Authorization Control for an Anti-Theft Security System
First Claim
1. A system comprising:
- an anti-theft security system;
wherein the anti-theft security system comprises an interface and security circuitry;
wherein the security circuitry is configured to control a security status for the anti-theft security system based on an authentication of a security fob, the security circuitry including a processor and a memory;
wherein the memory is configured to store an authorization list, wherein the authorization is configured to identify one or more identifiers for one or more security fobs that are authorized to control the security status of the anti-theft security system;
wherein the processor is configured to add an identifier for a first security fob to the authorization list in response to a defined sequence of interactions by the first security fob and a second security fob with the interface.
1 Assignment
0 Petitions
Accused Products
Abstract
Improved systems and techniques are disclosed for controlling the security states of anti-theft security systems such as product display assemblies using security fobs. According to an example embodiment, a manager security fob and another security fob that is to be authorized for use in controlling the security status of a product display assembly can interact with a system in accordance with a defined sequence to add the another security fob to an authorization list for the product display assembly. For example, the defined sequence can be a connection of the manager security fob with the system, followed by a disconnection of the manager security fob from the system, followed a connection of the another security fob with the system within a defined window.
24 Citations
27 Claims
-
1. A system comprising:
-
an anti-theft security system; wherein the anti-theft security system comprises an interface and security circuitry; wherein the security circuitry is configured to control a security status for the anti-theft security system based on an authentication of a security fob, the security circuitry including a processor and a memory; wherein the memory is configured to store an authorization list, wherein the authorization is configured to identify one or more identifiers for one or more security fobs that are authorized to control the security status of the anti-theft security system; wherein the processor is configured to add an identifier for a first security fob to the authorization list in response to a defined sequence of interactions by the first security fob and a second security fob with the interface. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A system comprising:
-
an anti-theft security system; and a plurality of security fobs, the security fobs including a manager security fob, wherein each security fob includes an identifier for that security fob; wherein the anti-theft security system comprises an interface and security circuitry; wherein the security circuitry is configured to control a security status for the anti-theft security system based on an authentication of a security fob, the security circuitry including a processor and a memory; wherein the memory is configured to store (1) a software program for execution by the processor in response to a connection of a security fob with the interface, and (2) an authorization list, wherein the authorization is configured to identify one or more identifiers for one or more security fobs that are authorized to control the security status of the anti-theft security system; wherein the software program comprises a plurality of processor-executable instructions that, upon execution by the processor, are configured to cause the processor to; receive an identifier for the connected security fob through the interface; determine whether the connected security fob corresponds to a manager second security fob; in response to a determination that the connected security fob corresponds to the manager security fob, (1) start a timer that defines a time window, (2) determine whether another security fob has been connected with the interface before expiration of the defined time window, and (3) in response to a determination that another security fob has been connected with the interface before the expiration of the defined time window, add an identifier for the another security fob to the authorization list; and in response to a determination that the connected security fob does not correspond to the manager security fob, (1) compare the received identifier with the authorization list, and (2) in response to the comparison resulting in a determination that the received identifier matches an identifier on the authorization list, permit the connected security fob to control the security status for the product display assembly.
-
-
23. A computer program product comprising:
a plurality of processor-executable instructions that are resident on a non-transitory computer-readable storage medium, wherein the instructions, upon execution by a processor, are configured to cause the processor to; receive an identifier for a security fob connected to an interface that is in communication with the processor; determine whether the connected security fob corresponds to a manager second security fob; in response to a determination that the connected security fob corresponds to the manager security fob, (1) start a timer that defines a time window, (2) determine whether another security fob has been connected with the interface before expiration of the defined time window, and (3) in response to a determination that another security fob has been connected with the interface before the expiration of the defined time window, add an identifier for the another security fob to an authorization list, wherein the authorization list is configured to identify one or more identifiers for one or more security fobs that are authorized to control a security status of an anti-theft security system; and in response to a determination that the connected security fob does not correspond to the manager security fob, (1) compare the received identifier with the authorization list, and (2) in response to the comparison resulting in a determination that the received identifier matches an identifier on the authorization list, permit the connected security fob to control the security status for the anti-theft security system.
-
24. A method comprising:
-
connecting a first security fob with an interface, the interface for cooperation with a processor that manages an authorization list for an anti-theft security system, the authorization list for listing one or more identifiers for one or more security fobs that are authorized to control a security status for the anti-theft security system; disconnecting the first security fob from the interface; in response to the connecting or the disconnecting, starting a timer, the timer defining a time window; connecting a second security fob with the interface; the processor reading an identifier for the connected second security fob through the interface; the processor determining that the second security fob connecting occurred before expiration of the defined time window; and in response to the determination that the second security fob connecting occurred before expiration of the defined time window, the processor adding the read identifier to the authorization list to thereby authorize the second security fob for use in controlling the security status of the anti-theft security system. - View Dependent Claims (25, 26, 27)
-
Specification