IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0896577
(2010-10-01)
|
등록번호 |
US-8378826
(2013-02-19)
|
발명자
/ 주소 |
- Mercier, Michael
- Wyatt, Jr., James Gordon
- Eckert, Lee H.
- Shafer, Gary Mark
|
출원인 / 주소 |
|
인용정보 |
피인용 횟수 :
21 인용 특허 :
65 |
초록
▼
Exemplary systems, methods and other means for providing a key device that may be used with a monitoring system are discussed herein. The key device may be configured to communicate with one or more other devices, silence an alarm, commission a tag, decommission a tag, unlock a tag from an item, amo
Exemplary systems, methods and other means for providing a key device that may be used with a monitoring system are discussed herein. The key device may be configured to communicate with one or more other devices, silence an alarm, commission a tag, decommission a tag, unlock a tag from an item, among other things. The key device may include rules that permit particular functionality based on, for example, time and/or location.
대표청구항
▼
1. A method for decommissioning a tag, comprising: receiving at the tag a decommissioning signal from a key device;entering into a decommissioned state in response to receiving the decommissioning signal, wherein entering into the decommissioned state includes deactivating alarm functionality of the
1. A method for decommissioning a tag, comprising: receiving at the tag a decommissioning signal from a key device;entering into a decommissioned state in response to receiving the decommissioning signal, wherein entering into the decommissioned state includes deactivating alarm functionality of the tag;transmitting a message to a monitoring system entity, the message indicating the tag is decommissioned, wherein the monitoring system entity is not the key device;prior to receiving the decommissioning signal, further comprising: receiving at the key device an activation code;generating activation data based on the activation code;transmitting the activation data wirelessly to a network entity;receiving, from the network entity, validation data indicating whether the activation data is valid; andin response to receiving the validation data that authenticates the activation data, activating configuration data at the key device, wherein the configuration data is associated with the activation data. 2. The method of claim 1, wherein activating the configuration data includes activating usage rules that include time-based rules. 3. The method of claim 1, wherein activating the configuration data includes activating usage rules that are location-based rules. 4. The method of claim 3, wherein activating the location-based rules enables the key device to function when the key device is in a retail store or retail mall. 5. The method of claim 1, wherein activating the configuration data includes activating usage rules, the method further comprising determining that at least one usage rule was violated. 6. The method of claim 5 further comprising generating a signal for transmission in response to determining the at least one usage rule was violated, the signal including rule violation data that indicates violation of the at least one usage rule. 7. The method of claim 5 further comprising temporarily locking the key device in response to determining a violation of the at least one of usage rule. 8. The method of claim 5 further comprising permanently disabling the key device in response to determining a violation of the at least one of usage rule. 9. The method of claim 5 further comprising providing reduced functionality in response to determining a violation of the at least one of usage rule. 10. The method of claim 5 further comprising alarming in response to determining a violation of the at least one of usage rule. 11. The method of claim 1 further comprising receiving a signal that indicates another key device has violated a usage rule associated with the key device. 12. The method of claim 1, wherein: activating the configuration data includes activating usage rules, and determining that at least one of the usage rules is being satisfied. 13. The method of claim 1 further comprising: receiving a tote code; andin response to receiving the tote code, unlocking a tote tag. 14. The method of claim 1, wherein: activating the configuration data includes activating usage rules, anddetermining, at the network entity, that at least one of the usage rules is being satisfied. 15. The method of claim 1, wherein: activating the configuration data includes activating usage rules, anddetermining, at the network entity, that at least one of the usage rules is being violated. 16. The method of claim 1, further comprises providing the key device, including: providing a wireless receiver configured to receive a wireless signal transmitted by a network entity of a monitoring system;providing a wireless transmitter configured to transmit wireless signals to the network entity; andproviding a processor, wherein the processor is configured to: receive the activation code;generate activation data based on the activation code;transmit the activation data using the wireless transmitter to the network entity;receive, from the network entity, validation data indicating whether the activation data is valid; andin response to receiving the validation data that authenticates the activation data, activate configuration data associated with the activation data. 17. A method for decommissioning a tag, comprising: receiving at the tag a decommissioning signal from a key device;entering into a decommissioned state in response to receiving the decommissioning signal, wherein entering into the decommissioned state includes deactivating alarm functionality of the tag;transmitting a message to a monitoring system entity, the message indicating the tag is decommissioned, wherein the monitoring system entity is not the key deviceprior to entering the decommissioned state: obtaining barcode data using the key device;receiving, at the monitoring system entity, the barcode data; andverifying the barcode data matches tag data uploaded when the tag was commissioned. 18. The method of claim 17, wherein the entering into the decommissioned state is also in response to verifying the barcode data matches the tag data. 19. The method of claim 17 further comprising physically detaching from an item in response to the key device unlocking a mechanical lock included in the tag. 20. A method comprising: receiving an activation code;validating the activation code;implementing configuration data and associated usage rules that enable functionality of the key device based on the activation code; andgenerating, by a key device, a decommission signal for receipt by a tag to thereby cause the tag to be decommissioned, wherein being decommissioned includes deactivating an alarm of the tag;wherein the key device includes components configured to interface with the tag to disable a mechanical locking mechanism of the tag. 21. The method of claim 20, wherein implementing configuration data and associated usage rules include implementing time-based rules, location-based rules, or user identity-based rules. 22. The method of claim 20, further comprising: determining that at least one usage rule has been violated; anddisabling the key device in response to determining that the at least one usage rule has been violated. 23. The method of claim 20 further comprising receiving a tag alert signal indicating that a given tag is alarming. 24. The method of claim 20 further comprising remotely silencing an alarming tag. 25. The method of claim 20 further comprising displaying information provided by an external sensor on a display of the key device. 26. The method of claim 20, wherein causing the tag to be decommissioned includes causing the tag to be disassociated with an article to which the tag is affixed. 27. A key device comprising a processing circuitry, the processing circuitry being configured to at least: receive an activation code;validate the activation code;implement configuration data and associated usage rules that enable functionality of the key device based on the activation code; andgenerate a decommission signal for receipt by a tag to thereby cause the tag to be decommissioned, wherein being decommissioned includes deactivating an alarm of the tag;wherein the key device includes components configured to interface with the tag to disable a mechanical locking mechanism of the tag. 28. The key device of claim 27, wherein the processing circuitry configured to implement configuration data and associated usage rules includes being configured to implement time-based rules, location-based rules, or user identity-based rules. 29. The key device of claim 27, wherein the processing circuitry is further configured to: determine that at least one usage rule has been violated; anddisable the key device in response to determining that the at least one usage rule has been violated. 30. The key device of claim 27, wherein the processing circuitry is further configured to receive a tag alert signal indicating that a given tag is alarming. 31. The key device of claim 27, wherein the processing circuitry is further configured to remotely silence an alarming tag. 32. The key device of claim 27 further comprising a display; and wherein the processing circuitry is further configured to cause the display to display information provided by an external sensor. 33. The key device of claim 27, wherein the processing circuitry configured to cause the tag to be decommissioned includes being configured to cause the tag to be disassociated with an article to which the tag is affixed. 34. A method comprising: receiving, at a tag, a decommission signal from a key device;entering into a decommissioned state in response to receiving the decommission signal, wherein entering into the decommissioned state includes deactivating an alarm of the tag; andtransmitting a message from the tag to a monitoring system entity indicating receipt of the decommission signal;wherein the tag includes a mechanical locking mechanism configured to interface with components of the key device to disable the mechanical locking mechanism. 35. The method of claim 34 further comprising: receiving an indication to silence an alarm from the key device; andsilencing the alarm. 36. The method of claim 35, wherein transmitting the message to the monitoring system entity includes causing the tag to be disassociated with an article to which the tag is affixed. 37. A tag device comprising: a mechanical locking mechanism configured to interface with components of a key device to disable the mechanical locking mechanism; andprocessing circuitry configured to at least: receive a decommission signal from a key device;enter into a decommissioned state in response to receiving the decommission signal, wherein entering into the decommissioned state includes deactivating an alarm of the tag device; andcause transmission of a message from the tag device to a monitoring system entity indicating receipt of the decommission signal. 38. The tag device of claim 37, wherein the processing circuitry is further configured to: receive an indication to silence an alarm from the key device; andsilence the alarm. 39. The tag device of claim 37, wherein the processing circuitry configured to cause transmission of the message to the monitoring system entity includes being configured to cause the tag to be disassociated with an article to which the tag is affixed.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.