WO2015121833A1 - Désactivation d'étiquette de sécurité - Google Patents
Désactivation d'étiquette de sécurité Download PDFInfo
- Publication number
- WO2015121833A1 WO2015121833A1 PCT/IB2015/051080 IB2015051080W WO2015121833A1 WO 2015121833 A1 WO2015121833 A1 WO 2015121833A1 IB 2015051080 W IB2015051080 W IB 2015051080W WO 2015121833 A1 WO2015121833 A1 WO 2015121833A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- payment
- product
- mobile device
- selected product
- server
- Prior art date
Links
- 230000009849 deactivation Effects 0.000 title claims abstract description 130
- 238000004891 communication Methods 0.000 claims abstract description 91
- 238000000034 method Methods 0.000 claims abstract description 58
- 238000012790 confirmation Methods 0.000 claims description 38
- 238000013475 authorization Methods 0.000 claims description 12
- 238000001514 detection method Methods 0.000 description 14
- 238000010586 diagram Methods 0.000 description 11
- 238000004590 computer program Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 7
- 238000012546 transfer Methods 0.000 description 6
- 230000003213 activating effect Effects 0.000 description 5
- 230000001413 cellular effect Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 238000004806 packaging method and process Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000001052 transient effect Effects 0.000 description 3
- RWSOTUBLDIXVET-UHFFFAOYSA-N Dihydrogen sulfide Chemical compound S RWSOTUBLDIXVET-UHFFFAOYSA-N 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005672 electromagnetic field Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/354—Card activation or deactivation
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2465—Aspects related to the EAS system, e.g. system components other than tags
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2405—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
- G08B13/2408—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using ferromagnetic tags
- G08B13/2411—Tag deactivation
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2405—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
- G08B13/2414—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
- G08B13/242—Tag deactivation
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2405—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
- G08B13/2422—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using acoustic or microwave tags
- G08B13/2425—Tag deactivation
Definitions
- Electronic article surveillance is a method employed to prevent shoplifting and removal of property from certain locations.
- Articles may be fitted with special electronic security tags.
- tags for example microwave tags, are removable from products, and can be re-used. These tags are typically removed at a checkout counter or point-of-sale, for example at a retailer or library. Other tags can be disabled by a magnetic or electromagnetic field, and remain on the article.
- RFID radio frequency identification
- Self-checkout systems currently in use at retail stores provide customers with the opportunity to pay for items with minimal or no assistance from a store employee.
- self-checkout systems enable customers to scan barcodes themselves on products that they wish to buy. After scanning, they are required to pay for the products by any accepted method, and may be required to deactivate or remove security tags associated with the products they are purchasing by taking the products to a dedicated security tag point.
- Self-checkout may be preferred by retailers due to the fact that the required amount of staff is reduced.
- shoplifting remains a major drawback of systems in which a store employee is not involved in the payment process.
- a method for deactivating a security tag the method performed on a mobile device and including the steps of: facilitating payment for a selected product using the mobile device by communication of payment credentials from the mobile device to a remote payment authorizing server, wherein an identifier of the mobile device is provided to the remote payment authorizing server; receiving or allowing access to a deactivation code corresponding to the selected product from a product server; and deactivating a security tag of the selected product by means of wireless proximity communication of the deactivation code from the mobile device to the security tag.
- Further features provide for the method to include the steps of capturing or receiving information associated with the selected product including a product identifier; and including using the product identifier to identify the selected product facilitating payment for the specific product or a group of products; and for the information to be captured from the security tag.
- Still further features provide for the step of facilitating payment for a selected product to be a pre-authorization of payment for the selected product to reserve funds for the selected product; and wherein deactivating a security tag of the selected product deactivates the security tag for a predetermined period of time; and wherein the method includes confirming if the payment is to be finalized within the predetermined period of time.
- step of facilitating payment to include providing payment credentials prior to capturing information associated with one or more selected products; and receiving a deactivation code for each selected product from a product server on receipt of a product identifier for the selected product.
- step of facilitating payment to include providing payment credentials after scanning a selected product; and receiving a deactivation code from the product server on confirmation of successful payment for the selected product.
- the deactivation code may be a radio frequency or a serial number.
- a further feature provides for the step of allowing access to a deactivation code to provide an unlock code for a deactivation code already loaded on the mobile device. [0012] A still further feature provides for the step of capturing information associated with the selected product to include a locked deactivation code.
- the invention extends to a method for deactivating a security tag, the method performed at a product server and including the steps of: receiving confirmation of payment for a selected product, wherein the confirmation includes an identifier of a mobile device and a product identifier; looking up the product identifier to obtain a deactivation code or unlock instruction for a deactivation code for the selected product; transmitting the deactivation code or the unlock instruction for the deactivation code corresponding to the selected product to the mobile device using the identifier of the mobile device.
- a further feature provides for the step of receiving confirmation of payment for a selected product to be received from a payment authorizing server.
- the invention extends to a mobile device for deactivating a security tag, comprising: a payment facility component for facilitating payment for a selected product using the mobile device by communication of payment credentials from the mobile device to a remote payment authorizing server, wherein an identifier of the mobile device is provided to the remote payment authorizing server; a deactivation code component for receiving or allowing access to a deactivation code corresponding to the selected product from a product server; and a deactivating component for deactivating a security tag of the selected product including a wireless proximity communication component for communication of the deactivation code from the mobile device to the security tag.
- a further feature provides for the mobile device to include a scanning component for capturing information associated with the selected product including a product identifier.
- the payment facility component for facilitating payment for a selected product to facilitate a pre-authorization of payment for the selected product to reserve funds for the selected product; for the deactivating component for deactivating a security tag of the selected product to deactivate the security tag for a predetermined period of time; and for the mobile device to include a confirmation component for receiving user confirmation if the payment is to be finalized within the predetermined period of time.
