CONCEPTS FOR ASSET IDENTIFICATION
First Claim
Patent Images
1. A method for identifying a mobile asset, the method comprising:
- transmitting, via one or more processors, a request to be received by a radio frequency identification (RFID) tag within a read range, the RFID tag affixed to a mobile asset;
after transmitting the request to be received by the RFID tag within the read range, receiving, via the one or more processors, a response from the RFID tag, the response comprising a mobile asset identifier that uniquely identifies the mobile asset;
determining, via the one or more processors, whether the mobile asset is authorized for one or more activities, the determination based at least in part on the mobile asset identifier; and
after a determination that the mobile asset is authorized for the one or more activities, generating, via the one or more processors, an instruction to one or more perceivable indicators to initiate a perceivable indication that the mobile asset is authorized for the one or more activities.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, apparatus, and computer program products are provided for identifying assets (e.g., mobile assets and/or personnel assets). In one embodiment, a mobile asset can be uniquely identified from RFID tags. In another embodiment, mobile assets and personnel assets can be identified from captured image data. After identification, it can be determined whether the asset (e.g., mobile asset and/or personnel asset) is authorized for one or more activities and a corresponding perceivable indication can be generated.
-
Citations
18 Claims
-
1. A method for identifying a mobile asset, the method comprising:
-
transmitting, via one or more processors, a request to be received by a radio frequency identification (RFID) tag within a read range, the RFID tag affixed to a mobile asset; after transmitting the request to be received by the RFID tag within the read range, receiving, via the one or more processors, a response from the RFID tag, the response comprising a mobile asset identifier that uniquely identifies the mobile asset; determining, via the one or more processors, whether the mobile asset is authorized for one or more activities, the determination based at least in part on the mobile asset identifier; and after a determination that the mobile asset is authorized for the one or more activities, generating, via the one or more processors, an instruction to one or more perceivable indicators to initiate a perceivable indication that the mobile asset is authorized for the one or more activities. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus comprising at least one processor and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the processor, cause the apparatus to at least:
-
transmit a request to be received by a radio frequency identification (RFID) tag within a read range, the RFID tag affixed to a mobile asset; after transmitting the request to be received by the RFID tag within the read range, receive a response from the RFID tag, the response comprising a mobile asset identifier that uniquely identifies the mobile asset; determine whether the mobile asset is authorized for one or more activities, the determination based at least in part on the mobile asset identifier; and after a determination that the mobile asset is authorized for the one or more activities, generate an instruction to one or more perceivable indicators to initiate a perceivable indication that the mobile asset is authorized for the one or more activities. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product for identifying a mobile asset, the computer program product comprising at least one non-transitory computer-readable storage medium having computer-readable program code portions stored therein, the computer-readable program code portions comprising:
-
an executable portion configured to transmit a request to be received by a radio frequency identification (RFID) tag within a read range, the RFID tag affixed to a mobile asset; an executable portion configured to, after transmitting the request to be received by the RFID tag within the read range, receive a response from the RFID tag, the response comprising a mobile asset identifier that uniquely identifies the mobile asset; an executable portion configured to determine whether the mobile asset is authorized for one or more activities, the determination based at least in part on the mobile asset identifier; and an executable portion configured to, after a determination that the mobile asset is authorized for the one or more activities, generate an instruction to one or more perceivable indicators to initiate a perceivable indication that the mobile asset is authorized for the one or more activities. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification