System for the assets identification and protection
1 Assignment
0 Petitions
Accused Products
Abstract
System of the assets identification Ond protection which is bound to marking Ond reverse identification of stolen things or lost transport means, things and animals by the means of electronic records, in order to determinate correctly the origin and the owner. It consists of protection elements (microdots and microchips bearing unique codes), registered in the database of protected property of the central register, which is connected to the terminals of authorized persons (clients with the access to the central register via Internet) and of the protection elements database of the central register, which is connected to the set of registered terminals places. Each terminal, in the set of terminals of authorized persons, is equipped by the readers of protection elements. Each terminal in the set of registration places is equipped by applicators of the protection elements. All protection elements, used in the identification sets and placed on registered protected property, are registered in the central register of the system for the assets identification and protection.
4 Citations
6 Claims
-
1-3. -3. (canceled)
-
4. A system for identifying and protecting assets, the system comprising:
-
a central register comprising;
an assets database configured to store registered assets; and
a protection elements database operatively connected to the assets database and configured to store a plurality of protection elements, wherein said protection elements comprise at least one of an encapsulated microchip and an identification microdot;
a plurality of registration terminals operatively connected to the protection elements database, each of said registration terminals configured to retrieve one or more protection elements from the protection elements database and to register a selected asset by applying the one or more retrieved protection elements to one or more locations associated with the selected asset; and
a plurality of verification terminals accessible by authorized personnel and operatively connected to the assets database, said verification terminals configured to search the assets database for an input protection element. - View Dependent Claims (5, 6)
-
Specification