It All Starts With a Handheld Inventory Scanner

The Datascan self-scan solution is designed to have minimum impact on retailers’ IT infrastructure, requiring very little setup and network configuration. In order to maintain high availability and ensure optimum inventory efficiency, Datascan employs redundant server pools with automated failover and backup. Also, our scanners are able to communicate with our servers via wireless or wired network using a TCP connection. Adaptable technology results in a simpler inventory process for our retailers.

Datascan offers three connection options:


This is the fastest method of data upload as it is done instantly in the background as scanning is performed. This is only possible if there is an existing in-store? Wi-Fi network. Clients will still need to open the ports/IP ranges, as with the Ethernet connection, in order to connect as Wi-Fi does not support static IP only DHCP.


This method is faster than analog, and requires minimum network configuration.  Upload time is less than 30 seconds.


This is the least invasive method requiring only a cabled connection between a cradle (supplied by Datascan) and a phone/fax socket. Using this method, an upload takes 45 seconds regardless of how many Areas are being uploaded.

Independent 3G Network Connection

Datascan sends 3G wireless routers directly to stores for their physical inventory counts. Sufficient routers can be provided to enable store wide coverage and can be configured to use the best carrier service available in the area.

Datascan's Fit-for-Purpose scanner is designed with data security in mind.

Custom compiled Linux kernel

  • No TCP/IP for added security
  • Comm port only active during upload
  • No shell port available
  • Communicates over serial to WIFI

Embedded Serial -> Ethernet Module

  • No direct access to OS
  • Powered on only during communication
  • No open incoming ports
  • Uses common port numbers

Security protocols supported

  • WEP (not recommended)
  • WPA2-PSK
  • AES
  • TKIP

Future security protocols

  • WPA2 Enterprise
  • 802.1x
  • PEAP

Inventory data security

All inventory data sent from the scanner is encrypted in the same manner as the SSID, but a different key is used for added security. Endpoint server access requires login and verification.

SSID Information security

All SSID passphrases are encrypted with 128-bit AES, and the AES key is encrypted with a 1024-bit RSA public key. On the scanner, the AES key is decrypted using the RSA public key.

Want to learn how our adaptable solution can streamline your next count?