Security tag detacher activation system
First Claim
1. A detacher for unlocking a security tag having a locking mechanism, the detacher comprising:
- a detaching element, the detaching element configured to unlock the locking mechanism if the detaching element is activated;
a reader, the reader configured to receive a user identifier associated with at least one user;
a memory, the memory configured to store detacher data associated with the received user identifier; and
a processor, the processor configured to;
track detacher usage associated with the received user identifier;
update the detacher data stored in the memory based at least in part on the tracked detacher usage;
determine whether the detacher data meets at least one suspicious usage rule, the at least one suspicious usage rule indicating detacher usage associated with the receive identifier is suspicious if met;
determine whether the received user identifier meets at least one user rule; and
activate the detaching element if the received user identifier meets the at least one user rule and the detacher data does not meet the suspicious usage rule, the detaching element remaining at least temporarily deactivated if at least one of the received user identifier does not meet the at least one user rule and the detacher data meets the suspicious usage rule.
3 Assignments
0 Petitions
Accused Products
Abstract
A detacher for unlocking a security tag having a locking mechanism is provided. The detacher includes a detaching element in which the detaching element is configured to unlock the locking mechanism if the detaching element is activated. The detacher includes a reader in which the reader is configured to receive a user identifier associated with at least one user. The detacher includes a memory. The memory is configured to store at least one user rule. The detacher includes a processor in which the processor is configured to determine whether the received user identifier meets the at least one user rule. The processor is further configured activate the detaching element if the received user identifier meets the at least one user rule. The detaching element remains deactivated if the received user identifier does not meet the at least one user rule.
14 Citations
16 Claims
-
1. A detacher for unlocking a security tag having a locking mechanism, the detacher comprising:
-
a detaching element, the detaching element configured to unlock the locking mechanism if the detaching element is activated; a reader, the reader configured to receive a user identifier associated with at least one user; a memory, the memory configured to store detacher data associated with the received user identifier; and a processor, the processor configured to; track detacher usage associated with the received user identifier; update the detacher data stored in the memory based at least in part on the tracked detacher usage; determine whether the detacher data meets at least one suspicious usage rule, the at least one suspicious usage rule indicating detacher usage associated with the receive identifier is suspicious if met; determine whether the received user identifier meets at least one user rule; and activate the detaching element if the received user identifier meets the at least one user rule and the detacher data does not meet the suspicious usage rule, the detaching element remaining at least temporarily deactivated if at least one of the received user identifier does not meet the at least one user rule and the detacher data meets the suspicious usage rule. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for unlocking a security tag having a locking mechanism, the system comprising:
-
an authorization device, the authorization device including; a first receiver, the first receiver configured to receive a user identifier; a device memory, the device memory configured to store at least one user rule and detacher data associated with the received user identifier; and a first processor, the first processor configured to; determine whether the user identifier meets the at least one user rule; track detacher usage associated with the received user identifier; update the detacher data stored in the memory based at least in part on the tracked detacher usage; determine whether the detacher data meets at least one suspicious usage rule, the at least one suspicious usage rule indicating detacher usage associated with the received identifier is suspicious if met; and cause transmission of a response message, the response message indicating whether the user identifier meets the at least one user rule and whether the detacher data meets the at least one suspicious usage rule; a detacher configured to communicate with the authorization device, the detacher comprising; a detaching element, the detaching element configured to unlock the locking mechanism if the detaching element is activated; a second receiver, the second receiver configured to receive the response message; and a second processor, the second processor configured to activate the detaching element if the response message indicates the user associated with the user identifier is authorized to use the detaching element and the at least suspicious usage rule is not met; and the detaching element remaining at least temporarily deactivated if the response message indicates at least one of the user associated with the user identifier is unauthorized to use the detaching element and the detacher data meets the at least one suspicious usage rule. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method for unlocking a security tag having a locking mechanism, comprising:
-
receiving, at a detacher, a user identifier associated with at least one user; storing detacher data associated with the received user identifier; tracking detacher usage associated with the received user identifier; updating the detacher data stored in the memory based at least in part on the tracked detacher usage; determining whether the received user identifier meets at least one user rule; determining whether the detacher data meets at least one suspicious usage rule, the at least one suspicious usage rule indicating detacher usage associated with the received identifier is suspicious if met; and activating a detaching element if the received user identifier meets the at least one user rule and the detacher data does not meet the suspicious usage rule, the detaching element arranged to unlock the locking mechanism. - View Dependent Claims (15, 16)
-
Specification