DETECTING FRAUDULENTLY DEACTIVATED SECURITY DEVICES FOR ASSET PROTECTION

    公开(公告)号:US20190019385A1

    公开(公告)日:2019-01-17

    申请号:US16021802

    申请日:2018-06-28

    IPC分类号: G08B13/24 G06Q20/20

    摘要: An asset protection system and method may include detecting that a first item includes a first security device coupled to the first item, in response to the first item being scanned by the user, instructing the user to deactivate the first security device and then place the first item into a bagging area, wherein a deactivator located at the point of sale computer terminal to deactivate the first security device, directing a detection source to scan the bagging area after the first item and other items have been placed into the bagging area, and determining based on the scanning by the detection source, that a second security device coupled to the at least one item other than the first item in the bagging area has been deactivated, but the at least one item has not been scanned by the user at the point of sale computer terminal.

    Security tag and method of using same to facilitate authorized removal of inventory items from controlled areas

    公开(公告)号:US09852596B2

    公开(公告)日:2017-12-26

    申请号:US14827386

    申请日:2015-08-17

    申请人: Mark D. Alexis

    发明人: Mark D. Alexis

    IPC分类号: G08B13/14 G08B13/24

    CPC分类号: G08B13/2434 G08B13/246

    摘要: Security tag and method of using same facilitates authorized removal of items from a controlled area where the items have been marked with an item identification code. The method involves providing a transaction software application to facilitate use of a PMCD to obtain the item identification code and participate in a wireless communication session with a transaction server to receive an authorization for release of the item from the controlled area. The application uses the PMCD to access from the security tag certain security tag information available from the security tag. The security tag information is used at the PMCD to determine an unlock code for the security tag. The PMCD is then used to wirelessly communicate the unlock code to the security tag after the authorization for release has been received.

    PRODUCT TAGS, SYSTEMS, AND METHODS FOR CROWDSOURCING AND ELECTRONIC ARTICLE SURVEILLANCE IN RETAIL INVENTORY MANAGEMENT

    公开(公告)号:US20170255898A1

    公开(公告)日:2017-09-07

    申请号:US15059401

    申请日:2016-03-03

    申请人: eBay Inc.

    IPC分类号: G06Q10/08 G08B13/24

    摘要: An inventory management system includes at least one hardware processor and an inventory management engine executing on the at least one hardware processor. The inventory management engine is configured to receive, from a mobile computing device of a consumer, product information associated with an article offered for sale in a retail establishment of a merchant, a product tag is attached to the article and includes a tag ID, the tag ID being a unique identifier assigned to the product tag. The inventory management engine also receives the tag ID from the mobile computing device, generates an online listing for the article in an online marketplace, the online listing including the product information, associates the tag ID with the online listing, determines that the merchant is associated with the article, and places the online listing for sale in the online marketplace on behalf of the merchant.

    Rolling code security scheme for tag detection robustness

    公开(公告)号:US09715804B1

    公开(公告)日:2017-07-25

    申请号:US15145500

    申请日:2016-05-03

    IPC分类号: G08B13/24

    摘要: Systems (100) and methods (900) for detecting the presence of a security tag. The methods involve performing operations by a master pedestal of an EAS system to determine a first Tx/Rx scheme to be used during a first iteration of an EAS tag detection process based on (A) a first total number of time windows randomly selected from a plurality of total number of time windows in which an EAS exciter signal should be transmitted from at least one pedestal, and (B) first time windows randomly selected from a plurality of time windows in which the EAS exciter signal can be sent during the EAS tag detection process. Information specifying the first Tx/Rx scheme is communicated from the master pedestal to at least one slave pedestal. Transmit and receive operations are performed by the master and slave pedestals in accordance with the first Tx/Rx scheme.