WIRELESS SIGNAL ACTUATED SECURITY TAG
First Claim
1. A method for operating a security tag of an Electronic Article Surveillance (“
- EAS”
) system, comprising;
providing a unique identifier from the security tag to an application installed on a mobile communication device via a first short-range communication when the security tag is attached to an article for sale;
receiving, by the security tag, a second short-range communication from the mobile communication device that comprises a detachment command exclusively after the article has been successfully purchased;
verifying, by the security tag, that the second short-range communication is intended to be processed thereby; and
performing operations by the security tag to actuate a detachment mechanism in response to the detachment command so that the security tag can be detached from the article for sale.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for operating a security tag of an Electronic Article Surveillance (“EAS”) system. The methods involve providing a unique identifier from the security tag to an application installed on a mobile communication device via a first short-range communication when the security tag is attached to an article for sale. A second short-range communication is received by the security tag from the mobile communication device that comprises a detachment command. The detachment command is received by the security tag exclusively after the article has been successfully purchased. Thereafter, the security tag verifies that the second short-range communication is intended to be processed thereby. Next, the security tag performs operations to actuate a detachment mechanism in response to the detachment command so that the security tag can be detached from the article for sale.
26 Citations
20 Claims
-
1. A method for operating a security tag of an Electronic Article Surveillance (“
- EAS”
) system, comprising;providing a unique identifier from the security tag to an application installed on a mobile communication device via a first short-range communication when the security tag is attached to an article for sale; receiving, by the security tag, a second short-range communication from the mobile communication device that comprises a detachment command exclusively after the article has been successfully purchased; verifying, by the security tag, that the second short-range communication is intended to be processed thereby; and performing operations by the security tag to actuate a detachment mechanism in response to the detachment command so that the security tag can be detached from the article for sale. - View Dependent Claims (2, 3, 5, 6, 7, 8, 9, 10)
- EAS”
-
4. The method according to clam 1, further comprising decrypting the second short-range communication at the security tag prior to performing said verifying step.
-
11. A security tag of an Electronic Article Surveillance (“
- EAS”
) system, comprising;at least one electronic circuit configured to; provide a unique identifier to an application installed on a mobile communication device via a first short-range communication when the security tag is attached to an article for sale; receive a second short-range communication from the mobile communication device that comprises a detachment command exclusively after the article has been successfully purchased; verify that the second short-range communication is intended to be processed by the security tag; and actuate a detachment mechanism in response to the detachment command so that the security tag can be detached from the article for sale. - View Dependent Claims (12, 13, 15, 16, 17, 18, 19, 20)
- EAS”
-
14. The security tag according to clam 11, wherein the electronic circuit is further configured to decrypt the second short-range communication prior to verifying that the second short-range communication is intended to be processed by the security tag.
Specification