Method and system for power management of electronic article surveillance systems
First Claim
Patent Images
1. A method for managing power use in a security system, the method comprising:
- establishing a detection region;
triggering a person detection event, the person detection event based on the detection of a person in the detection region;
starting a timer upon the triggering of the person detection event; and
transmitting a tag interrogation signal until the expiration of the timer.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, system and apparatus for managing power use in security systems, which include establishing a detection region, triggering a person detection event, the person detection event based on the detection of a person in the detection region, starting a timer upon triggering the person detection event, and transmitting a tag interrogation signal until the expiration of the timer. The method, system and apparatus can further include determining a relative direction of movement of the person.
15 Citations
20 Claims
-
1. A method for managing power use in a security system, the method comprising:
-
establishing a detection region; triggering a person detection event, the person detection event based on the detection of a person in the detection region; starting a timer upon the triggering of the person detection event; and transmitting a tag interrogation signal until the expiration of the timer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for managing power use in a security system, the system comprising:
-
a transmitter for producing an applied field in a selected region; a sensor for detecting a person passing through the selected region; and a processor, the processor operating to; trigger a person detection event, the person detection event based on the detection of a person in the detection region; start a timer upon triggering the person detection event; and transmit a tag interrogation signal until the expiration of the timer. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computer program product comprising a computer usable medium having a computer readable program for a security system which when executed on a computer causes the computer to perform a method comprising:
-
establishing a detection region; triggering a person detection event, the person detection event based on the detection of a person in the detection region; starting a timer upon detecting the person detection event; and enabling a transmitter until the expiration of the timer. - View Dependent Claims (18, 19, 20)
-
Specification