Use of rfid tags and readers to automate real time alert signals in a security system
First Claim
1. A radio frequency identification (RFID) based security system comprising:
- at least one sub-system;
at least one check point with at least one RFID tag; and
at least one central computer with wireless communications means;
wherein said at least one sub-system further comprises;
at least one security appliance with at least one RFID tag;
at least one reader device associated with said at least one security appliance; and
at least one mobile device acting as a radio frequency link for said at least one security appliance and said at least one reader device.
1 Assignment
0 Petitions
Accused Products
Abstract
A security system for automatically transmitting alert signals when a security appliance such as a firearm (110) carried by a security officer is drawn from its holster (130), and the method of enabling such a function under the present invention is described. The present invention makes use of radio frequency identification tags (eg 120, 134) and readers (eg 136, 186) to trigger these automatic alerts. The present invention also uses s locator function associated with a mobile device to automatically direct aid to the officer in danger. The present invention also encompasses a method of conducting security guard patrols that monitors the progress of the security guard in real time as he logs each checkpoint of the tour, through the use of RFID tags and readers.
-
Citations
21 Claims
-
1. A radio frequency identification (RFID) based security system comprising:
-
at least one sub-system;
at least one check point with at least one RFID tag; and
at least one central computer with wireless communications means;
wherein said at least one sub-system further comprises;
at least one security appliance with at least one RFID tag;
at least one reader device associated with said at least one security appliance; and
at least one mobile device acting as a radio frequency link for said at least one security appliance and said at least one reader device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of monitoring status of a security appliance carried by a security officer through the use of RFID tags, said method comprising:
-
polling, at regular intervals, at least one RFID tag associated with said at least one security appliance, by at least one reader device;
sending a signal from at least one reader device to said at least one mobile device when a response is not received from said at least one RFID tag polled; and
sending another signal from said at least one mobile device, thereby indicating status of said security appliance. - View Dependent Claims (10, 11, 12)
-
-
13. A method of conducting a security guard patrol tour using RFID tags in a security system, said method comprising:
-
a. verification of identity of security guard at start of tour;
b. registering of said security guard, list of security appliances and mobile device;
c. monitoring continually status of said security appliances and mobile device;
d. monitoring continually location of said guard;
e. logging of each check point visited;
f. determining, in real time, if said logging is valid;
g. transmitting, by said mobile device, logged checkpoints and other information to a communications network of a security system;
h. updating of information pertaining to tour to mobile device by a higher authority; and
i. repeating Step c until end of said tour. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
Specification