Method and system for identifying lost or stolen devices
First Claim
1. A method for identifying a lost or stolen device, the method comprising:
- receiving, with a first secure database, input identifying a plurality of devices that have been lost or stolen, wherein each of the plurality of lost or stolen devices is associated with a transmitter;
storing in a second database data identifying at least a portion of the plurality of lost or stolen devices, wherein the second database is in communication with the first secure database;
transmitting with at least one reader an interrogation signal to a transmitter of a detected device;
authenticating the interrogation signal;
receiving identifying information from the transmitter of the detected device with the at least one reader; and
comparing the identifying information of the detected device received by the at least one reader with the data stored in the database identifying at least a portion of the plurality of lost or stolen devices so as to locate at least one of the plurality of lost or stolen devices.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and system for identifying a lost or stolen device is disclosed herein. The system includes: a transmitter, coupled to said device, for transmitting identification information; a receiver for receiving the identification information transmitted by the transmitter, when the transmitter is within a defined distance from the receiver; and a computer, coupled to the receiver for receiving the information from the receiver, and having a database for storing data associated with lost or stolen devices; wherein the computer compares the information with the data, and generates an alarm if the information indicates that the device is lost or stolen. The method includes: receiving information transmitted by a radio frequency identification (RFID) device, coupled to an item, when the item comes within a defined range of a receiver which receives the information; storing data associated with lost or stolen goods in a database coupled to the receiver; comparing the information to the data and determining if the information matches the data associated with the lost or stolen goods; and generating an alarm, if the information matches the data.
104 Citations
45 Claims
-
1. A method for identifying a lost or stolen device, the method comprising:
-
receiving, with a first secure database, input identifying a plurality of devices that have been lost or stolen, wherein each of the plurality of lost or stolen devices is associated with a transmitter; storing in a second database data identifying at least a portion of the plurality of lost or stolen devices, wherein the second database is in communication with the first secure database; transmitting with at least one reader an interrogation signal to a transmitter of a detected device; authenticating the interrogation signal; receiving identifying information from the transmitter of the detected device with the at least one reader; and comparing the identifying information of the detected device received by the at least one reader with the data stored in the database identifying at least a portion of the plurality of lost or stolen devices so as to locate at least one of the plurality of lost or stolen devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for identifying a lost or stolen device, the system comprising:
-
a transceiver, coupled to a device, the transceiver configured to authenticate an interrogation signal and to transmit identifying information in response to the interrogation signal; a first secure database configured to store data identifying a plurality of lost or stolen devices, the first secure database configured to prevent unauthorized access to the data stored therein; and a plurality of checkpoints, each checkpoint comprising; a reader located at the checkpoint and configured to transmit the interrogation signal and to receive the identifying information transmitted by the transceiver, and a processor configured to compare the identifying information with the data stored in the first secure database, wherein the processor is configured to generate an output signal if the identifying information matches at least some of the stored data identifying the plurality of lost or stolen devices. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method for locating a lost or stolen device, the method comprising:
-
receiving a report of a lost or stolen device having transmitter circuitry attached thereto; storing data associated with the report of the lost or stolen device into a secure database; transmitting an interrogation signal with at least one reader; authenticating the interrogation signal with transmitter circuitry of at least one detected device; receiving with the at least one reader unique identifying information from the transmitter circuitry of the at least one detected device, wherein the identifying information is transmitted by the transmitter circuitry of the at least one detected device in response to receiving the interrogation signal; and comparing the identifying information received by the at least one reader with the data stored in the secure database to locate the lost or stolen device. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29)
-
-
30. An apparatus for identifying a lost or stolen device, the apparatus comprising:
-
means for receiving a report of a lost or stolen device having transmitter circuitry associated therewith; secure means for storing data associated with the report of the lost or stolen device; means for transmitting an interrogation signal and for receiving identifying information transmitted by transmitter circuitry of detected devices in response to receiving and authenticating the interrogation signal; and means for comparing the identifying information with the data associated with the report of the lost or stolen device to locate the lost or stolen device. - View Dependent Claims (31, 32, 33)
-
-
34. A system for identifying a lost or stolen device, the system comprising:
-
a transmitter, associated with a device, configured to authenticate an interrogation signal and to transmit identification information in response to authenticating interrogation signal; a first transceiver configured to transmit the interrogation signal to the transmitter and to receive the identification information from the transmitter when the transmitter is within a first defined distance from the first transceiver; a first processor having a first secure database configured to store data identifying a plurality of devices that have been reported as lost or stolen; and a second processor configured to receive the identification information from the first transceiver, the second processor having a second secure database configured to receive at least a portion of the stored data from the first secure database and configured to compare the received portion of the stored data with the identification information received from the first transceiver to locate at least one of the plurality of lost or stolen devices. - View Dependent Claims (35, 36, 37, 38, 39, 44, 45)
-
-
40. A method of identifying lost or stolen items, the method comprising:
-
receiving data identifying items that have been lost or stolen; transmitting with a transceiver an interrogation signal directly to a radio frequency identification (REID) device associated with an item; authenticating the interrogation signal with the RFID device; receiving with the transceiver information transmitted by the REID device in response to receiving the interrogation signal; storing the data identifying the lost or stolen items in a first secure database; updating a second secure database with at least a portion of the data stored in the first secure database, the second secure database being in communication with the transceiver; and comparing the information received by the transceiver with the data stored in the second secure database to locate at least one of the lost or stolen items. - View Dependent Claims (41, 42, 43)
-
Specification