- a still further feature provides for the deactivation code to include at least one of a radio frequency signal and a serial number. [0019] A yet further feature provides for the deactivation code component to include a pre-loaded deactivation code for a selected product and to receive an unlock code for the pre-loaded deactivation code.
- a further feature provides for the scanning component for capturing information associated with the selected product to include capturing a locked deactivation code.
- a still further feature provides for the mobile device to be a consumer's personal communication device having mobile payment capabilities by communication with a remote payment authorizing server. [0022] A yet further feature provides for the mobile device to be a store-provided handheld point of sale device in which a payment card is insertable and having mobile payment capabilities by dedicated communication with a remote payment authorizing server.
- the invention extends to a product server for deactivating a security tag, comprising: a payment confirmation component for receiving confirmation of payment for a selected product, wherein the confirmation includes an identifier of a mobile device and a product identifier; a database component for looking up the product identifier to obtain a deactivation code or unlock instruction for a deactivation code for the selected product; and a deactivation code transmitting component for transmitting the deactivation code or the unlock instruction for the deactivation code corresponding to the selected product to the mobile device using the identifier of the mobile device.
- a further feature provides for the payment confirmation component to receive confirmation of payment for a selected product from a payment authorizing server.
- a still further feature provides for the product server to be at a retail environment and the server communication component to use a local wireless network for communication with one or more mobile devices in the retail environment.
- a yet further feature provides for the product server to be remote from a retail environment and for the server communication component to use remote data communication with one or more mobile devices.
- a computer program product for deactivating a security tag comprising a computer-readable medium having stored computer-readable program code for performing the steps of: facilitating payment for a selected product using the mobile device by communication of payment credentials from the mobile device to a remote payment authorising server, wherein an identifier of the mobile device is provided to the remote payment authorizing server; receiving or allowing access to a deactivation code corresponding to the selected product from a product server; and deactivating a security tag of the selected product by means of wireless proximity communication of the deactivation code from the mobile device to the security tag.
- a computer program product for deactivating a security tag comprising a computer-readable medium having stored computer-readable program code for performing the steps of: receiving confirmation of payment for a selected product, wherein the confirmation includes an identifier of a mobile device and a product identifier; looking up the product identifier to obtain a deactivation code or unlock instruction for a deactivation code for the selected product; and transmitting the deactivation code or the unlock instruction for the deactivation code corresponding to the selected product to the mobile device using the identifier of the mobile device.
- FIG. 1 illustrates a system for deactivating a security tag according to an embodiment of the invention
- FIG. 2A illustrates a method of deactivating a security tag as carried out at a mobile device according to an embodiment of the invention
- FIG. 2B illustrates a method of deactivating a security tag as carried out at a product server according to an embodiment of the invention
- FIG. 3 shows a mobile device according to an embodiment of the invention
- FIG. 4 shows a product server according to an embodiment of the invention
- FIG. 5 is a flow diagram illustrating a first example embodiment of the method according to the present invention.
- FIG. 6 is a flow diagram illustrating a second example embodiment of the method according to the present invention.
- FIG. 7 is a flow diagram illustrating a third example embodiment of the method according to the present invention.
- FIG. 8 is a swim-lane flow diagram a fourth example embodiment of the method according to the present invention.
- FIG. 9 illustrates an embodiment of a computing device in accordance with the present invention.
- FIG. 10 illustrates an embodiment of a block diagram of a communication device in accordance with the present invention.
- Embodiments of the described methods and systems for deactivating a security tag are provided.
- a mobile device is used by a consumer in a retail environment to effect payment for products which may be goods and/or services.
- the products may be secured with a security tag to restrict the use or movement of the product including preventing unauthorized removal from a location or unauthorized access to the product.
- a security tag may prevent opening of the product packaging or may spoil or damage the product. This may apply to packaging which contains goods, but may also apply to a product in the form of a service in which service activation instructions are within the packaging.
- the security tag may provide an alarm if tampered with.
- a security tag may prevent removal of the product from a location by activating an alarm if the security tag passes through a gateway having a detection system.
- a security tag may take various different forms examples of which are described below.
- the described method and system provide deactivation of a security tag by a mobile device upon confirmation of payment transaction for the goods from the mobile device.
- the mobile device may be the consumer's own personal mobile device, for example in the form of a mobile phone or tablet having communication capabilities.
- the consumer's mobile device may have payment capabilities.
- Payment capabilities may take various forms, in one example, a mobile wallet securely stores payment credentials in the mobile device, in another example, a cloud based payment system stores the payment credentials remotely and payment is authorized from the consumer's device.
- the form of payment capability is not restricted in this description as long as authorization is securely provided by the consumer via the mobile device.
- the mobile device may be a store provided mobile device in the form of a handheld point of sale (POS) device in which a consumer's payment card may be inserted.
- POS point of sale
- the store provided mobile device will have secure financial processing channels from the device.
- a user (122) in a retail environment uses a mobile device (1 10).
- the mobile device (1 10) may a user's own mobile communication device such as a smartphone, tablet, etc. or may be a store-provided mobile device in the form of a handheld POS device.
- the mobile device (1 10) may have capabilities and features which are described in more detail in reference to FIG. 3 including at least a payment capability and a tag deactivation capability.
- the mobile device (1 10) may be in communication with a financial transaction server (1 14) which may be provided by a financial institution for secure remote communication for payment transactions from mobile devices.
- a financial transaction server (1 14) which may be provided by a financial institution for secure remote communication for payment transactions from mobile devices.
- the mobile device (1 10) may also be in communication with a product server (1 16) which may have an associated database (1 18) storing product identifiers, information, and security tag information including deactivation codes.
- the product server (1 16) may be local to the retail environment, for example, a store product server within a local network, or may be provided remotely, for example for a range of stores in which case communication with the mobile device (1 10) may be via a wide area network, or other mobile communication channels.
- a user may visit a retail store at which he or she wishes to transact.
- Products (120, 122) in the retail store are equipped with anti-theft security tags (124, 126).
- the security tags are near-field communication (NFC) tags.
- NFC near-field communication
- the type of security tag used may be any suitable EAS-type tag including, but not limited to, magnetic, acousto-magnetic, microwave, and radio frequency. These tags may be uniquely associated with a specific product.
- the security tags may be configured to set off an alarm (128) associated with a detection system (130) when the tags are brought into a detection zone of the detection system (130).
- the detection zone may be located near an entrance and/or exit of the store so that the alarm (128) is only activated when a product with an active security tag is removed from the store itself, rather than when moved around within the store.
- an active tag may be configured to transmit an "active" message to the detection zone when scanned.
- Other forms of security tag (124, 126) may be used with the described system which may include an alarm in the security tag (124, 126) which may sound or send an alert to a monitoring system when the security tag (124, 126) is tampered with.
- a flow diagram (200) of an embodiment of a method for deactivating a security tag is provided.
- the method may be performed on a mobile device, for example, with the functionality provided by an application running on the mobile device and accessing functionality from other features and programs on the mobile device.
- the method may capture or receive (201 ) information associated with a selected product including a product identifier.
- the method may scan a code provided at the product, or may capture the information from a tag such as a product information tag which may be incorporated into a security tag.
- the method may facilitate payment (202) for a selected product using the mobile device by communication of payment credentials from the mobile device to a remote payment authorising server.
- An identifier of the mobile device may be provided to the remote payment authorizing server for further communication of the deactivation code.
- Facilitating payment for a selected product may be a pre-authorization of payment for the selected product to reserve funds for the selected product.
- Facilitating payment may include providing payment credentials prior to capturing information associated with one or more selected products. Alternatively, these may be provided after scanning a selected product.
- the method may then receive (203) a deactivation code corresponding to the selected product from a product server or may allow access to a deactivation code, for example, where a deactivation code is already provided on the mobile device or has been received whilst capturing information relating to the selected product. If a deactivation code has already been received, it may be in a form unusable by the mobile device until access is allowed to it.
- the deactivation code may be encrypted or partially provided and a decryption key may be provided.
- the method may then deactivate (204) a security tag of the selected product by means of wireless proximity communication of the deactivation code from the mobile device to the security tag.
- Deactivating a security tag of the selected product may deactivate the security tag for a predetermined period of time.
- the deactivation code may includes at least one of a radio frequency signal and a serial number.
- a flow diagram (250) of an embodiment of a method for deactivating a security tag is provided as performed at a product server (1 16) such as that of FIG. 1 .
- the method may include receiving (251 ) confirmation of payment for a selected product including an identifier of a mobile device from which the payment has been made and a product identifier.
- the method may look up (252) the product identifier to obtain a deactivation code or unlock instruction for a deactivation code for the selected product. This may be stored in a database accessed by the product server.
- FIG. 3 shows a mobile device (300) for use in the system and method described with reference to FIG. 1 and FIG. 2.
- the mobile device (300) may be a personal communication device, typically a smartphone of a user, and includes a payment facility component (310), a scanning component (320), a deactivation code component (330) and a deactivation component (340).
- the payment facility component (310) is used to facilitate payment for a product. In the embodiment described with reference to FIG. 1 , the payment component contains account details of the user at a financial institution.
- the payment component may be a mobile payment component such as a mobile wallet.
- a user has a mobile wallet containing electronic money on their mobile device, typically a smartphone. There may then be no need for the financial institution to be directly involved in the transaction.
- Information regarding a product is still obtained from the product server as described above.
- the product server recognizes successful receipt of the money, and transmits the deactivation code as described above.
- the scanning component (320) is used to scan a product information tag in order to capture information associated with a specific product, including a product identifier.
- the capturing component is an NFC reader which reads information from the tag.
- the capturing component may also be a camera which captures an image of a barcode or QR code for analysis by the smartphone, an infrared component, or the like.
- the deactivation code component (330) is used to receive the deactivation code from the product server, or may be used to allow access to a deactivation code stored on the mobile device.
- the application may include a database which has unlocking codes of various products pre-loaded thereon.
- the deactivation code of the product may be released for use.
- the scanning component may be configured to also capture a locked deactivation code. After payment for the product has been processed, the mobile device may be presented with an unlock code for unlocking the locked deactivation code.
- the deactivating component (330) is used to deactivate a security tag of a specific product.
- the deactivating component may include a wireless proximity communication component for communicating the deactivation code from the mobile device to the security tag.
- the wireless proximity communication component may be of any suitable type, including a Bluetooth component, a RFID component, a NFC component, or the like.
- the deactivation component may be a transmitter which transmits a deactivation code in the form of frequency waves at a specific frequency required to disable a tag as described above, a serial number serving as a "kill command", or the like.
- the payment facility component may facilitate a pre- authorization of payment for the selected product to reserve funds for the product.
- the deactivating component may deactivate the security tag for a predetermined amount of time.
- the mobile device may include a confirmation component for receiving user confirmation if payment is to be finalized. Payment may then be finalized by transmitting the preserved funds to the merchant's financial account.
- the deactivation code may be transmitted by the deactivation component to the security tag in the form of a radio frequency signal, a serial number, or any other suitable format.
- a database component containing such codes may be associated with the deactivation code component.
