Security tag
First Claim
Patent Images
1. A security tag for securely identifying item(s), the security tag comprising:
- a. A housing;
b. A securing mechanism for securing the housing to the item(s);
c. A monitoring system for monitoring a tag status, the tag status indicating at least whether the housing and the security mechanism have been tampered with;
d. A store for storing item data, the item data identifying the item(s); and
, e. A communication system adapted to communicate the tag status and the item data to a remote host.
2 Assignments
0 Petitions
Accused Products
Abstract
A security tag for securely identifying items comprises a housing (1); a securing mechanism (6) for securing the housing to the item; a monitoring system (20, 24) for monitoring a tag status, the tag status indicating at least whether the housing (1) and the securing mechanism (6) have been tampered with; a store (22) for storing item data identifying the item; and a communication system (21) for communicating tag status and item data to a remote host.
-
Citations
27 Claims
-
1. A security tag for securely identifying item(s), the security tag comprising:
-
a. A housing;
b. A securing mechanism for securing the housing to the item(s);
c. A monitoring system for monitoring a tag status, the tag status indicating at least whether the housing and the security mechanism have been tampered with;
d. A store for storing item data, the item data identifying the item(s); and
, e. A communication system adapted to communicate the tag status and the item data to a remote host. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 24)
-
-
22. A method of transferring the ownership of item(s), the method comprising:
-
a. Securely identifying the item(s) by attaching a security tag to the item(s), the security tag having a monitoring system for monitoring the tag status, the tag status indicating whether the security tag and/or the item(s) have been tampered with;
b. Detecting remotely the condition of the monitoring system; and
c. Causing the remote host to register a change in ownership of. the item(s) when the monitoring system does not indicate a tamper condition. - View Dependent Claims (23, 25, 26, 27)
-
Specification