SYSTEM, METHOD, AND APPARATUS FOR IDENTIFYING AND AUTHENTICATING THE PRESENCE OF HIGH VALUE ASSETS AT REMOTE LOCATIONS
First Claim
Patent Images
1. A method for verifying compliance with a finance agreement between a first party and a second party, the finance agreement associated with an asset, the method comprising:
- affixing an identification tag to the asset associated with said finance agreement;
performing an audit of the asset by;
(a) reading said identification tag using a machine configured to read encrypted data from said identification tag,(b) sending audit information based on the encrypted data to the first party,(c) analyzing the audit information to determine whether the second party is complying with the finance agreement based on the audit information; and
wherein the step of analyzing the audit information is performed by a server programmed to analyze the audit information and determine whether the second party is complying or not complying with the finance agreement based on the audit information.
0 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and apparatus for identifying and authenticating the presence of high value assets at remote location includes associating an identification tag with the asset. The identification tag includes identification information that can be electronically read and sent to a remote location for verifying the authenticity of the asset.
73 Citations
20 Claims
-
1. A method for verifying compliance with a finance agreement between a first party and a second party, the finance agreement associated with an asset, the method comprising:
-
affixing an identification tag to the asset associated with said finance agreement; performing an audit of the asset by; (a) reading said identification tag using a machine configured to read encrypted data from said identification tag, (b) sending audit information based on the encrypted data to the first party, (c) analyzing the audit information to determine whether the second party is complying with the finance agreement based on the audit information; and wherein the step of analyzing the audit information is performed by a server programmed to analyze the audit information and determine whether the second party is complying or not complying with the finance agreement based on the audit information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 20)
-
-
16. A method for verifying compliance with a finance agreement between a first party and a second party, the finance agreement associated with an asset, the method comprising:
-
affixing an identification tag to the asset associated with said finance agreement, assigning an auditor to audit said asset, performing an audit of the asset, reading said identification tag using a machine configured to read encrypted data from said identification tag, said auditor sending audit information based on the encrypted data to the first party, analyzing the audit information to determine whether the second party is complying with the finance agreement based on the audit information; and wherein the step of analyzing the audit information is performed by a server programmed to analyze the audit information and determine whether the second party is complying or not complying with the finance agreement based on the audit information. - View Dependent Claims (17, 18, 19)
-
Specification