摘要:
A product information system including a server having an item database that stores at least one item identifier and corresponding item data for at least one item. Also, the item database is associated with a predetermined vendor. The server also includes a receiver that receives a message including tag data captured from a tag by a portable wireless device. The tag data includes an item identifier. Also, the server includes a processor that operates, in response to the received message, to select item data from the item database that corresponds to the received item identifier. The server also includes a transmitter that transmits the selected item data to the portable wireless device.
摘要:
A method and computer for responding to an assistance request message. An assistance request message from a requester mobile device associated with a requester is received at a response computer. The assistance request message includes at least one input parameter. A responder is determined, from multiple potential responders, to respond to the assistance request message. The responder is associated with responder data corresponding to the at least one input parameter. An availability inquiry message to a responder device associated with the responder is transmitted. A response to the availability inquiry message is received from the responder device. When the response to the availability inquiry message indicates that the responder is available to respond to the assistance request message, the requester mobile device is notified that the responder is available.
摘要:
Systems and methods for purchasing an article having a security tag attached thereto. The methods involve: obtaining, by a mobile communication device, article information and payment information for purchasing the article; communicating the article information and payment information from the mobile communication device to a remote system via a network connection for completing a purchase transaction; and communicating a detachment key from the mobile communication device to the security tag via a first short-range communication. Notably, the detachment key is communicated to the security tag exclusively if the article was successfully purchased during the purchase transaction. The detachment key is configured to cause an actuation of a detachment mechanism of the security tag.
摘要:
Systems and methods for purchasing an article having a security tag attached thereto. The methods involve: obtaining, by a mobile communication device, article information and payment information for purchasing the article; communicating the article information and payment information from the mobile communication device to a remote system via a network connection for completing a purchase transaction; and communicating a detachment key from the mobile communication device to the security tag via a first short-range communication. Notably, the detachment key is communicated to the security tag exclusively if the article was successfully purchased during the purchase transaction. The detachment key is configured to cause an actuation of a detachment mechanism of the security tag.
摘要:
Systems (100) and methods for network node security configuration. The methods involve: performing operations by a mobile communication device (104) to obtain a unique identifier from a network node (108) to be installed at a customer facility (102) via a first short range communication link (110); communicating a signal comprising the unique identifier from the mobile communication device to a remote server (118) via a first long range communication link (112); verifying by the remote server that a correct type of network node is being installed at a first location within the customer facility according to a respective work order; and communicating security information, useful for configuring security functions of the network node, from the remote server to the network node via the mobile communication device, without presenting the security information to a user of the mobile communication device or storing the security information in the mobile communication device.
摘要:
Systems (100) and methods for network node security configuration. The methods involve: performing operations by a mobile communication device (104) to obtain a unique identifier from a network node (108) to be installed at a customer facility (102) via a first short range communication link (110); communicating a signal comprising the unique identifier from the mobile communication device to a remote server (118) via a first long range communication link (112); verifying by the remote server that a correct type of network node is being installed at a first location within the customer facility according to a respective work order; and communicating security information, useful for configuring security functions of the network node, from the remote server to the network node via the mobile communication device, without presenting the security information to a user of the mobile communication device or storing the security information in the mobile communication device.
摘要:
Systems and methods for obtaining access to an area or an object secured by an electronic locking device. The methods involve: obtaining, by a Mobile Communication Device (“MCD”), a unique identifier associated with the Electronic Locking Device (“ELD”)via a first Short Range Communication (“SRC”); communicating the unique identifier from MCD to a Remote Communication Device (“RCD”) via a network connection; receiving at least one symbol associated with the unique identifier that facilitates unlocking of ELD from RCD via the network connection; and causing ELD to be unlocked by communicating a key from MCD to ELD via a second SRC.
摘要:
Systems (100) and methods for network node security configuration. The methods involve: performing operations by a mobile communication device (104) to obtain a unique identifier from a network node (108) to be installed at a customer facility (102) via a first short range communication link (110); communicating a signal comprising the unique identifier from the mobile communication device to a remote server (118) via a first long range communication link (112); verifying by the remote server that a correct type of network node is being installed at a first location within the customer facility according to a respective work order; and communicating security information, useful for configuring security functions of the network node, from the remote server to the network node via the mobile communication device, without presenting the security information to a user of the mobile communication device or storing the security information in the mobile communication device.
摘要:
Systems (100) and methods for network node security configuration. The methods involve: performing operations by a mobile communication device (104) to obtain a unique identifier from a network node (108) to be installed at a customer facility (102) via a first short range communication link (110); communicating a signal comprising the unique identifier from the mobile communication device to a remote server (118) via a first long range communication link (112); verifying by the remote server that a correct type of network node is being installed at a first location within the customer facility according to a respective work order; and communicating security information, useful for configuring security functions of the network node, from the remote server to the network node via the mobile communication device, without presenting the security information to a user of the mobile communication device or storing the security information in the mobile communication device.
摘要:
Systems and methods for operating a security tag of an Electronic Article Surveillance (“EAS”) system. The methods involve providing a unique identifier from the security tag to an application installed on a mobile communication device via a first short-range communication when the security tag is attached to an article for sale. A second short-range communication is received by the security tag from the mobile communication device that comprises a detachment command. The detachment command is received by the security tag exclusively after the article has been successfully purchased. Thereafter, the security tag verifies that the second short-range communication is intended to be processed thereby. Next, the security tag performs operations to actuate a detachment mechanism in response to the detachment command so that the security tag can be detached from the article for sale.