemsAnalogous systems using transponders powered from received waves, e.g. using passive transponders
Examples described herein generally relate to a system for monitoring tags in a retail environment. The system includes an exit system including one or more radio frequency identification (RFID) readers that read a tag to obtain exit system measurements associated with a tag detection event. The system includes a memory and a processor configured to execute instructions to configuring each of a plurality of exit gates including a plurality of RFID readers with a different operating frequency than the plurality of RFID readers at an adjacent exit gate. The processor is configured to synchronize the plurality of RFID readers at each exit gate to prevent two readers at the exit gate from concurrently talking with overlapping coverage areas and a same polarization. The processor is configured to detect one or more tags within the coverage areas.
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
G06K 7/00 - Methods or arrangements for sensing record carriers
28.
SYSTEMS AND METHODS FOR OBJECT DETECTION IN AN ENVIRONMENT
Disclosed herein are apparatuses and methods for object detection in an environment. An implementation may comprise detecting, using at least one sensor, persons that entered and exited the environment during a first period of time and determining an entry count and an exit count accordingly. The implementation may comprise retrieving, from a database, historical ingress and egress data comprising entry and exit counts of the environment for a second period of time. The implementation may comprise determining an amount of expected exit counts for the first period of time based on the historical ingress and egress data of the second period of time by fitting the historical ingress and egress data to a first probability distribution. The implementation may comprise updating the exit count for the first period of time to the amount of expected exit counts and storing the updated exit count in the database.
Disclosed herein are apparatuses and methods for providing contextual data for a security event in an environment. An implementation may comprise receiving and parsing sensor data from a plurality of sensors located in the environment. The implementation may comprise storing, in a database, the parsed sensor data comprising identifiers of the plurality of objects and the attributes. The implementation may comprise detecting a security event at the environment and determining a type, a time window, and a location of the security event. The implementation may comprise retrieving, from the database, a set of object identifiers with timestamps within the time window and a matching location of the security event. The implementation may comprise filtering, from the set of object identifiers, at least one object identifier that matches the type of the security event, and outputting the at least one object identifier and attributes of the at least one object identifier.
Disclosed herein are apparatuses and methods for tracking occupancy count in an environment based on detected movements and dwell time. An implementation may comprise detecting a person in a plurality of image frames captured by a camera. The implementation may comprise tracking a movement of the person and determining that the person has crossed a boundary within the plurality of image frames. The implementation may comprise identifying a path of the person based on the tracked movement and may comprise calculating a dwell time in response to determining that a difference between the identified path and at least one target path associated with entering or exiting the environment exceeds a threshold difference. The implementation may comprise comparing the dwell time to a target dwell time, and updating and storing the occupancy count of the environment in response to determining that the dwell time is less than the target dwell time.
An AM label and method for making the AM label, where the AM label may include a first housing portion comprising a first bio-degradable material and having a side wall defining a cavity. The AM label may include a second housing portion comprising a second bio-degradable material and connected to the first housing portion. The AM label may include an acousto-magnetic resonator sized to moveably fit within the cavity.
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
32.
BIO-DEGRADABLE ACOUSTO-MAGNETIC LABEL AND METHOD OF MAKING SAME
An AM label and method for making the AM label, where the AM label may include a first housing portion comprising a first bio-degradable material and having a side wall defining a cavity. The AM label may include a second housing portion comprising a second bio-degradable material and connected to the first housing portion. The AM label may include an acousto-magnetic resonator sized to moveably fit within the cavity.
Systems and methods are disclosed for detecting a security event at an establishment, obtaining, based on detecting the security event, vehicle information associated with a vehicle used in conjunction with the security event, storing the vehicle information, detecting, based on the vehicle information, the vehicle arriving at the establishment or another establishment, and generating, based on detecting the vehicle arriving at the establishment or another establishment, a notification that the vehicle has arrived at the establishment or another establishment.
Systems and methods are disclosed for detecting a security event at an establishment, obtaining, based on detecting the security event, vehicle information associated with a vehicle used in conjunction with the security event, storing the vehicle information, detecting, based on the vehicle information, the vehicle arriving at the establishment or another establishment, and generating, based on detecting the vehicle arriving at the establishment or another establishment, a notification that the vehicle has arrived at the establishment or another establishment.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
G08B 29/18 - Prevention or correction of operating errors
Security event characterization and response includes, for each of a plurality of first security data collection events determining that the first event has started. Collecting, in a database, an event data record associated with the first event determined to have started, the event data record comprising gait information of a person associated with the first event. For a given security data collection event later than the plurality of first events, determining that the given event has started. Detecting given event data comprising gait information of a person associated with the given event determined to have started. Determining a similarity meeting a threshold similarity between the query and one or more sets of records of the database. Initiating an action based on the one or more sets of records of the database determined to meet a threshold similarity with the query.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
36.
METHODS AND SYSTEMS FOR TRACKING AN ANTI-THEFT TAG BEYOND THE RETAIL SPACE
Examples described herein generally relate to a system and method for tracking items. The system may detect an unauthorized removal of an item tagged with an active radio tag associated with an item identifier. The system may activate, in response to the unauthorized removal, tracking of the active radio tag, wherein after activation of the tracking, the active radio tag transmits the item identifier. The system may collect, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted. The system may display the location information from the database for one or more items including the item.
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
H04W 4/029 - Location-based management or tracking services
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04W 84/04 - Large scale networksDeep hierarchical networks
Security event characterization and response includes, for each of a plurality of first security data collection events determining that the first event has started. Collecting, in a database, an event data record associated with the first event determined to have started, the event data record comprising gait information of a person associated with the first event. For a given security data collection event later than the plurality of first events, determining that the given event has started. Detecting given event data comprising gait information of a person associated with the given event determined to have started. Determining a similarity meeting a threshold similarity between the query and one or more sets of records of the database. Initiating an action based on the one or more sets of records of the database determined to meet a threshold similarity with the query.
A security tag includes: an elongated inlay portion; an antenna mounted on the elongated inlay portion; and a radio frequency identification (RFID) circuit coupled with the antenna. The security tag may be encapsulated within an elongated textile protective sleeve. At least one of the elongated inlay portion, the antenna or the RFID circuit are adapted to dissolve in water.
Example implementations include methods, apparatuses and computer-readable media for controlling access to a shared resource on a distributed network, comprising transmitting a multicast request packet to a plurality of hosts to request access to the shared resource. The implementations further include setting a first timer for a first predetermined period of time after transmitting the multicast request packet. Additionally, the implementations further include verifying that the shared resource is accessible, in response to determining that, during the first predetermined period of time, no multicast packets related to access to the shared resource have been received. Additionally, the implementations further include performing one or more operations on the shared resource, in response to verifying that the shared resource is accessible.
Examples described herein generally relate to a system and method for tracking tagged items outside of a retail environment. The system detects an unauthorized removal of an item tagged with an active radio tag associated with an item identifier and activate, in response to the unauthorized removal, tracking of the active radio tag. After activation of the tracking, the active radio tag transmits the item identifier and item location. The system collects, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted and displays the location information.
Example implementations include methods, apparatuses and computer-readable media for controlling access to a shared resource on a distributed network, comprising transmitting a multicast request packet to a plurality of hosts to request access to the shared resource. The implementations further include setting a first timer for a first predetermined period of time after transmitting the multicast request packet. Additionally, the implementations further include verifying that the shared resource is accessible, in response to determining that, during the first predetermined period of time, no multicast packets related to access to the shared resource have been received. Additionally, the implementations further include performing one or more operations on the shared resource, in response to verifying that the shared resource is accessible.
The present disclosure relates to a mechanism inside of the tag which detaches the tag when presented to a detacher system containing a rotating magnet array that retracts the tag pin allowing the tag to be removed from the garment.
Example aspects include techniques for reducing false alarms caused by stray tags. These techniques may include determining, by a processor of an EAS system, a chatter score of a RFID identification of an RFID tag that generated a quantity of RFID readings above a predefined threshold at one or more RFID readers, and selecting, by the processor of the EAS system, the RFID identification based at least in part on the chatter score being below a chatter score threshold. In addition, the techniques may include determining, by the processor of the EAS system, that the RFID identification corresponds to a RFID tag in motion, and triggering, by the processor of the EAS system, an alarm based on a determination that the RFID tag identified by the RFID identification is not authorized to leave a controlled area associated with the one or more RFID readers.
Example implementations include a method, apparatus and computer-readable medium for computer vision detection of dwell time, comprising receiving a plurality of indications of persons entering an environment over a period of time. The implementations further include adding, into a first-in-first-out (FIFO) queue, a respective identifier of a respective person entering the environment and an entry time for each of the plurality of indications, removing, from the FIFO queue, the respective identifier and the entry time of the respective person in response to an indication of an exit of the respective person from the environment at an exit time, calculating an estimated dwell time of the respective person based on a difference in the entry time and the exit time, and generating an alert based on calculating an average dwell time of the persons entering the environment over the period of time based on each estimated dwell time.