- the scanning component may include capturing a locked deactivation code from the security tag. Once payment has been successfully processed, the mobile device may receive an unlock code for unlocking the deactivation code. The security tag may then be deactivated using the unlocked deactivation code.
- the mobile device may have the required mobile payment capabilities allowing it to process payment via a remote payment authorization server, or via a mobile wallet operating on the mobile device.
- a user's account may only be debited by a financial institution once for an amount of transactions performed at a single retailer.
- a user will transmit a number of product identifiers to a financial institution.
- the financial institution may send a "payment processed" message to the product server.
- the product server will then transmit a deactivation code for every such message received.
- the financial institution may then at a later stage, for example when instructed to do so by the user, after a predetermined amount of time, or upon reaching a certain transaction value, debit the user's account in a single transaction.
- the value of any product for which a "payment processed" message has been transmitted to the product server will be debited from a user's account to prevent a user from deactivating a product for which they have not paid.
- the mobile device is a handheld point of sale (POS) device which accepts a payment credential of a user, for example a payment card.
- POS point of sale
- the POS device includes a payment facility component, a deactivation code component, a scanning component and a deactivation component similar to that described with respect to the mobile device described with reference to FIG. 3.
- a user inserts a payment card into the device, and proceeds to scan articles which they would like to purchase.
- the user may initially be prompted for a PIN code before they start to scan products.
- the user may then proceed to scan all articles he or she wishes to purchase, transmitting product identifiers and payment credentials to a financial institution or to a remote server after every scan.
- a deactivation code is received from the product server after each successful payment, allowing a user to deactivate a tag on a product after facilitating payment therefore, and before scanning a next product.
- FIG. 4 a block diagram shows a server (1 16) for use in deactivating a security tag.
- the server (1 16) may be a product server as shown in FIG. 1 .
- the product server (1 16) may include a payment confirmation component
- the payment confirmation component (401 ) may receive the payment confirmation from a payment server of a financial intuition or via the mobile device which has originated the payment transaction.
- the payment confirmation may include at least an identifier of the mobile device and a product identifier;
- the remote server (1 16) may include or have access to a database component (1 17) for looking up the product identifier to obtain a deactivation code or unlock instruction for a deactivation code for the selected product.
- the product server (1 16) may also include a deactivation code transmitting component (402) for transmitting the deactivation code or the unlock instruction for the deactivation code corresponding to the selected product to the mobile device using the identifier of the mobile device.
- the product server (1 16) may be provided at a retail environment and a server communication component (403) may use a local wireless network for communication with one or more mobile devices in the retail environment.
- the product server (1 16) may be remote from a retail environment and the server communication component (403) may use remote data communication with one or more mobile devices.
- FIG. 5 a first embodiment of a method of operation of the system (100) is shown as it is performed on the mobile device (1 10) of FIG. 1 when the mobile device (1 10) is a user's own communication device such as a smartphone.
- the user (1 12) visits a retail store at which he or she wishes to transact.
- the user launches an application on their smartphone which interact with functional capabilities of the smartphone to carry out the described method.
- the smartphone may capture information relating to a selected product by means of scanning (510) a product information tag.
- the product information tag is also the security tag on the product.
- the product information tag may alternatively be a separate two-dimensional of three- dimensional bar code, such a QR code.
- Such other codes may be scanned with, for example, a camera of the mobile device, a Bluetooth component, or a radio frequency identification (RFID) component of the mobile device, depending on the type of product information tag that is employed.
- RFID radio frequency identification
- Scanning of an NFC security tag is performed by the user bringing their NFC- enabled smartphone in close proximity to the tag, with the smartphone reading data from the tag.
- the read data received may include unique identification details of the product including a unique product identifier, as well as optionally other details relating to the product, for example, regarding the retail store in which the product is located.
- the smartphone transmits (520), to the product server (1 16), either a request for further information regarding the selected product or a notification of intent to purchase the product and includes the unique product identifier.
- the server retrieves the requested data from the database (1 18) associated therewith, and transmits this information back to the smartphone, which receives (530) the data. If additional information has been requested, the user is able to study details of the watch, for example its unique features, warranty details, price, or the like.
- a user indicates that they wish to purchase the product
- payment is facilitated (540) by means of a payment request, including payment credentials associated with the user and a unique identifier of the mobile device, transmitted to a remote payment server (1 14) of a financial institution.
- the unique identifier of the mobile device may allow the payment credentials to be checked for conformity to the mobile device, as may have been previously allowed, or it may allow the transaction to be traced back to the mobile device if required.
- the payment request may include at least a part of the unique details of the product, including the price and the product identifier.
- the financial institution may indicate this fact to the product server (1 16) in a payment processed message including the product identifier provided by the user in the payment transaction. Alternatively, this may be done via the mobile device with the user receiving a payment confirmation and forwarding this to the product server together with the product identifier.
- the product server (1 16) may then retrieve a deactivation code, in the present embodiment a serial number corresponding to the product identifier, from the database (1 18) and transmits this to the smartphone.
- Security tags in some embodiments may have a "kill command" which is activated when an appropriate serial code is received. This serial number is transmitted as the deactivation code.
- the smartphone receives (550) the deactivation code, and is prompted to deactivate the tag of the product which he or she has just paid for.
- the deactivation serial number is transmitted to the tag. If the serial code matches the "kill command", the tag is deactivated (560). Deactivation of the NFC tag may occur by deactivating the tag completely, rendering it unusable, or it may occur by the tag being configured to transmit an "inactive" code to the detection system when scanned. The user is then able to take the product with the tag thereon with him or her, and move into and through the detection zone of the detection system without activating the alarm.
- the method described above may at least partially alleviate some of the abovementioned problems with current self-checkout systems.
- a user does not need to present an electronic slip to a store assistant. Any user walking through a detection area of a detection zone without activating the alarm may be assumed to have paid for the products in their possession.
- the mobile device may include an extracting component to extract the required information from the product.
- the details obtained from the product information tag may be transmitted to the remote product server, where the product may be extracted from the code by means of an extracting component of the server.
- the type of security tag used may be any suitable EAS-type tag including, but not limited to, magnetic, acousto-magnetic, microwave, and radio frequency.
- a tag is configured to deactivate when receiving a deactivation code in the form of a specific frequency, and the smartphone receives the deactivation frequency from the product server. By transmitting the correct frequency near the tag, the tag will be disabled, and the product with the tag can be removed from the store without activating a security alarm.
- the tag is configured to deactivate upon receiving a deactivation code in the form of a serial number.
- FIG. 6 shows a second embodiment of a method (600) in which the mobile device (1 10) is a handheld POS device and in which a number of products can be deactivated before payment is processed.
- a user may insert (610) a payment card into the POS device, which reads the required payment credentials from the card.
- the POS device may request (620) a PIN code in a next step, and, if the PIN code is correct, the POS device may enter a scanning mode in which product tags may be scanned.
- the payment card in this embodiment may have a limited amount which it is allowed to spend.
- the limit may be set up on a month-by month, week-by-week, day-by-day, or on a per-retailer basis.
- the user may then scan (630) a security tag of a product that they wish to purchase, and the POS device may receive product details. Product details may be displayed on the POS device.
- a user may indicate (640) on the POS device that they wish to purchase the specific product and a total amount of the current purchase is calculated.
- the POS device may retrieve (650) a deactivation code from its memory and may deactivate the product in an appropriate manner.
- a POS device is associated with a specific retail store, and may have a database associated therewith which contains the deactivation codes of products in the store.
- the deactivation codes may be stored on the POS device and only released upon confirmation of a payment transaction for the identified product.
- the deactivation codes may be stored on a product server and communicated to the POS device when a payment confirmation for one or more selected products is received by the product server.
- payment may be processed automatically when the appropriate limit has been reached. Alternatively, payment may be processed when a user removes their card from the POS device, or when a user indicates that they are done shopping in the particular retail store. The POS device will typically request, from the financial institution, the appropriate limit before entering the scanning mode. This limit may be an amount available in an account of the user. Alternatively, a user may be prompted what the maximum amount is that they wish to spend.
- each item may be processed for payment individually using the POS device with each deactivation code being received or retrieved at the POS device upon confirmation of the payment for the selected product. This may be particularly relevant for high value products where only a small number of products is being purchased.
- the system may be configured such that the step of facilitating payment for the product is a pre-authorization of payment for the selected product in order to reserve funds for the selected product.
- the security tag may be deactivated for a predetermined amount of time, allowing a user to test out the product. If the product is returned after testing, the reserved funds may be released back to the user. If the product is not returned, or the user confirms that they wish to purchase the product, final transfer of the reserved funds may be processed to a merchant of the product.
- This embodiment may be applied in conjunction with any of the previously described embodiments.
- a product information or security tag may be scanned (710) to obtain identification information of a selected product.
- An option may be selected (720) by the user on the mobile device to temporarily deactivate the security tag on the selected product. This may be applicable when a user wishes to sample the product.
- a security tag may be part of a lock in the clothing preventing removal of the clothing from a rack or may include a wire preventing wearing of the clothing.
- a temporary deactivation of the tag may be provide in order to try the clothing on.
- the mobile device may facilitate (730) a pre-authorization of funds against his payment credentials by communication with the payment server. An expiry time on the pre- authorization may be applied within which the pre-authorization may be cancelled.
- a temporary deactivation code may be received (740) at the mobile device as in the previous embodiments this may be from a product server.
- the temporary deactivation code may deactivate (750) the security tag when transmitted from the mobile device.
- the deactivation of the security tag has a time limit after which it will reactivate.
- a user may select to cancel (760) the payment transaction within the time limit if they do not wish to proceed with the purchase. If no action is taken, the purchase may be automatically confirmed and the reserved funds deducted from the user's account. Alternatively, a positive confirmation may be provided by the user for the purchase which may be earlier than the time limit.
- any mobile device may be suitable for use, for example a feature phone, PDA, tablet PC, or the like.
- product deactivation codes may also be stored on a server associated with a specific retailer.
- the mobile device may then communicate with this server to obtain deactivation codes. Additionally, payment may be processed by means of this server as well.
- the product server and database may also be associated with and located at a specific retailer, with deactivation codes only shared with mobile devices transacting in the specific store. It is envisaged that communication with such a type of server may occur over a Wi-Fi communications channel.
- a handheld POS may be configured to communicate exclusively with a retailer-specific server over the retailer's Wi-Fi network dedicated for POS devices.
- an application operating on a user's mobile device may be configured to only communicate over dedicated local communication networks associated with approved retailers.
- a user scans products at a self-checkout counter, processes payment therefore on their mobile device, and disables the security tags on the purchased products using their mobile device.
- FIG. 8 A swim-lane flow diagram of the method of such a fourth embodiment is shown in FIG. 8 with steps carried out at a mobile device (1 10) and a POS device (800).
- a user retrieves products that they wish to purchase in a store, and takes the products to a self-checkout counter. At the counter, the user scans (810) identification tags, typically barcodes, of the products using a POS device provided at the self-checkout counter. The user is presented (820) with an indication of the total cost of the purchase. [0109] The user may then process (830) payment therefore using their mobile device. Payment may be processed via a mobile wallet, or by transmitting payment credentials on the mobile device to an acquiring financial institution.
- the POS device When payment has been successfully processed, the POS device receives an indication thereof and may transmit (840) the required deactivation codes to the mobile device of the user. The user may then deactivate (850) the security tags of the products using their mobile device as described above.
- the security tags may be modifiable by the POS device. Upon scanning the products, all tags of products being scanned at the time may be configured such that they share a single deactivation key. Once payment for the scanned articles have been processed, the POS device may provide the user with a single deactivation code that may be used to deactivate all of the products.
- FIG. 9 illustrates an example of a computing device (900) in which various aspects of the disclosure may be implemented.
- the computing device (900) may be suitable for storing and executing computer program code.
- the various participants and elements in the previously described system diagrams may use any suitable number of subsystems or components of the computing device (900) to facilitate the functions described herein.
- the computing device (900) may include subsystems or components interconnected via a communication infrastructure (905) (for example, a communications bus, a cross-over bar device, or a network).
- the computing device (900) may include at least one central processor (910) and at least one memory component in the form of computer- readable media.
- the memory components may include system memory (915), which may include read only memory (ROM) and random access memory (RAM).
- ROM read only memory
- RAM random access memory
- a basic input/output system (BIOS) may be stored in ROM.
- System software may be stored in the system memory (915) including operating system software.
- the memory components may also include secondary memory (920).
- the secondary memory (920) may include a fixed disk (921 ), such as a hard disk drive, and, optionally, one or more removable-storage interfaces (922) for removable-storage components (923).
- the removable-storage interfaces (922) may be in the form of removable- storage drives (for example, magnetic tape drives, optical disk drives, floppy disk drives, etc.) for corresponding removable storage-components (for example, a magnetic tape, an optical disk, a floppy disk, etc.), which may be written to and read by the removable-storage drive.
- removable- storage drives for example, magnetic tape drives, optical disk drives, floppy disk drives, etc.
- removable storage-components for example, a magnetic tape, an optical disk, a floppy disk, etc.
- the removable-storage interfaces (922) may also be in the form of ports or sockets for interfacing with other forms of removable-storage components (923) such as a flash memory drive, external hard drive, or removable memory chip, etc.
- the computing device (900) may include an external communications interface (930) for operation of the computing device (900) in a networked environment enabling transfer of data between multiple computing devices (900). Data transferred via the external communications interface (930) may be in the form of signals, which may be electronic, electromagnetic, optical, radio, or other types of signal.
- the external communications interface (930) may enable communication of data between the computing device (900) and other computing devices including servers and external storage facilities. Web services may be accessible by the computing device (900) via the communications interface (930).
- the external communications interface (930) may also enable other forms of communication to and from the computing device (900) including, voice communication, near field communication, Bluetooth, etc.
- the computer-readable media in the form of the various memory components may provide storage of computer-executable instructions, data structures, program modules, and other data.
- a computer program product may be provided by a computer-readable medium having stored computer-readable program code executable by the central processor (910).
- a computer program product may be provided by a non-transient computer- readable medium, or may be provided via a signal or other transient means via the communications interface (930).
- Interconnection via the communication infrastructure allows a central processor (910) to communicate with each subsystem or component and to control the execution of instructions from the memory components, as well as the exchange of information between subsystems or components.
- Peripherals such as printers, scanners, cameras, or the like
- input/output
- I/O devices such as a mouse, touchpad, keyboard, microphone, joystick, or the like
- I/O controller 935
- These components may be connected to the computing device (900) by any number of means known in the art, such as a serial port.
- One or more monitors may be coupled via a display or video adapter
- FIG. 10 shows a block diagram of a communication device (1000) that may be used in embodiments of the disclosure.
- the communication device (1000) may be a cell phone, a feature phone, a smart phone, a satellite phone, or a computing device having a phone capability.
- the communication device (1000) may include a processor (1005) (e.g., a microprocessor) for processing the functions of the communication device (1000) and a display (1020) to allow a user to see the phone numbers and other information and messages.
- the communication device (1000) may further include an input element (1025) to allow a user to input information into the device (e.g., input buttons, touch screen, etc.), a speaker (1030) to allow the user to hear voice communication, music, etc., and a microphone (1035) to allow the user to transmit his or her voice through the communication device (1000).
- the processor (1010) of the communication device (1000) may connect to a memory (1015).
- the memory (1015) may be in the form of a computer-readable medium that stores data and, optionally, computer-executable instructions.
- the communication device (1000) may also include a communication element
- the communication element (1040) for connection to communication channels (e.g., a cellular telephone network, data transmission network, Wi-Fi network, satellite-phone network, Internet network, Satellite Internet Network, etc.).
- the communication element (1040) may include an associated wireless transfer element, such as an antenna.
- the communication element (1040) may include a subscriber identity module
- SIM in the form of an integrated circuit that stores an international mobile subscriber identity and the related key used to identify and authenticate a subscriber using the communication device (1000).
- One or more subscriber identity modules may be removable from the communication device (1000) or embedded in the communication device (1000).
- the communication device (1000) may further include a contactless element
- the contactless element (1050) which is typically implemented in the form of a semiconductor chip (or other data storage element) with an associated wireless transfer element, such as an antenna.
- the contactless element (1050) may be associated with (e.g., embedded within) the communication device (1000) and data or control instructions transmitted via a cellular network may be applied to the contactless element (1050) by means of a contactless element interface (not shown).
- the contactless element interface may function to permit the exchange of data and/or control instructions between mobile device circuitry (and hence the cellular network) and the contactless element (1050).
- the contactless element (1050) may be capable of transferring and receiving data using a near field communications (NFC) capability (or near field communications medium) typically in accordance with a standardized protocol or data transfer mechanism (e.g., ISO 14443/NFC).
