System and method for validating physical-item security
First Claim
1. A method of validating physical-item security, the method comprising:
- obtaining, by a first computerized data acquisition equipment in a first area, data indicative of a measurement of a characteristic of a physical item in the first area, the characteristic being selected from the group consisting of a volume of the physical item, at least one dimension of the physical item, a weight of the physical item, and a density of the physical item;
obtaining, by a second computerized data acquisition equipment in a second area,data indicative of a measurement of the characteristic of the physical item in the second area, anddata indicative of a unique identifier of an identifying article associated with the physical item in the second area, andretrieving, by a processor, using at least the unique identifier, the measurement of the characteristic of the physical item in the first area;
determining, by the processor, a difference between the measurement of the characteristic of the physical item in the first area and the measurement of the characteristic of the physical item in the second area;
comparing, by the processor, the difference with a predetermined threshold, the predetermined threshold corresponding to a predefined variation in weight of the physical item; and
in response to the difference in the weight of the physical item being greater than the predetermined threshold, generating by the processor an indication of invalid security for the physical item in the second area.
1 Assignment
0 Petitions
Accused Products
Abstract
Validating security may include obtaining, by first computerized equipment in a first area, data indicative of a measurement of a characteristic of a physical item in the first area; obtaining, by second computerized equipment in a second area, data indicative of a measurement of the characteristic of a physical item in the second area, and data indicative of a unique identifier of the physical item in the second area; retrieving, by a processor, using the unique identifier, the measurement of the characteristic of the physical item in the first area; determining, by the processor, a difference between the measurement of the characteristic of the physical item in the first area and the measurement of the characteristic of the physical item in the second area; and providing, by the processor, if indicated by a comparison, an indication of invalid security for the physical item in the second area.
-
Citations
20 Claims
-
1. A method of validating physical-item security, the method comprising:
-
obtaining, by a first computerized data acquisition equipment in a first area, data indicative of a measurement of a characteristic of a physical item in the first area, the characteristic being selected from the group consisting of a volume of the physical item, at least one dimension of the physical item, a weight of the physical item, and a density of the physical item; obtaining, by a second computerized data acquisition equipment in a second area, data indicative of a measurement of the characteristic of the physical item in the second area, and data indicative of a unique identifier of an identifying article associated with the physical item in the second area, and retrieving, by a processor, using at least the unique identifier, the measurement of the characteristic of the physical item in the first area; determining, by the processor, a difference between the measurement of the characteristic of the physical item in the first area and the measurement of the characteristic of the physical item in the second area; comparing, by the processor, the difference with a predetermined threshold, the predetermined threshold corresponding to a predefined variation in weight of the physical item; and in response to the difference in the weight of the physical item being greater than the predetermined threshold, generating by the processor an indication of invalid security for the physical item in the second area. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of validating physical item security, the method comprising:
-
having access to a computer database comprising data indicative of first subject matter, the first subject matter being indicative of a volume of a physical item in a first area; obtaining, by a computerized data acquisition equipment in a second area, data indicative of second subject matter, the second subject matter being indicative of at least one characteristic of the physical item in a second area, and data indicative of a unique identifier of the physical item in the second area; retrieving, by a processor, from the computer database, using the unique identifier, the data indicative of the first subject matter; determining, by the processor, a difference between the first subject matter and the second subject matter; comparing, by the processor, the difference with a predetermined threshold, the predetermined threshold corresponds to an predefined variation in the volume of the physical item; and in response to the difference in volume of the physical item being greater than the predetermined threshold, providing by the processor an indication of invalid security for the physical item in the second area. - View Dependent Claims (14, 15, 16)
-
-
17. A system for validating physical item security, the system comprising:
-
a computer configured to communicate with a computer database comprising data indicative of first subject matter, the first subject matter being indicative of at least one characteristic of a physical item in a first area; and computerized data acquisition equipment configured to obtain data indicative of second subject matter, the second subject matter being indicative of at least one characteristic of a physical item in a second area, and obtain data indicative of a unique identifier of an identifying article with the physical item in the second area; wherein the computer is configured to retrieve, from the computer database, using the unique identifier, the data indicative of the first subject matter, determine a difference between the first subject matter and the second subject matter, compare, the difference with a predetermined threshold, wherein the predetermined threshold corresponds to an predefined variation in the at least one characteristic of the physical item; in response to the difference in the at least one characteristic of the physical item being greater than the predetermined threshold, providing an indication of invalid physical item security. - View Dependent Claims (18, 19, 20)
-
Specification