Object tracking method and system with object identification and verification
First Claim
1. In an object tracking and control methodology wherein objects to be tracked are dispensed from a central location for use and returned at the central location after use and wherein the objects are stored, dispensed, and returned in a security container bearing a readable identification code, the improvement comprising the steps of:
- (a) reading the identification code of a security container upon return of objects therein and identifying the security container based on its identification code;
(b) extracting information about the object contained within the security container;
(c) identifying the object in the security container based upon the extracted information and verifying that the object in the security container is the object that is expected to be in the security container based on the extracted information;
(d) taking appropriate remedial action if the object is determined in step (c) not to be the object that is expected to be in the security container; and
(e) storing the security container and the object therein at the central location if the object is determined in step (c) to be the object that is expected to be in the security container.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for tracking and controlling access to objects such as keys includes a lockable storage cabinet adapted to receive, store, and dispense objects within transparent security containers. A control computer is operably coupled to the cabinet. Information about objects, such as their weight, an image, or magnetic characteristics, is extracted by sensors when the objects within their containers are dispensed to a user or checked in by a user. This information is compared to a data base of the same information previously extracted for these objects. From the comparison, the connected control computer verifies that the objects present in the security container are the objects expected to be in the security container. If they are not, then theft or tampering is indicated and the computer takes remedial actions such as setting alarms or notifying security personnel.
-
Citations
30 Claims
-
1. In an object tracking and control methodology wherein objects to be tracked are dispensed from a central location for use and returned at the central location after use and wherein the objects are stored, dispensed, and returned in a security container bearing a readable identification code, the improvement comprising the steps of:
-
(a) reading the identification code of a security container upon return of objects therein and identifying the security container based on its identification code;
(b) extracting information about the object contained within the security container;
(c) identifying the object in the security container based upon the extracted information and verifying that the object in the security container is the object that is expected to be in the security container based on the extracted information;
(d) taking appropriate remedial action if the object is determined in step (c) not to be the object that is expected to be in the security container; and
(e) storing the security container and the object therein at the central location if the object is determined in step (c) to be the object that is expected to be in the security container. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An automated object tracking and control system for dispensing objects to authorized users for use and receiving the objects from the users and storing them following use, said object tracking and control system comprising:
-
a storage unit configured to dispense, receive, and store a plurality of objects;
a control computer including a user interface, said control computer coupled to said storage unit for controlling the dispensing, receipt, and storage of objects by the storage unit;
means in said storage unit for extracting predetermined information about objects as objects are dispensed from and returned to the storage unit by users and for conveying the extracted information to said control computer;
said control computer being programmed to determine if the extracted information about the objects corresponds to expected information about the objects and, based on said comparison, to identify the objects and verify that they are the objects that they are expected to be;
said control computer being further programmed to take appropriate remedial action if an object is determined not to be what it is expected to be. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method of dispensing, tracking, and controlling use of units of narcotics through an automated, computer controlled storage, tracking, control, and dispensing system, said method comprising the steps of:
-
(a) providing a plurality of security containers, each security container for containing a plurality of units of a narcotic;
(b) receiving a request from a user via the control computer for a desired number of units of a narcotic stored in the system;
(c) verifying that the user is authorized to received the requested narcotic and taking remedial action if the user is not so authorized;
(d) if the user is authorized, identifying the security container that contains the requested narcotic and retrieving the container from a storage location in the system;
(e) extracting predetermined information about the narcotic in the security container and storing the extracted information;
(f) dispensing the security container to the user;
(g) receiving the security container from the user after the user has removed units of the narcotic from the security container;
(h) extracting predetermined information about the narcotic remaining in the received security container;
(i) comparing the information extracted in step (h) to the information stored in step and verifying based upon the comparison that the narcotic remaining in the received security container is what is expected to be;
(j) taking remedial action if, in step (i) the narcotic remaining in the security container is not what it is expected to be; and
(k) if the narcotic in the security container is verified to be what it is expected to be in step (i), storing the security container until the narcotic is requested again by an authorized user. - View Dependent Claims (26, 27, 28, 29, 30)
-
Specification