Object tracking method and system with object identification and verification
First Claim
1. In an object tracking and control methodology wherein objects to be tracked are dispensed from a central location for use and returned at the central location after use and wherein the objects are stored, dispensed, and returned in a security container bearing a readable identification code, the improvement comprising the steps of:
- (a) reading the identification code of a security container upon return of objects therein and identifying the security container based on its identification code;
(b) extracting information about the object contained within the security container;
(c) identifying the object in the security container based upon the extracted information and verifying that the object in the security container is the object that is expected to be in the security container based on the extracted information;
(d) taking appropriate remedial action if the object is determined in step (c) not to be the object that is expected to be in the security container; and
(e) storing the security container and the object therein at the central location if the object is determined in step (c) to be the object that is expected to be in the security container.
4 Assignments
0 Petitions
Accused Products
Abstract
An improved system and methodology for tracking and controlling access to objects such as keys, narcotics, jewelry, and the like is provided. The system includes a storage unit in the form of a lockable cabinet for storing, dispensing, and receiving objects contained within security containers. A computer controller is coupled to the cabinet and includes a user interface. The methodology includes verifying that a user requesting an object from the system is authorized and, if so, retrieving the security container containing the requested object from its storage location within the cabinet. Information about the object or objects within the security container is extracted by the system and conveyed to the control computer, where it is stored, before the container is dispensed to the user. The extracted information may include the weight of the container and its objects, a digital image of the objects in the container, the density of objects in the container, the magnetic characteristics of the objects, or any other information by which the objects themselves can be identified. The container is then dispensed to the user. When the user returns the container and objects therein after use, information about the objects in the returned container is again extracted by the system and conveyed to the control computer. The control computer compares this information to the stored information extracted about the objects when the container was dispensed to the user. Based upon this comparison, the control computer verifies that the objects in the returned security container are the objects that are expected to be in the security container. If they are not, then theft or tampering is indicated and the computer takes remedial action such as setting alarms or identifying security personnel.
-
Citations
30 Claims
-
1. In an object tracking and control methodology wherein objects to be tracked are dispensed from a central location for use and returned at the central location after use and wherein the objects are stored, dispensed, and returned in a security container bearing a readable identification code, the improvement comprising the steps of:
-
(a) reading the identification code of a security container upon return of objects therein and identifying the security container based on its identification code;
(b) extracting information about the object contained within the security container;
(c) identifying the object in the security container based upon the extracted information and verifying that the object in the security container is the object that is expected to be in the security container based on the extracted information;
(d) taking appropriate remedial action if the object is determined in step (c) not to be the object that is expected to be in the security container; and
(e) storing the security container and the object therein at the central location if the object is determined in step (c) to be the object that is expected to be in the security container. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An automated object tracking and control system for dispensing objects to authorized users for use and receiving the objects from the users and storing them following use, said object tracking and control system comprising:
-
a storage unit configured to dispense, receive, and store a plurality of objects;
a control computer including a user interface, said control computer coupled to said storage unit for controlling the dispensing, receipt, and storage of objects by the storage unit;
means in said storage unit for extracting predetermined information about objects as objects are dispensed from and returned to the storage unit by users and for conveying the extracted information to said control computer;
said control computer being programmed to determine if the extracted information about the objects corresponds to expected information about the objects and, based on said comparison, to identify the objects and verify that they are the objects that they are expected to be;
said control computer being further programmed to take appropriate remedial action if an object is determined not to be what it is expected to be. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method of dispensing, tracking, and controlling use of units of narcotics through an automated, computer controlled storage, tracking, control, and dispensing system, said method comprising the steps of:
-
(a) providing a plurality of security containers, each security container for containing a plurality of units of a narcotic;
(b) receiving a request from a user via the control computer for a desired number of units of a narcotic stored in the system;
(c) verifying that the user is authorized to received the requested narcotic and taking remedial action if the user is not so authorized;
(d) if the user is authorized, identifying the security container that contains the requested narcotic and retrieving the container from a storage location in the system;
(e) extracting predetermined information about the narcotic in the security container and storing the extracted information;
(f) dispensing the security container to the user;
(g) receiving the security container from the user after the user has removed units of the narcotic from the security container;
(h) extracting predetermined information about the narcotic remaining in the received security container;
(i) comparing the information extracted in step (h) to the information stored in step and verifying based upon the comparison that the narcotic remaining in the received security container is what is expected to be;
(j) taking remedial action if, in step (i) the narcotic remaining in the security container is not what it is expected to be; and
(k) if the narcotic in the security container is verified to be what it is expected to be in step (i), storing the security container until the narcotic is requested again by an authorized user. - View Dependent Claims (26, 27, 28, 29, 30)
-
Specification