Methods and system for identifying lost or stolen RFID devices
0 Assignments
0 Petitions
Accused Products
Abstract
A system for identifying a lost or stolen device includes a transmitter, a receiver and a computer. The transmitter is coupled to the device and transmits identification information. The receiver receives the identification information transmitted by the transmitter when the transmitter is within a defined distance from the receiver. The computer is coupled to the receiver so as to receive the information from the receiver. The computer has a first secure database which stores data associated with lost or stolen devices and which prevents unauthorized access to the data stored therein. The computer compares the information with the stored data, and generates an alarm if the information matches at least some of the stored data.
-
Citations
21 Claims
-
1. (canceled)
-
2. A method for identifying a lost or stolen radio frequency (RF) device, the method comprising:
-
receiving a report for a lost or stolen RF device, said lost or stolen RF device having a unique identifier associated therewith; causing the storing of information associated with the report in a secure database, the stored information being useful for the comparison of a received unique identifier to the information stored in the secure database, the received unique identifier obtained via the transmission of an interrogation signal by at least one reader to an RF device associated with the received unique identifier; causing the determination that a received unique identifier by the at least one reader is associated with the lost or stolen device; and causing the notification of the lost or stolen device to personnel associated with the operation of the at least one reader. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for identifying a lost or stolen radio frequency (RF) device, the system comprising:
-
an interrogation device configured to transmit an interrogation signal and in response thereto, receive one or more replies from an RF device; a computing device in communication with the interrogation device and configured to facilitate operation of the interrogation device, the computing device further comprising a network interface in operative communication with a secure database via a network; wherein the computing device is further configured to; cause the interrogation device to transmit a first interrogation signal; receive information associated with one or more replies received from a lost or stolen RF device in response to the transmitted first interrogation signal; transmit the received information to the secure database; receive a message from the secure database that the lost or stolen RF device is in fact lost or stolen; and cause the display of a notification to a display device that the lost or stolen RF device is lost or stolen. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for locating a lost or stolen device, the method comprising:
-
receiving a report of a lost or stolen device, the device having transmitter circuitry attached thereto or therein; causing data associated with the report of the lost or stolen device to be stored into a secure database; causing the receipt of a unique identifier via the transmission of an interrogation signal; causing the authentication of the interrogation signal using the transmitter circuitry of at least one detected device; and comparing the received unique identifier with the data stored in the secure database to locate the lost or stolen device. - View Dependent Claims (21)
-
Specification