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
G06Q 30/0202 - Market predictions or forecasting for commercial activities
Example implementations include a method, apparatus and computer-readable medium for tracking queue space events, comprising receiving a plurality of data frames from a camera capturing a view of an environment. The implementations further include identifying in the plurality of data frames at least one queue space of the environment, tracking a position of a first person in the plurality of data frames, and calculating a dwell time of the first person when detecting that the position of the first person is in the at least one queue space. Additionally, the implementations include generating a queue delay indication in response to determining that the dwell time exceeds a threshold dwell time, and generating an alert that an attribute of the at least one queue space needs to be modified in response to determining that more than a threshold amount of queue delay indications have been generated within a period of time.
Example implementations include a method, apparatus and computer-readable medium for generating a visual model of a uniform, comprising detecting a plurality of persons in one or more images. The implementations further include generating a sub- image depicting the respective person from the one or more images for each respective person of the plurality of persons. Additionally, the implementations further include identifying one or more articles of clothing worn by the respective person, executing at least one transformation that adjusts pixels of the sub-image such that the one or more articles of clothing depicted in the sub-image fit in a common template, calculating variance values between a plurality of transformed sub-images comprising the sub- image transformed by the at least one transformation and other sub-images generated for other persons in the plurality of persons and transformed by the at least one transformation, and generating a virtual model based on the variance values.
Example implementations include a method, apparatus and computer-readable medium for computer vision detection of dwell time, comprising receiving a plurality of indications of persons entering an environment over a period of time. The implementations further include adding, into a first-in-first-out (FIFO) queue, a respective identifier of a respective person entering the environment and an entry time for each of the plurality of indications, removing, from the FIFO queue, the respective identifier and the entry time of the respective person in response to an indication of an exit of the respective person from the environment at an exit time, calculating an estimated dwell time of the respective person based on a difference in the entry time and the exit time, and generating an alert based on calculating an average dwell time of the persons entering the environment over the period of time based on each estimated dwell time.
Example implementations include a method, apparatus and computer-readable medium for computer vision detection of a fall event, comprising detecting a person in a first image captured at a first time. The implementations further include identifying a plurality of keypoints on the person in an image, wherein the plurality of keypoints, when connected, indicate a pose of the person. Additionally, the implementations further include detecting, using the plurality of keypoints, that the person has fallen in response to determining that, subsequent to the pose being the standing pose in a previous image, the keypoints of the plurality of keypoints associated with the shoulders of the person are higher than the keypoints of the second plurality of keypoints associated with the eyes and the ears of the person in the second image. Additionally, the implementations further include generating an alert indicating that the person has fallen.
Example implementations include a method, apparatus and computer-readable medium for tracking queue space events, comprising receiving a plurality of data frames from a camera capturing a view of an environment. The implementations further include identifying in the plurality of data frames at least one queue space of the environment, tracking a position of a first person in the plurality of data frames, and calculating a dwell time of the first person when detecting that the position of the first person is in the at least one queue space. Additionally, the implementations include generating a queue delay indication in response to determining that the dwell time exceeds a threshold dwell time, and generating an alert that an attribute of the at least one queue space needs to be modified in response to determining that more than a threshold amount of queue delay indications have been generated within a period of time.
Example implementations include a method, apparatus and computer-readable medium for computer vision detection of a fall event, comprising detecting a person in a first image captured at a first time. The implementations further include identifying a plurality of keypoints on the person in an image, wherein the plurality of keypoints, when connected, indicate a pose of the person. Additionally, the implementations further include detecting, using the plurality of keypoints, that the person has fallen in response to determining that, subsequent to the pose being the standing pose in a previous image, the keypoints of the plurality of keypoints associated with the shoulders of the person are higher than the keypoints of the second plurality of keypoints associated with the eyes and the ears of the person in the second image. Additionally, the implementations further include generating an alert indicating that the person has fallen.
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06T 3/60 - Rotation of whole images or parts thereof
G06T 7/73 - Determining position or orientation of objects or cameras using feature-based methods
G06V 10/75 - Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video featuresCoarse-fine approaches, e.g. multi-scale approachesImage or video pattern matchingProximity measures in feature spaces using context analysisSelection of dictionaries
G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestriansBody parts, e.g. hands
51.
SYSTEMS AND METHODS FOR GENERATING A VISUALIZATION OF WORKSPACE EMPLOYEES
Example implementations include a method, apparatus and computer-readable medium for generating a visual model of a uniform, comprising detecting a plurality of persons in one or more images. The implementations further include generating a sub-image depicting the respective person from the one or more images for each respective person of the plurality of persons. Additionally, the implementations further include identifying one or more articles of clothing worn by the respective person, executing at least one transformation that adjusts pixels of the sub-image such that the one or more articles of clothing depicted in the sub-image fit in a common template, calculating variance values between a plurality of transformed sub-images comprising the sub-image transformed by the at least one transformation and other sub-images generated for other persons in the plurality of persons and transformed by the at least one transformation, and generating a virtual model based on the variance values.
Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for receiving a plurality of reception magnetic signals, determining state information associated with each marker of the plurality of markers based on a corresponding transmission magnetic signal of the plurality of transmission magnetic signals and a corresponding reception magnetic signal of the plurality of reception magnetic signals, and determining tag information based on the state information of the plurality of markers.
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
G01D 5/14 - Mechanical means for transferring the output of a sensing memberMeans for converting the output of a sensing member to another variable where the form or nature of the sensing member does not constrain the means for convertingTransducers not specially adapted for a specific variable using electric or magnetic means influencing the magnitude of a current or voltage
G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
G08B 27/00 - Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
53.
AUTO-CONFIGURING A REGION OF INTEREST (ROI) ASSOCIATED WITH A CAMERA
Disclosed herein are apparatuses and methods for auto-configuring a region of interest (ROI) associated with a camera. In one implementation, A method includes tracking, over a plurality of image frames spanning a first period of time, a plurality of objects moving in an environment, and determining a plurality of respective trajectories of the plurality of objects. The method includes identifying a common trajectory shared by more than one object of the plurality of objects based on comparing each of the plurality of respective trajectories to one another and identifying an ROI that encompasses the common trajectory. The method further includes tracking, over a plurality of new image frames spanning a second period of time, another plurality of objects moving in the environment, and generating an alert that the common trajectory has changed based on new trajectories of the another plurality of objects.
A security tag includes: an elongated inlay portion; an antenna mounted on the elongated inlay portion; and a radio frequency identification (RFID) circuit coupled with the antenna. The security tag may be encapsulated within an elongated textile protective sleeve. At least one of the elongated inlay portion, the antenna or the RFID circuit are adapted to dissolve in water.
G06K 19/073 - Special arrangements for circuits, e.g. for protecting identification code in memory
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
A61F 13/42 - Absorbent pads, e.g. sanitary towels, swabs or tampons for external or internal application to the bodySupporting or fastening means thereforTampon applicators with wetness indicator or alarm
55.
METHOD AND SYSTEM FOR SELF-CHECKOUT IN A RETAIL ENVIRONMENT
The present disclosure relates to systems and methods for contactless checkout in a retail environment including a security pedestal located at an entrance or exit to a retail location. The system further includes a scanning device that is communicably coupled with the security pedestal. The self-checkout system and methods may also include a processing system that is configured to receive a list of items from the security pedestal and customer identification code from the scanning device. The system and method is configured to allow for a customer to scan his purchases at the security pedestal and pay for the purchases through the use of the customer identification code generated, preferably, using the customer's personal computing device.
A method for securing a security tag into an article of clothing includes positioning an end of the security tag into a first opening to an interface space between two layers of the article of clothing. The two layers are fixedly connected by one or more opposing connectors that are spaced apart in a manner to form the interface space sized to receive the security tag. The security tag is fully moved into the interface space. Also described herein is a security tag specially configured for placement into the interface space between two layers of the article of clothing.
An electronic article surveillance (“EAS”) tag for an EAS system, comprising an antenna, a radio frequency identification (“RFID”) chip configured to transmit and/or receive a wireless signal via the antenna; and a magnetically-actuatable switch configured to move between a first position and a second position. The switch is configured to electrically couple the RFID chip to the antenna in the first position. The switch is further configured to electrically decouple the RFID chip from the antenna in the second position.
Example aspects include techniques for reducing false alarms caused by stray tags. These techniques may include determining, by a processor of an EAS system, a chatter score of a RFID identification of a RFID tag that generated one or more RFID readings at one or more RFID readers, and selecting, by the processor of the EAS system, the RFID identification based at least in part on the chatter score being below a chatter score threshold. In addition, the techniques may include determining, by the processor of the EAS system, that the RFID identification corresponds to a RFID tag in motion, and triggering, by the processor of the EAS system, an alarm based on a determination that the RFID tag identified by the RFID identification is not authorized to leave a controlled area associated with the one or more RFID readers.
A flexible security tag includes: an elongated inlay portion; a loop antenna mounted on the elongated inlay portion; an electrically-conductive member longitudinally extending across the elongated inlay portion, spaced apart from and inductively coupled to the loop antenna; and a radio frequency identifier (RFID) circuit mounted to the loop antenna. The flexible security tag is encapsulated within an elongated textile protective sleeve.