- NFC near field communications
- Near field communications capability is a short-range communications capability, such as radio-frequency identification (RFID), Bluetooth, infrared, or other data transfer capability that can be used to exchange data between the communication device (1000) and an interrogation device.
- RFID radio-frequency identification
- Bluetooth infrared
- the communication device (1000) may be capable of communicating and transferring data and/or control instructions via both a cellular network and near field communications capability.
- the data stored in the memory (1015) may include: operation data relating to the operation of the communication device (1000), personal data (e.g., name, date of birth, identification number, etc.), financial data (e.g., bank account information, a bank identification number (BIN), credit or debit card number information, account balance information, expiration date, loyalty provider account numbers, etc.), transit information (e.g., as in a subway or train pass), access information (e.g., as in access badges), etc.
- a user may transmit this data from the communication device (1000) to selected receivers.
- the communication device (1000) may be, amongst other things, a notification device that can receive alert messages and access reports, a portable merchant device that can be used to transmit control data identifying a discount to be applied, as well as a portable consumer device that can be used to make payments.
- the software code may be stored as a series of instructions, or commands on a non-transitory computer-readable medium, such as a random access memory (RAM), a read-only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM.
- a non-transitory computer-readable medium such as a random access memory (RAM), a read-only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM.
- RAM random access memory
- ROM read-only memory
- magnetic medium such as a hard-drive or a floppy disk
- optical medium such as a CD-ROM.
- Any such computer- readable medium may also reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.
- any of the steps, operations, or processes described herein may be performed or implemented with one or more hardware or software modules, alone or in combination with other devices.
- a software module is implemented with a computer program product comprising a non-transient computer-readable medium containing computer program code, which can be executed by a computer processor for performing any or all of the steps, operations, or processes described.
- the language used in the specification has been principally selected for readability and instructional purposes, and it may not have been selected to delineate or circumscribe the inventive subject matter. It is therefore intended that the scope of the invention be limited not by this detailed description, but rather by any claims that issue on an application based hereon. Accordingly, the disclosure of the embodiments of the invention is intended to be illustrative, but not limiting, of the scope of the invention, which is set forth in the following claims.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Electromagnetism (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Automation & Control Theory (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Cash Registers Or Receiving Machines (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
L'invention concerne un système et un procédé de désactivation d'une étiquette de sécurité. Le procédé est mis en œuvre sur un dispositif mobile et comprend les étapes consistant à : faciliter le paiement pour un produit sélectionné, à l'aide du dispositif mobile ; recevoir un code de désactivation correspondant au produit sélectionné en provenance d'un serveur de produit, ou permettre d'accéder audit code de désactivation ; et désactiver une étiquette de sécurité du produit sélectionné, au moyen d'une communication de proximité sans fil transmettant le code de désactivation du dispositif mobile à l'étiquette de sécurité.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
ZA201401125 | 2014-02-14 | ||
ZA2014/01125 | 2014-02-14 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015121833A1 true WO2015121833A1 (fr) | 2015-08-20 |
Family
ID=53799648
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2015/051080 WO2015121833A1 (fr) | 2014-02-14 | 2015-02-13 | Désactivation d'étiquette de sécurité |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2015121833A1 (fr) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2530855A (en) * | 2014-07-23 | 2016-04-06 | Aprium Tech Ltd | Security tag |
WO2017031217A1 (fr) * | 2015-08-17 | 2017-02-23 | Tyco Fire & Security Gmbh | Étiquette de sécurité et son procédé d'utilisation pour faciliter le retrait autorisé d'articles d'inventaire de zones contrôlées |
GB2548992A (en) * | 2016-03-31 | 2017-10-04 | Aprium Tech Ltd | Security system for a retail environment |
US20200118110A1 (en) * | 2018-10-16 | 2020-04-16 | American Express Travel Related Services Company, Inc. | Secure mobile checkout system |
EP3649597A4 (fr) * | 2017-07-07 | 2020-06-03 | Visa International Service Association | Système et procédé pour achever des transactions en magasin au moyen d'un dispositif informatique mobile |
US10701561B1 (en) | 2020-01-31 | 2020-06-30 | Lowe's Companies, Inc. | System and techniques for secret key transfer in benefit denial system |
US10721224B1 (en) | 2020-01-31 | 2020-07-21 | Lowe's Companies, Inc. | System and techniques for trans-account device key transfer in benefit denial system |
US10755330B1 (en) | 2017-04-19 | 2020-08-25 | Payray Inc. | Geo detection systems and methods |
US11030870B2 (en) * | 2019-06-07 | 2021-06-08 | Sensormatic Electronics, LLC | System and method for trigger security tag deactivation using mobile device |
US11395142B2 (en) | 2020-01-31 | 2022-07-19 | Lowe's Companies, Inc. | System and techniques for secret key transfer in benefit denial system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6169483B1 (en) * | 1999-05-04 | 2001-01-02 | Sensormatic Electronics Corporation | Self-checkout/self-check-in RFID and electronics article surveillance system |
