Abstract: A surveillance system monitors a predetermined environment based on received data. The surveillance system includes a first intelligent appliance configured to capture video and/or still images and configured to be in wireless communication with a second intelligent appliance that operates based on data from the first intelligent appliance. The surveillance system can detect a person located within the predetermined environment and can track the person's movement. The surveillance system is configured to allow remote viewing of data and/or controlling cameras.
Abstract: Disclosed are techniques for configuring an intrusion detection system, by receiving from a user device, a set of identity credentials, sending the set of identity credentials to an identity service to verify a user's identity that is associated with the set of credentials, receiving a result of the verification of the identity; and when verified, configuring the intrusion detection system to operate in a mode pre-selected based on the verified identity.
Type:
Grant
Filed:
March 5, 2018
Date of Patent:
October 22, 2019
Assignee:
SENSORMATIC ELECTRONICS, LLC
Inventors:
Graeme Jarvis, Terezinha Rumble, George C. Grammer, Michael Lamarca
Abstract: A system and method for analyzing queues in frames of video enables operators to preferably draw three regions of interest overlaid upon the video as short, medium, and long queue regions that form a notional queue area within the video. The regions are drawn with knowledge of, or in anticipation of, foreground objects such as individuals and vehicles waiting for service in a queue. Examples include retail point of sale locations or for automated teller machine (ATM) transactions. In conjunction with a video analytics system that analyses the movement of the foreground objects relative to the queue regions, the system determines the number of objects occupying each queue region, length of the queue, and other queue-related statistics. The system can then create reports and send messages that include the queue analysis results for directing operators to change their staffing resources as part of a real-time queue servicing and optimization response.
Abstract: An access control reader device integrates a touch pad in proximity to a radio frequency identification (RFID) antenna. A touch pad circuit board includes the RF antenna having a physical aperture and the capacitive touch pad positioned at least partially within the physical aperture of the RF antenna. This configuration allows the RFID reader to detect RFID tags in proximity to the capacitive touch pad. In order to prevent interference, such as the formation of eddy currents, the sensors of the touch pad are in the form of interrupted loops.
Type:
Grant
Filed:
July 8, 2016
Date of Patent:
October 8, 2019
Assignee:
Sensormatic Electronics, LLC
Inventors:
Murdo Jamie Scott McLeod, Timothy John Harrison
Abstract: Techniques for detecting physical conditions at a physical premises from collection of sensor information from plural sensors execute one or more unsupervised learning models to continually analyze the collected sensor information to produce operational states of sensor information, produce sequences of state transitions, detect during the continual analysis of sensor data that one or more of the sequences of state transitions is a drift sequence, correlate determined drift state sequence to a stored determined condition at the premises, and generate an alert based on the determined condition. Various uses are described for these techniques.
Abstract: Systems and methods for operating a marker. The methods comprise: storing energy collected by an energy harvesting element of the marker; using the stored energy to enable operations of the marker's communications element; receiving, by the marker's communications element, a marker deactivation signal transmitted from an external device; and causing either a resonator to be prevented from receiving transmit bursts emitted from an EAS system, a bias element's magnetic field to be normalized, or a resonator to be physically prevented from vibrating, in response to the marker deactivation signal's reception.
Type:
Application
Filed:
March 11, 2019
Publication date:
September 19, 2019
Applicant:
Sensormatic Electronics, LLC
Inventors:
Hubert A. Patterson, Thomas Solaski, Ronald B. Easter
Abstract: Systems and methods for harvesting mechanical energy in a security tag. The methods involve: applying by a tool a pushing force so as to cause a securement mechanism disposed within the security tag to deform; transferring mechanical energy to a spring sleeve when the securement mechanism deforms due to loading applied by the tool; using an energy harvester (e.g., a piezo element or a magnet/solenoid element) to harness the mechanical energy applied by the tool, where the energy harvester is at least partially coupled to the securement mechanism; and converting the mechanical energy to electrical energy. The energy harvester is disposed between the securement mechanism and an Electronic Article Surveillance (“EAS”) or Radio Frequency IDentification (“RFID”) component of the security tag.
Abstract: A system and method for diagnosing and/or configuring a security device included within a secure network is disclosed. A technician mobile computing device maintains a data connection between the security device and a remote computer diagnostic workstation, where the computer workstation might send configuration commands to the security device and receives diagnostic data from the security device over the data connection. The technician mobile phone maintains the data connection by establishing a wireless data link to the security device and by encoding data onto and/or decoding data from a voice connection to a peer mobile computing device. A WiFi connection between the peer mobile computing device and the computer workstation then completes the data connection between the security device and the computer diagnostic workstation.
Abstract: Systems (100) and methods for determining a location of a tag (310). The methods involve: receiving, at each detector of a plurality of detectors (202-216, 306, 308), a device transmission periodically transmitted from the tag; determining, by the detectors, Received Signal Strength Indictors (“RSSIs”) for the device transmission received thereat; determining, by a computing device (218), a probable location of the tag within the passage, first demarcated area or second demarcated area using the RSSIs and relationships between the RSSIs; determining a first likelihood value indicating the likelihood that the probable location is correct; and determining an estimated location of the tag within the passage, first demarcated area or second demarcated area based on the probable location when the first likelihood value meets a first criteria.
Abstract: A system and method for a portable device analyzing user information broadcast from target user devices is disclosed. The portable device includes a commodity user device (e.g. iPhone, smart phone) and a directional antenna system fastened to the commodity user device for receiving the user information broadcast from the target user devices. An application program executing on the portable device can then be used to disable a user account on an access control system, for example.
Abstract: Systems and methods for dynamically changing displayed content of a first tag. The methods comprising: detecting when an individual is in proximity to the first tag or when an item, to which the first tag is coupled, is being handled by the individual; identifying at least one first accessory for the item or at least one first related product that can be used in conjunction with or as an alternative to the item; obtaining information for the identified at least one first accessory or related product that is to be presented to the individual; and dynamically changing the displayed content of the first tag to include the obtained information while the individual is still in proximity to the first tag or handling the item.
Type:
Grant
Filed:
November 7, 2017
Date of Patent:
September 3, 2019
Assignee:
Sensormatic Electronics, LLC
Inventors:
Melwyn F. Sequeira, Hubert A. Patterson, Mohammad Mohiuddin
Abstract: A surveillance camera and surveillance data management system includes a video management system with a data retention module for determining when surveillance data is deleted. Blocks of the surveillance data are deleted based on the ages of the blocks, which are calculated based on the difference between a recorded start date for each block and the current time and adjusted to subtract durations of periods of system downtime that occurred since the start date. The ages are also calculated using a counter, which is initialized to a predetermined value for each block and incremented or decremented only during uptime. In another embodiment, an override module determines an override status based on input from an interface, which can include a physical switch or a keyboard, mouse and display, and returns the override status. No surveillance data is deleted when the override status is true.
Abstract: A security system having a magnetic displacement sensor system and an analytics system. The magnetic displacement sensor system includes a displacement sensor for detecting a magnetic field strength from a magnet. The analytics system determines a status of the magnetic displacement sensor system based on a comparison of the detected magnetic field strength and a profile for the magnetic displacement sensor system.
Abstract: Systems and methods for operating an Unmanned Mobile Machine (“UMM”). The methods comprise: detecting, by a Loss Prevention System (“LPS”), an unusual activity by at least one individual in a facility; communicating a signal from the loss prevention system to the UMM, in response to the detection of the unusual activity; transitioning an operational state of the UMM from a first state in which at least mitigation operations are disabled to a second state in which the mitigation operations are enabled, in response to the signal's reception at the UMM; and performing the mitigation operations by the UMM to visibly follow an individual associated with the unusual activity.
Type:
Grant
Filed:
May 16, 2017
Date of Patent:
August 20, 2019
Assignee:
Sensormatic Electronics, LLC
Inventors:
Steve E. Trivelpiece, Craig E. Trivelpiece, Hubert A. Patterson
Abstract: A system and method for a distributed earthquake analysis and reporting system are provided. The system includes a facility control system at a facility that obtains earthquake information sent from one or more seismic sensors, and sends the earthquake information over a network directly or indirectly to other facility control systems. The facilities which include the facility control systems can be owned/operated by different business organizations or by the same organization, in examples. The facility control system at each facility responds to received earthquake information from the other facility control systems by configuring building systems such as public address systems to warn building occupants, industrial machine controllers to stop machinery, and elevator controllers to stop elevators at a nearest floor and open its doors, in examples.
Abstract: Systems and methods for operating a marker. The method comprising: receiving, by a Radio Frequency Identification (“RFID”) element of the marker, an RFID deactivation signal transmitted from an external device; and responsive to the RFID deactivation signal, supplying power from the RFID element to a detuner element so that the detuner element switches from a first state to a second state. The marker's resonant frequency is changed to a first value that falls outside of an Electronic Article Surveillance (“EAS”) systems operating frequency range when the detuner element switches from the first state to the second state.
Type:
Grant
Filed:
March 5, 2018
Date of Patent:
August 13, 2019
Assignee:
Sensormatic Electronics, LLC
Inventors:
Adam S. Bergman, Manuel Soto, Ronald B. Easter
Abstract: A system for a frictionless access control automatically identifies users and enables access to restricted areas of a building for example via access points such as locked doors. The system allows access when authorized users are in the vicinity of doors without requiring the users to swipe access keycards (or badges) at keycard terminals located at the doors, as in current systems. The system includes user devices such as key fobs and mobile phones that wirelessly broadcast user information and unique IDs for each of the devices in data packets, which are received by positioning units. The positioning units determine locations of the user devices, and send the packet data and the location data to a verification and tracking system. Preferably, the positioning units include two or more antennas that determine close proximity of users to access points while also allowing the system to continuously monitor the locations of the users.
Abstract: A system and method for installing security cameras on a security network of a security system. The security cameras include an autofocus routine, manually adjustable lenses, and feedback mechanisms. The autofocus routine calculates the degree to which the field of view is out of focus and the feedback mechanism provides feedback to the installer during installation. In response to the feedback from the feedback mechanism, the installer manually adjusts the lens of security camera.
Abstract: A security system comprises a positioning unit that determines locations of user devices relative to a threshold of the access point, a surveillance camera that monitors the threshold, and an access control system that controls the access point based on the locations of the user devices and orientations of individuals carrying the user devices relative to the access point. The surveillance camera is used to prevent tailgating. The cameras image data is also analyzed to determine the orientation of the individuals relative to the access point, such as a door. If the individuals are oriented such that they may be merely walking past the door, then access is not granted.
Abstract: Systems and methods for determining a tag's position in a given area. The methods comprise: performing, by a tag reader, a standard inventory process to obtain a unique identification code for a first tag in a randomly selected timeslot; assigning, by the tag reader, a local short address to the first tag that is shorter than the unique identification code; wirelessly communicating the local short address from the tag reader to the first tag; performing, by the tag reader, an enhanced inventory process to receive a ping command response signal including the local short address from the first tag in an assigned timeslot; and determining a first position of the first tag in the given area based on the phase of the ping command response signal.
Type:
Application
Filed:
January 30, 2019
Publication date:
August 1, 2019
Applicant:
Sensormatic Electronics, LLC
Inventors:
Craig E. Trivelpiece, Steve E. Trivelpiece