A flexible security tag includes: an elongated inlay portion; a loop antenna mounted on the elongated inlay portion; an electrically-conductive member longitudinally extending across the elongated inlay portion, spaced apart from and inductively coupled to the loop antenna; and a radio frequency identifier (RFID) circuit mounted to the loop antenna. The flexible security tag is encapsulated within an elongated textile protective sleeve.
An electronic article surveillance tag with a tag body, a locking member, and unlocking member. The locking member is within the tag body and can receive and releasably engage with a pin portion of a connecting member and lock the connecting member to the tag body. The locking member includes a clutch mechanism movable between a first position in fixed engagement with the pin portion and corresponding to a locked state and a second position corresponding to an unlocked state that allows detachment of the pin portion from the locking member. The clutch mechanism further includes a plunger member formed from a non-ferromagnetic material. The unlocking member is fully encased within the tag body and movement of the unlocking member from a locked position to an unlocked position moves the clutch mechanism between the first position corresponding to the locked state and the second position corresponding to the unlocked state.
A method for configuring a sensor tag may include providing a flexible substrate layer comprising a thin film of thermoplastic polyurethane (TPU); depositing a sensor inlay on the flexible substrate layer; and applying a protective coating over the sensor inlay encapsulating the sensor inlay between the flexible substrate layer and the protective coating.
G06K 19/02 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the selection of materials, e.g. to avoid wear during transport through the machine
H01Q 1/22 - SupportsMounting means by structural association with other equipment or articles
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
An antenna for providing light is disclosed. The antenna may comprise a substrate having at least two domains and a light source which is connected to two domains. The light source may emit light when a direct current flows from one domain to another domain. A radio frequency (RF) current flows through the domains for generation of radio waves. A capacitor is provided between adjacent domains to provide a path for the RF current to bypass the light source. The substrate is enabled to absorb the heat dissipated by the light source. The substrate is coated with a reflective material to reflect impinging light rays.
The present aspects include a magnetic detacher including a housing having a wall that defines a nest configured to receive a security tag; a gate member and an actuator configured to move the gate member between a closed position and an open position, wherein the gate member in the closed position blocks the nest, and in the open position allows access to the nest; a magnet positioned on an opposite side of the housing relative to the nest and adjacent to the nest, the magnet having a field in an area of the nest sufficient to unlock a magnetic lock of the security tag; and a processor in communication with the actuator and with a transaction system, wherein the processor is configured to control the actuator to move the gate member from the closed position to the open position based on receipt of an unlock signal from the transaction system.
The present aspects include a method of detaching a security tag from an article, including receiving, at a detacher device, an unlock signal from a transaction system. The detacher device includes a housing having a nest configured to receive a security tag, a gate assembly including a gate member movable between a closed position that blocks the nest and an open position, and a magnet positioned on an opposite the nest and having a magnetic flux sufficient to unlock a magnetic lock of the security tag. The method further includes moving the gate member from the closed position to the open position based on receipt of the unlock signal, receiving the security tag in the nest, and unlocking the magnetic lock of the security tag to allow the security tag to be detached from the article.
E05B 73/00 - Devices for locking portable objects against unauthorised removalLocking devices not provided for in other groups of this subclass
G08B 13/19 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using infrared-radiation detection systems
68.
DETACHING A SECURITY TAG FROM AN ARTICLE WITH A MAGNETIC DETACHER HAVING A MOVABLE BLOCKER
The present aspects include a method of detaching a security tag from an article, including receiving, at a detacher device, an unlock signal from a transaction system. The detacher device includes a housing having a nest configured to receive a security tag, a gate assembly including a gate member movable between a closed position that blocks the nest and an open position, and a magnet positioned on an opposite the nest and having a magnetic flux sufficient to unlock a magnetic lock of the security tag. The method further includes moving the gate member from the closed position to the open position based on receipt of the unlock signal, receiving the security tag in the nest, and unlocking the magnetic lock of the security tag to allow the security tag to be detached from the article.
Example implementations include a system and method for providing a graphical user interface (GUI) on a display, wherein the GUI is operable for displaying a representation of a detection field of an object counting radar unit, wherein the GUI is operable for displaying a reference point that represents a rotatable object as detected by the object counting radar unit when the rotatable object is located in a field-of-view of the object counting radar unit and is rotated by a drive motor assembly.
Example implementations include a system and method for providing a graphical user interface (GUI) on a display, wherein the GUI is operable for displaying a representation of a detection field of an object counting radar unit, wherein the GUI is operable for displaying a reference point that represents a rotatable object as detected by the object counting radar unit when the rotatable object is located in a field-of-view of the object counting radar unit and is rotated by a drive motor assembly.
G08B 13/16 - Actuation by interference with mechanical vibrations in air or other fluid
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
71.
