Wireless asset monitoring and security system using user identification tags
First Claim
1. An asset monitoring and security system, comprising:
- at least one asset assigned a unique identifier and operable to transmit an identification signal embodying the identifier over a wireless communications link;
at least one user identification device assigned a unique identifier and operable to transmit an identification signal embodying the identifier over a wireless communications link;
a data store for maintaining a list of the assets, a list of users authorized to use the assets, and privileges associated with the assets for each of the authorized users; and
a control unit adapted to receive identification signals from the assets and user identification devices and monitor positions of the assets and user identification devices within a defined area based on the identification signals from the assets and user identification devices, wherein the control unit communicates with the data store and is further operable to initiate an alarm event when privileges associated with a given authorized user for a given asset are exceeded.
1 Assignment
0 Petitions
Accused Products
Abstract
An asset monitoring and security system includes at least one asset and at least one user identification device assigned a unique identifier and operable to transmit an identification signal embodying the identifier over a wireless communications link. A data store maintains lists of the assets, users authorized to use the assets, and privileges associated with the assets for each of the authorized users. A control unit is adapted to receive identification signals from the assets and user identification devices and monitor positions of the assets and user identification devices within a defined area based on the identification signals. The control unit communicates with the data store and is further operable to initiate an alarm event when privileges associated with a given authorized user for a given asset are exceeded. Each of the assets includes a lock-out mechanism that impedes use of the asset when the lock-out mechanism is activated.
-
Citations
44 Claims
-
1. An asset monitoring and security system, comprising:
-
at least one asset assigned a unique identifier and operable to transmit an identification signal embodying the identifier over a wireless communications link;
at least one user identification device assigned a unique identifier and operable to transmit an identification signal embodying the identifier over a wireless communications link;
a data store for maintaining a list of the assets, a list of users authorized to use the assets, and privileges associated with the assets for each of the authorized users; and
a control unit adapted to receive identification signals from the assets and user identification devices and monitor positions of the assets and user identification devices within a defined area based on the identification signals from the assets and user identification devices, wherein the control unit communicates with the data store and is further operable to initiate an alarm event when privileges associated with a given authorized user for a given asset are exceeded. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A method for operating an asset monitoring and security system, comprising:
-
assigning a unique identifier to at least one asset;
transmitting an identification signal embodying the identifier of the asset over a wireless communications link;
assigning a unique identifier to at least one user identification device;
transmitting an identification signal embodying the identifier of the user identification device over a wireless communications link;
maintaining a list of the assets, a list of users authorized to use the assets, and privileges associated with the assets for each of the authorized users;
receiving the identification signals from the assets and user identification devices;
monitoring positions of the assets and user identification devices within a defined area based on the identification signals from the assets and user identification devices; and
associating a given asset with a given user when a user identification device of the user is within a predetermined distance of the asset. - View Dependent Claims (27, 28, 29, 30, 31, 32)
-
-
33. A method for operating an asset monitoring and security system, comprising:
-
assigning a unique identifier to at least one asset;
transmitting an identification signal embodying the identifier of the asset over a wireless communications link;
assigning a unique identifier to at least one user identification device;
transmitting an identification signal embodying the identifier of the user identification device over a wireless communications link;
maintaining a list of the assets, a list of users authorized to use the assets, and privileges associated with the assets for each of the authorized users;
receiving the identification signals from the assets and user identification devices;
monitoring positions of the assets and user identification devices within a defined area based on the identification signals from the assets and user identification devices;
associating a given asset with a given user when a user identification device of the user is within a first predetermined distance of the asset; and
initiating an alarm event when a user identification device of a user authorized to use the asset is not within a second predetermined distance of the asset. - View Dependent Claims (34, 35, 36, 37, 38)
-
-
39. A method for operating an asset monitoring and security system, comprising:
-
assigning a unique identifier to at least one asset;
transmitting an identification signal embodying the identifier of the asset over a wireless communications link;
assigning a unique identifier to at least one user identification device, wherein the user identification device includes an alarm indicator;
transmitting an identification signal embodying the identifier of the user identification device over a wireless communications link;
maintaining a list of the assets, a list of users authorized to use the assets, and privileges associated with the assets for each of the authorized users;
receiving the identification signals from the assets and user identification devices;
monitoring positions of the assets and user identification devices within a defined area based on the identification signals from the assets and user identification devices;
associating a given asset with a given user when a user identification device of the user is within a first predetermined distance of the asset; and
activating the alarm indicator in the user identification device when a distance between the user identification device and the asset associated with the user identification device is greater than a second predetermined distance. - View Dependent Claims (40, 41, 42, 43, 44)
-
Specification