US20030075602A1 (en) * | 2001-10-23 | 2003-04-24 | Ncr Corporation | Automatic electronic article surveillance for self-checkout |
US20100082444A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Portable point of purchase user interfaces |
US20130080279A1 (en) * | 2005-04-07 | 2013-03-28 | Freedom Shopping, Inc. | Self checkout kiosk and retail security system |
US20130110657A1 (en) * | 2011-11-02 | 2013-05-02 | Avery Dennison Corporation | Distributed point of sale, electronic article surveillance, and product information system, apparatus and method |
-
2015
- 2015-02-13 WO PCT/IB2015/051080 patent/WO2015121833A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6169483B1 (en) * | 1999-05-04 | 2001-01-02 | Sensormatic Electronics Corporation | Self-checkout/self-check-in RFID and electronics article surveillance system |
US20030075602A1 (en) * | 2001-10-23 | 2003-04-24 | Ncr Corporation | Automatic electronic article surveillance for self-checkout |
US20130080279A1 (en) * | 2005-04-07 | 2013-03-28 | Freedom Shopping, Inc. | Self checkout kiosk and retail security system |
US20100082444A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | Portable point of purchase user interfaces |
US20130110657A1 (en) * | 2011-11-02 | 2013-05-02 | Avery Dennison Corporation | Distributed point of sale, electronic article surveillance, and product information system, apparatus and method |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2530855A (en) * | 2014-07-23 | 2016-04-06 | Aprium Tech Ltd | Security tag |
WO2017031217A1 (fr) * | 2015-08-17 | 2017-02-23 | Tyco Fire & Security Gmbh | Étiquette de sécurité et son procédé d'utilisation pour faciliter le retrait autorisé d'articles d'inventaire de zones contrôlées |
GB2548992A (en) * | 2016-03-31 | 2017-10-04 | Aprium Tech Ltd | Security system for a retail environment |
US10755330B1 (en) | 2017-04-19 | 2020-08-25 | Payray Inc. | Geo detection systems and methods |
EP3649597A4 (fr) * | 2017-07-07 | 2020-06-03 | Visa International Service Association | Système et procédé pour achever des transactions en magasin au moyen d'un dispositif informatique mobile |
US11127068B2 (en) | 2017-07-07 | 2021-09-21 | Visa International Service Association | System and method for completing in-store transactions using a mobile computing device |
US11687907B2 (en) | 2018-10-16 | 2023-06-27 | American Express Travel Related Services Co., Inc. | Secure mobile checkout system |
US20200118110A1 (en) * | 2018-10-16 | 2020-04-16 | American Express Travel Related Services Company, Inc. | Secure mobile checkout system |
US12056681B2 (en) | 2018-10-16 | 2024-08-06 | American Express Travel Related Services Company, Inc. | Secure mobile checkout system |
US20230368175A1 (en) * | 2018-10-16 | 2023-11-16 | American Express Travel Related Services Company, Inc. | Secure mobile checkout system |
US11250411B2 (en) * | 2018-10-16 | 2022-02-15 | American Express Travel Related Services Company, Inc. | Secure mobile checkout system |
US20220138723A1 (en) * | 2018-10-16 | 2022-05-05 | American Express Travel Related Services Company, Inc. | Secure mobile checkout system |
US11030870B2 (en) * | 2019-06-07 | 2021-06-08 | Sensormatic Electronics, LLC | System and method for trigger security tag deactivation using mobile device |
US11395142B2 (en) | 2020-01-31 | 2022-07-19 | Lowe's Companies, Inc. | System and techniques for secret key transfer in benefit denial system |
US11381553B2 (en) | 2020-01-31 | 2022-07-05 | Lowe's Companies, Inc. | Systems and techniques for trans-account device key transfer in benefit denial system |
US10721224B1 (en) | 2020-01-31 | 2020-07-21 | Lowe's Companies, Inc. | System and techniques for trans-account device key transfer in benefit denial system |
US11831636B2 (en) | 2020-01-31 | 2023-11-28 | Lowe's Companies, Inc. | Systems and techniques for trans-account device key transfer in benefit denial system |
US10701561B1 (en) | 2020-01-31 | 2020-06-30 | Lowe's Companies, Inc. | System and techniques for secret key transfer in benefit denial system |
US12101310B2 (en) | 2020-01-31 | 2024-09-24 | Lowe's Companies, Inc. | Systems and techniques for trans-account device key transfer in benefit denial system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015121833A1 (fr) | Désactivation d'étiquette de sécurité | |
EP3308366B1 (fr) | Étiquette magnétique d'alerte intelligente | |
US8963717B2 (en) | Mobile device initiated retail transaction using wireless communication for security tag detachment | |
EP3265978B1 (fr) | Dispositif d'affichage à réalité augmentée activée par authentification | |
US9460597B1 (en) | Systems and methods for security tag detachment or deactivation authorization | |
US20170169435A1 (en) | Method and system for authorizing a transaction | |
US9552710B2 (en) | Systems and methods for customer deactivation of security elements | |
KR101161778B1 (ko) | Nfc를 이용한 pos 결제 시스템 | |
CN106104645B (zh) | 用于安全元件的顾客去激活的系统和方法 | |
JP2014513825A5 (fr) | ||
JP2014513825A (ja) | 安全な2者照合取引システム | |
US10930104B2 (en) | Systems and methods for actuating an electronic lock upon payment for delivery services | |
US11526684B2 (en) | Methods and apparatuses for removing a security tag | |
US20200097942A1 (en) | System and method for loading prepaid card with funds using a mobile device | |
US20180060863A1 (en) | Method and system for payment status verification | |
Ahuja | Mobile payments for conducting M-Commerce | |
US11232443B2 (en) | Systems and methods for payment for delivery services | |
US20240211924A1 (en) | Portable device-based transaction | |
CN113508424B (zh) | 店铺装置、店铺系统、结账方法以及程序 | |
KR100809941B1 (ko) | 정보 처리방법 및 시스템과 정보 처리장치와 프로그램기록매체 | |
JP2023166811A (ja) | 情報処理方法、情報処理装置、及びコンピュータプログラム | |
Nair et al. | M-Commerce Using NFC Tags | |
KR20200110833A (ko) | 인증 처리 시스템 및 그 제어방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15748735 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15748735 Country of ref document: EP Kind code of ref document: A1 |