Variable RFID transmit power adjustment based on surrounding environment to enhance tag detection field
A method for operating a sensor includes receiving identification information from one or more electronic identification devices (EIDs) located in a vicinity of the sensor. A number of EIDs located in the vicinity of the sensor is determined based on the received identification information. A determination is made if the number of EIDs located in the vicinity of the sensor exceeds a first predefined threshold. Transmission power to the sensor is selectively adjusted based on the number of EIDs with respect to the first predefined threshold, in response to determining that the number of EIDs located in the vicinity of the sensor exceeds or is less than any number of predefined thresholds.
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
A method for operating a sensor includes receiving identification information from one or more electronic identification devices (EIDs) located in a vicinity of the sensor. A number of EIDs located in the vicinity of the sensor is determined based on the received identification information. A determination is made if the number of EIDs located in the vicinity of the sensor exceeds a first predefined threshold. Transmission power to the sensor is selectively adjusted based on the number of EIDs with respect to the first predefined threshold, in response to determining that the number of EIDs located in the vicinity of the sensor exceeds or is less than any number of predefined thresholds.
Systems and methods for coupling a tag to an item. The methods comprise: dispensing the tag from a tag feeder of a tag applicator; performing first operations by the tag applicator to mechanically move the tag into a nest of the tag applicator; determining if a given criteria is met based on feedback information received from at least one of a user of the tag applicator and a sensor provided with the tag applicator; and performing second operations by the tag applicator to couple the tag to the item, when a determination is made that the given criteria is met.
G06Q 10/087 - Inventory or stock management, e.g. order filling, procurement or balancing against orders
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
E05B 73/00 - Devices for locking portable objects against unauthorised removalLocking devices not provided for in other groups of this subclass
F16B 21/00 - Means without screw-thread for preventing relative axial movement of a pin, spigot, shaft, or the like and a member surrounding itStud-and-socket releasable fastenings without screw-thread
74.
SYSTEM AND METHOD FOR FOIL DETECTION USING MILLIMETER WAVE FOR RETAIL APPLICATIONS
In an aspect, the present disclosure includes a system for detecting metal foil using millimeter wave (mmWave) for retail applications. The system comprises one or more pedestals positioned to define an exit portal leading to a point of exit, one or more security tag readers, fixedly positioned with the one or more pedestals, configured to read data from a security tag passing through the exit portal and one or more mmWave receivers, fixedly positioned near the point of exit, configured to receive one or more reflected mmWave beams from metal foil, wherein the detection of metal foil results in an alert message.
Systems and methods for operating a marker that involve receiving, by a Radio Frequency Identification (“RFID”) element of the marker, an RFID deactivation signal; and responsive to the RFID deactivation signal, supplying power to a detuner element of the marker so that the detuner element switches from a first state to a second state. The marker's resonant frequency is changed to a first value that falls outside of an Electronic Article Surveillance (“EAS”) systems operating frequency range when the detuner element switches from the first state to the second state.
An EAS system first transmits a radio frequency identification (RFID) interrogation signal into an RFID interrogation zone of an EAS system. The system then first receives at least one RFID response signal from a first RFID tag of the system responding to the interrogation signal. The system second transmits a non-RFID RF signal into a second zone. The second zone and the RFID interrogation zone overlap to form a zone of interest. The system second receives, from the first RFID tag, an indication that the first RFID tag received the second transmission. The system determines, based on receiving both the RFID response signal from a first RFID tag and the indication that the first RFID tag received the second transmission, that the first RFID tag is in the zone of interest.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
Example implementations include a method, apparatus and computer-readable medium of computer vision configured for person classification, comprising receiving, during a first period of time, a plurality of image frames of an environment, identifying images of persons from each frame of the plurality of image frames, and determining a respective vector representation of each of the images. The implementations include generating a probability distribution indicative of a likelihood of a particular vector representation appearing in the plurality of image frames and identifying an associate vector representation by sampling the probability distribution using a probability model. The implementations include determining an input vector representation of an input image identified in an image frame depicting a person and received during a second period of time. The implementations include comparing the input vector representation with the associate vector representation and classifying, based on the comparison, the person in the input image as an associate.
Example implementations include a method, apparatus and computer-readable medium of computer vision configured for person classification, comprising receiving, during a first period of time, a plurality of image frames of an environment, identifying images of persons from each frame of the plurality of image frames, and determining a respective vector representation of each of the images. The implementations include generating a probability distribution indicative of a likelihood of a particular vector representation appearing in the plurality of image frames and identifying an associate vector representation by sampling the probability distribution using a probability model. The implementations include determining an input vector representation of an input image identified in an image frame depicting a person and received during a second period of time. The implementations include comparing the input vector representation with the associate vector representation and classifying, based on the comparison, the person in the input image as an associate.
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestriansBody parts, e.g. hands
G06V 40/20 - Movements or behaviour, e.g. gesture recognition
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Techniques for distinguishing objects (e.g., an individual or an individual pushing a shopping cart) are disclosed. An object is detected in images of a scene. A height map is generated from the images, and the object is represented as height values in the height map. Based on height properties associated with another object, it is determined whether the other object is associated with the object. If so determined, the objects are classified separately.
An RFID portal of an EAS system first interrogates a first zone extending into a controlled area beyond a threshold distance from an interrogating antenna of the portal. The portal defines an exit from the controlled area, the threshold distance being less than a width of the exit. The portal first detects, in response to the first interrogating, a first response of a particular RFID tag. The portal second interrogate, subsequent to the first detecting, in a second zone extending into the controlled area at least to the threshold distance. The portal second detects, in response to the second interrogating, at least one second response of the particular RFID tag indicating a received signal strength of the second interrogating at the particular RFID tag corresponding to a distance from an interrogating antenna of the portal less than the threshold distance. The EAS system alarms in response to the second detecting.
Aspects of the present disclosure relate to methods and systems for laser turning and attaching RFID tags to products. Such methods and systems may include a memory and a processor coupled to the memory. The methods and systems may include determining a characteristic of a conductive trace on a substrate to be incorporated into an item to configure a tag performance in view of at least one of a dielectric property or a tuning property of the item. The methods and systems may further include a laser to alter the conductive trace on the substrate to have the characteristic to define an antenna for the tag. The methods and systems may further include an attaching device configured to attach a communications enabled device to the substrate so as to form an electrical connection between the communications enabled device and the antenna to form the tag.
G06K 19/07 - Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards with integrated circuit chips
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
The present disclosure relates to a system for determining anomalous behavior. The system comprises a processing device that is configured to generate first segmentation information and second segmentation information from the video feed, the first segmentation information corresponding to a first potential occupant and the second segmentation information corresponding to a second potential occupant. The processing device further configured to determine that the first segmentation information and the second segmentation information correspond to actual occupants based on the first segmentation information and the second segmentation information, and generate a first bounding box associated with the first segmentation information and a second bounding box associated with the second segmentation information. The processing device further configured to determine an intersection over union (IOU) region for the first bounding box and the second bounding box, identify anomalous behavior based on the IOU region, and generate one or more alerts identifying the anomalous behavior.
G06V 10/764 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
G06V 20/40 - ScenesScene-specific elements in video content
G06V 40/20 - Movements or behaviour, e.g. gesture recognition
87.
Magnetically-locking retractable tag with anti-defeat impact protection
Systems and methods for operating a security tag. The methods comprise: causing a plunger of the security tag to engage a latch of the security tag; preventing, by an anti-defeat structure of the security tag, a disengagement between the plunger and the latch when an impact force is applied to the security tag; and allowing, by the anti-defeat structure, the plunger to disengage the latch when a magnetic field is applied to the security tag.
Aspects of the present disclosure relate generally to a vision system that detects persons exiting an environment, comprising detecting, by a processor using a plurality of image frames from at least one sensor, persons that exited the environment during a first period of time. The vision system further determines, by the processor, an exit count for the first period of time and retrieves, from a database, historical egress data comprising a detected historic exit count and a corrected historic exit count of the environment for a second period of time corresponding to the first period of time. The vision system calculates an error rate for the second period of time based on a ratio of the detected historic exit count and the corrected historic exit count, determines and stores a corrected exit count for the first period of time by adjusting the exit count using the error rate.
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 10/98 - Detection or correction of errors, e.g. by rescanning the pattern or by human interventionEvaluation of the quality of the acquired patterns
G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestriansBody parts, e.g. hands
89.
Systems and methods for object detection in an environment
Aspects of the present disclosure relate generally to a vision system that detects persons exiting an environment, comprising detecting, by a processor using a plurality of image frames from at least one sensor, persons that exited the environment during a first period of time. The vision system further determines, by the processor, an exit count for the first period of time and retrieves, from a database, historical egress data comprising a detected historic exit count and a corrected historic exit count of the environment for a second period of time corresponding to the first period of time. The vision system calculates an error rate for the second period of time based on a ratio of the detected historic exit count and the corrected historic exit count, determines and stores a corrected exit count for the first period of time by adjusting the exit count using the error rate.
A method for securing a security tag into an article of clothing includes positioning an end of the security tag into a first opening to an interface space between two layers of the article of clothing. The two layers are fixedly connected by one or more opposing connectors that are spaced apart in a manner to form the interface space sized to receive the security tag. The security tag is fully moved into the interface space. Also described herein is a security tag specially configured for placement into the interface space between two layers of the article of clothing.
An electrical switch with a conductive bridge, a first wire configured to provide continuity with the conductive bridge, and a biasing member connected to the first wire. The biasing member provides a threshold reaction force to maintain continuity between the first wire and the conductive bridge. The switch further includes a housing that directs tensile forces acting upon the first wire to oppose a reaction force of the biasing member. When a tensile force acting on the first wire exceeds a threshold reaction force of the biasing member continuity between the first wire and the conductive bridge is broken.
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
G08B 7/06 - Signalling systems according to more than one of groups Personal calling systems according to more than one of groups using electric transmission
G08B 13/14 - Mechanical actuation by lifting or attempted removal of hand-portable articles
Example implementations include a method, apparatus and computer-readable medium for person detection by a computer device, comprising receiving a plurality of video frames from a camera located in an environment, wherein the video frames include a depiction of a person in the environment. The implementations further include identifying attributes of the person from the video frames and comparing the attributes with attribute entries in a database of suspicious persons, wherein the database of suspicious persons includes attributes of a plurality of persons associated with an alert in the environment. The implementations include retrieving a profile indicative of an alert history of the suspicious person in response to determining a match between the attributes of the person and an entry in the database corresponding to a suspicious person, and transmitting, to a second computer device, the retrieved profile and a notification that indicates that the suspicious person is in the environment.
A method for securing a security tag into an article of clothing includes positioning an end of the security tag into a first opening to an interface space between two layers of the article of clothing. The two layers are fixedly connected by one or more opposing connectors that are spaced apart in a manner to form the interface space sized to receive the security tag. The security tag is fully moved into the interface space. Also described herein is a security tag specially configured for placement into the interface space between two layers of the article of clothing.
Example implementations include a method, apparatus and computer-readable medium for person detection by a computer device, comprising receiving a plurality of video frames from a camera located in an environment, wherein the video frames include a depiction of a person in the environment. The implementations further include identifying attributes of the person from the video frames and comparing the attributes with attribute entries in a database of suspicious persons, wherein the database of suspicious persons includes attributes of a plurality of persons associated with an alert in the environment. The implementations include retrieving a profile indicative of an alert history of the suspicious person in response to determining a match between the attributes of the person and an entry in the database corresponding to a suspicious person, and transmitting, to a second computer device, the retrieved profile and a notification that indicates that the suspicious person is in the environment.
G06V 10/74 - Image or video pattern matchingProximity measures in feature spaces
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06V 40/20 - Movements or behaviour, e.g. gesture recognition
G06V 40/50 - Maintenance of biometric data or enrolment thereof
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 31/00 - Predictive alarm systems characterised by extrapolation or other computation using updated historic data
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
H04N 23/66 - Remote control of cameras or camera parts, e.g. by remote control devices
H04N 23/69 - Control of means for changing angle of the field of view, e.g. optical zoom objectives or electronic zooming
H04N 23/695 - Control of camera direction for changing a field of view, e.g. pan, tilt or based on tracking of objects
The present disclosure relates generally to security tags, and more specifically relates to electronic article surveillance (EAS) tags. The tag prevents unauthorized removal of an article as well as triggers an alarm when the tag is attempted for tampering. The tag comprises a housing, a switch, and a processing circuit. The switch includes a first contact coupled with the housing and a second contact coupled with an article. The second contact is movable relative to the first contact. The processing circuit is provided to detect electrical disconnection between the first contact and the second contact, and trigger an alarm upon detecting the electrical disconnection.
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
G08B 7/06 - Signalling systems according to more than one of groups Personal calling systems according to more than one of groups using electric transmission
The present disclosure relates generally to security tags, and more specifically relates to electronic article surveillance (EAS) tags. The tag prevents unauthorized removal of an article as well as triggers an alarm when the tag is attempted, for tampering. The tag comprises a housing, a switch, and a processing circuit. The switch includes a first contact coupled with the housing and a second, contact coupled, with an article. The second contact is movable relative to the first contact. The processing circuit is provided to detect electrical disconnection between the first contact and the second contact, and. trigger an alarm upon detecting the electrical disconnection.
Aspects of the present disclosure include methods, systems, and non-transitory computer readable media for receiving an initial image of the area, receiving an updated image of the area, detecting at least one of a person in the area or a movement in the area based on the updated image, comparing the updated image and the initial image to identify a change in the area, and determining a presence or an absence of the occlusion based on the change in the area and the at least one of the person or the movement in the area.