Systems and methods for dynamic control of a security system device based on tag information
First Claim
1. A method for controlling a security device, comprising:
- detecting a first behavior of a first tag;
determining if the first behavior of the first tag is the same as or similar to a second behavior of a second tag;
controlling operations of the security device based on results of the determining; and
logging timestamped information indicating that the first and second tags experienced the same or similar behavior.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for controlling at least one security device based on the behavior of at least one tag. The methods comprise: generating sensor data relating to movement by at least one sensor disposed in a first tag; analyzing the sensor data to determine if an item to which the first tag is coupled is being handled in an unusual, abnormal or nervous manner; determining if an enterprise system has lost communicative contact with the first tag coupled to the item that is being handled in an unusual, abnormal or nervous manner; and causing an operational state of the security device to change in response to the loss of the communicative contact between the enterprise system and the first tag.
25 Citations
20 Claims
-
1. A method for controlling a security device, comprising:
-
detecting a first behavior of a first tag; determining if the first behavior of the first tag is the same as or similar to a second behavior of a second tag; controlling operations of the security device based on results of the determining; and logging timestamped information indicating that the first and second tags experienced the same or similar behavior. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
2. A tag, comprising:
-
at least one sensor configured to generate sensor data indicating a first behavior of the tag; and a processor configured to analyze the sensor data to determine if the first behavior of the tag is the same as or similar to a second behavior of another tag, cause operations of a security device to be controlled based on results of the determining, and log timestamped information indicating that the first and second tags experienced the same or similar to a second behavior. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification