Electronic article surveillance system neural network minimizing false alarms and failures to deactivate
First Claim
Patent Images
1. A method for managing false alarms in a security system, the method comprising:
- establishing a detection zone;
triggering an alarm event, the alarm event based on the detection of a tag in the detection zone using an initial alarm trigger sensitivity, the initial alarm trigger sensitivity being based on an initial set of one or more detection criteria; and
modifying the set of detection criteria, including adjusting an energy level ratio threshold at preselected tag detection frequencies, to adjust the alarm trigger sensitivity of the security system.
6 Assignments
0 Petitions
Accused Products
Abstract
A method, system and computer program product for managing false alarms in a security system. A detection zone is established. An alarm event is triggered based on the detection of a tag in the detection zone using an initial alarm trigger sensitivity. The initial alarm trigger sensitivity is based on an initial set of one or more detection criteria. The set of detection criteria is modified to adjust the alarm trigger sensitivity of the security system.
28 Citations
20 Claims
-
1. A method for managing false alarms in a security system, the method comprising:
-
establishing a detection zone; triggering an alarm event, the alarm event based on the detection of a tag in the detection zone using an initial alarm trigger sensitivity, the initial alarm trigger sensitivity being based on an initial set of one or more detection criteria; and modifying the set of detection criteria, including adjusting an energy level ratio threshold at preselected tag detection frequencies, to adjust the alarm trigger sensitivity of the security system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for managing false alarms in a security system, the system comprising:
-
a transmitter producing an applied interrogation field in a detection zone; a processor, the processor operating to; trigger an alarm event in response to the detection of a tag in the detection zone using an initial alarm trigger sensitivity, the initial alarm trigger sensitivity being based on an initial set of one or more detection criteria; and modify the set of detection criteria, including adjusting an energy level ratio threshold at preselected tag detection frequencies, to adjust the alarm trigger sensitivity of the security system. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A processor having computer program instructions for operating a security system, the processor causing a computer to perform a method comprising:
-
establishing a detection zone; triggering an alarm event, the alarm event based on the detection of a tag in the detection zone using an initial alarm trigger sensitivity, the initial alarm trigger sensitivity being based on an initial set of one or more detection criteria; and modifying the set of detection criteria, including adjusting an energy level ratio threshold at preselected tag detection frequencies, to adjust the alarm trigger sensitivity of the security system. - View Dependent Claims (17, 18)
-
-
19. A system for managing false alarms in a security system, the system comprising:
-
a transmitter producing an applied interrogation field in a detection zone; a processor, the processor operating to; trigger an alarm event in response to the detection of a tag in the detection zone using an initial alarm trigger sensitivity, the initial alarm trigger sensitivity being based on an initial set of one or more detection criteria; and modify the set of detection criteria, including reducing a frequency range for detecting an active tag, to adjust the alarm trigger sensitivity of the security system. - View Dependent Claims (20)
-
Specification