Abstract

Security systems and methods are provided. In one example, a security system includes a security device configured to protect one or more items from theft and an access control device configured to communicate with the security device. The security system also includes an electronic key configured to communicate with the access control device to determine if the electronic key is authorized to control the security device, wherein the access control device is configured to communicate with and operate the security device only if the electronic key is authorized.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

COinS