METHOD AND APPARATUS FOR GENERATING AN INVENTORY AT A LOCATION IN RESPONSE TO AN EVENT
First Claim
Patent Images
1. A computer implemented method for handling security events, the computer implemented method comprising:
- responsive to detecting the occurrence of a security event at a location, gathering data from a plurality of radio frequency identifier tags present at the location through a set of radio frequency identifier tag readers located at the location to form tag data; and
sending the tag data to a remote location for processing.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer implemented method, apparatus, and computer usable program code for handling security events. Data is gathered from a plurality of radio frequency identifier tags present at the location through a set of radio frequency identifier tag readers located at the location to form tag data in response to detecting the occurrence of a security event at a location. The tag sends data to a remote location for processing.
11 Citations
20 Claims
-
1. A computer implemented method for handling security events, the computer implemented method comprising:
-
responsive to detecting the occurrence of a security event at a location, gathering data from a plurality of radio frequency identifier tags present at the location through a set of radio frequency identifier tag readers located at the location to form tag data; and sending the tag data to a remote location for processing. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus comprising:
-
a controller; a set of sensors located in a location, wherein the set of detection devices are connected to the controller and wherein the set of detection devices send an event detected by the set of detection devices to the controller; and a set of radio frequency identifier tag readers connected to the controller, wherein controller collects data from a plurality of radio frequency identifier tags associated with items present at the location through the set of radio frequency identifiers tag readers in response to receiving the event from the set of sensors and wherein the controller sends the event and the data collected from the a plurality of radio frequency identifier tags to a remote location for processing. - View Dependent Claims (9)
-
-
10. A computer program product comprising:
-
a computer usable medium having computer usable program code for handling security events, the computer implemented method comprising; computer usable program code, responsive to detecting the occurrence of a security event at a location, for gathering data from a plurality of radio frequency identifier tags present at the location through a set of radio frequency identifier tag readers located at the location to form tag data; and computer usable program code for sending the tag data to a remote location for processing. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A data processing system comprising:
-
a bus; a communications unit connected to the bus; a storage device connected to the bus, wherein the storage device includes a set of computer usable program code; and a processor unit connected to the bus, wherein the processor unit executes the computer usable program code to gather data from a plurality of radio frequency identifier tags present at a location through a set of radio frequency identifier tag readers located at the location to form tag data in response to detecting the occurrence of a security event at the location; and
send the tag data to a remote location for processing. - View Dependent Claims (18, 19, 20)
-
Specification