System and method for identifying objects of value
First Claim
1. A system for identifying an object of value during security assessment, comprising:
- an identification tag affixed to said object of value, said identification tag storing identification information uniquely identifying said object of value;
an interrogator having a sensing antenna and electronic detection circuitry for exciting and reading back said identification information from said identification tag; and
a data processing system, including;
a server;
a data store coupled to said server; and
a communication network coupling said server and said interrogator;
wherein when said interrogator transmits said identification information to said server, said server accesses said data store, retrieves information of interest to personnel performing said security assessment and transmits said information of interest to said interrogator for review by said personnel.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method are presented for identifying an object of value during a security assessment. The system includes an identification tag affixed to the object of value, an interrogator, and a data processing system. The identification tag stores information uniquely identifying the object of value. The interrogator includes a sensing antenna and electronic detection circuitry for exciting and reading back the identification information from the identification tag. The interrogator also includes a transmitter and a receiver. The data processing system includes a server, a data store coupled to the server, and a communication network coupling the server and the interrogator. When the interrogator transmits the identification information to the server, the server, in real-time, accesses the data store, retrieves information of interest to personnel performing the security assessment and transmits the information of interest to the interrogator for review by the personnel.
21 Citations
16 Claims
-
1. A system for identifying an object of value during security assessment, comprising:
-
an identification tag affixed to said object of value, said identification tag storing identification information uniquely identifying said object of value;
an interrogator having a sensing antenna and electronic detection circuitry for exciting and reading back said identification information from said identification tag; and
a data processing system, including;
a server;
a data store coupled to said server; and
a communication network coupling said server and said interrogator;
wherein when said interrogator transmits said identification information to said server, said server accesses said data store, retrieves information of interest to personnel performing said security assessment and transmits said information of interest to said interrogator for review by said personnel. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for identifying an object of value during security assessment, comprising:
-
an identification tag affixed to said object of value, said identification tag storing identification information uniquely identifying said object of value;
a scanner having circuitry for optically reading said identification information from said identification tag and a transmitter for transmitting said identification information;
a control center operatively coupled to said scanner for receiving said identification information transmitted therefrom; and
a data processing system, including;
a server;
a data store coupled to said server; and
a communication network coupling said server and said control center;
wherein when said control center transmits said identification information to said server, said server accesses said data store, retrieves information of interest to personnel performing said security assessment and transmits said information of interest to said control center for review by said personnel. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A method for providing information of interest to personnel conducting a security assessment of a vehicle, the method comprising:
-
querying an identification tag affixed to said vehicle using a portable device, said identification tag storing identification information uniquely identifying said vehicle;
receiving said identification information at said portable device in response to said querying;
transmitting said identification information from said portable device to a data processing system, said data processing system including;
a server, and a data store coupled to said server;
wherein when said portable device transmits said identification information to said data processing system, said server accesses said data store, retrieves information of interest to personnel performing said security assessment and transmits said information of interest to said portable device for review by said personnel. - View Dependent Claims (13, 14, 15, 16)
-
Specification