Systems and methods for security tag detachment or deactivation
First Claim
1. A method for operating a security tag, comprising:
- receiving, by the security tag from an external device, an authorization code comprising a security tag identifier, where the security tag identifier is signed using a cryptographic key of a plurality of cryptographic keys that are respectively assigned to a plurality of security tags;
performing operations by the security tag to verify a signature of the authorization code; and
responsive to the verification of the authorization code'"'"'s signature, performing detach operations or deactivation operations by the security tag which received the authorization code, where the detach operations cause a mechanical detachment of the security tag from an item and the deactivation operations cause a disablement of a response by the security tag to an interrogation signal from a Radio Frequency Identification (“
RFID”
) system or an Electronic Article Surveillance (“
EAS”
) system.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for operating a security tag. The methods involve: receiving, by the security tag, an authorization code comprising a security tag identifier signed using a cryptographic key of a plurality of cryptographic keys that are respectively assigned to a plurality of security tags; performing operations by the security tag to verify a signature of the authorization code; and performing detach operations or deactivation operations by the security tag, responsive to the signature'"'"'s verification. The detach operations cause a mechanical detachment of the security tag from an item. The deactivation operations cause a disablement of a response by the security tag to an interrogation signal from a Radio Frequency Identification (“RFID”) system or an Electronic Article Surveillance (“EAS”) system.
13 Citations
20 Claims
-
1. A method for operating a security tag, comprising:
-
receiving, by the security tag from an external device, an authorization code comprising a security tag identifier, where the security tag identifier is signed using a cryptographic key of a plurality of cryptographic keys that are respectively assigned to a plurality of security tags; performing operations by the security tag to verify a signature of the authorization code; and responsive to the verification of the authorization code'"'"'s signature, performing detach operations or deactivation operations by the security tag which received the authorization code, where the detach operations cause a mechanical detachment of the security tag from an item and the deactivation operations cause a disablement of a response by the security tag to an interrogation signal from a Radio Frequency Identification (“
RFID”
) system or an Electronic Article Surveillance (“
EAS”
) system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
-
a security tag configured to; receive an authorization code from an external device, the authorization code comprising a security tag identifier, the security tap identifier signed using a cryptographic key of a plurality of cryptographic keys that are respectively assigned to a plurality of security tags; verify a signature of the authorization code; and responsive to the verification of the authorization code'"'"'s signature, perform detach operations to mechanically detach the security tag from an item or deactivation operations to disable a response by the security tag to an interrogation signal from a Radio Frequency Identification (“
RFID”
) system or an Electronic Article Surveillance (“
EAS”
) system. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification