Method and system for identifying missing items
First Claim
1. A system, comprising:
- a platform configured to support a plurality of objects for transportation through a checkpoint;
a reader positioned at the checkpoint to interrogate a plurality of radio frequency identification (RFID) tags physically associated with the plurality of objects respectively, when the objects are supported by the platform and transported through the checkpoint;
a database to store identification information of the plurality of RFID tags, each of the plurality of RFID tags physically associated with an respective object to store identification information representative of the respective object and to transmit the identification representative of the respective object to the reader when being transported through the checkpoint; and
a computer coupled to the database to compare identification information obtained from the reader and identification information stored in the database to identify a first object as being missing and associated with the platform.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for identifying a lost or stolen device includes a transmitter, a receiver and a computer. The transmitter is coupled to the device and transmits identification information. The receiver receives the identification information transmitted by the transmitter when the transmitter is within a defined distance from the receiver. The computer is coupled to the receiver so as to receive the information from the receiver. The computer has a first secure database which stores data associated with lost or stolen devices and which prevents unauthorized access to the data stored therein. The computer compares the information with the stored data, and generates an alarm if the information matches at least some of the stored data.
-
Citations
31 Claims
-
1. A system, comprising:
-
a platform configured to support a plurality of objects for transportation through a checkpoint; a reader positioned at the checkpoint to interrogate a plurality of radio frequency identification (RFID) tags physically associated with the plurality of objects respectively, when the objects are supported by the platform and transported through the checkpoint; a database to store identification information of the plurality of RFID tags, each of the plurality of RFID tags physically associated with an respective object to store identification information representative of the respective object and to transmit the identification representative of the respective object to the reader when being transported through the checkpoint; and a computer coupled to the database to compare identification information obtained from the reader and identification information stored in the database to identify a first object as being missing and associated with the platform. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system, comprising:
-
a plurality of readers positioned at a plurality of checkpoints respectively, the readers configured to interrogate radio frequency identification (RFID) tags physically associated with objects to be transported through the checkpoints; a database to store identification information of a plurality of radio frequency identification (RFID) tags, wherein each of the plurality of RFID tags is physically associated with an respective object to store identification information representative of the respective object and to transmit the identification representative of the respective object to a respective reader of the plurality of readers when being transported through a checkpoint in vicinity of the respective reader; and a computer coupled to the database, in response to a first object being identified as missing the computer to identify a checkpoint at which a first reader of the plurality of readers is positioned and a first RFID tag physically associated with the first object has transmitted identification information representative of the first object to the first reader. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system, comprising:
-
an interrogation device positioned at a checkpoint and configured to transmit an interrogation signal, and in response thereto, receive one or more replies from an RF device physically associated with an object to be transported through the checkpoint; a secure database to store identification information of a plurality of RF devices, each of the RF devices physically associated with a respective object to store identification information representative of the respective object; and a computerized device coupled to the interrogation device and configured to facilitate operation of the interrogation device, the computerized device further comprising a network interface in operative communication with the secure database; wherein the computerized device is further configured to; cause the interrogation device to transmit a first interrogation signal when the RF device is proximate to the interrogation device; receive information associated with one or more replies received from the RF device in response to the transmitted first interrogation signal; transmit at least a portion of the received information to the secure database; receive an indication from the secure database that the respective object is a lost or stolen object; and cause the display of a notification to a display device that the respective object is lost or stolen. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method of identifying lost or stolen devices, comprising:
-
receiving identification information for an object from one or more readers positioned at one or more checkpoints respectively, the one or more readers configured to interrogate radio frequency identification (RFID) tags physically associated with objects being transported through the one or more checkpoints and receive the identification information in response to the interrogation; receiving a report for a lost or stolen object having an RFID tag embedded therein; and causing the storing of information associated with the report for the lost or stolen object in a database, the information associated with the report for the lost or stolen object being made available to the one or more readers when the lost or stolen object travels to a respective checkpoint associated with the one or more readers; wherein the information associated with the report for the lost or stolen object stored in the database is compared with identification information received from a reader, and upon determining that an interrogated object having an associated RFID tag is lost or stolen, a notification is provided that is configured to alert appropriate personnel that the object having the associated RFID tag is lost or stolen. - View Dependent Claims (23, 24, 25, 26)
-
-
27. A method of identifying lost or stolen devices, comprising:
-
interrogating a radio frequency identification (RFID) tag physically associated with an object as it is transported through a designated area using a reader; receiving identification information from the RFID tag in response to the act of interrogating; storing the received identification information for the RFID tag; comparing the stored identification information against at least a portion of a master list of lost or stolen devices in a database to determine that the object physically associated with the RFID tag is lost or stolen; notifying at least one entity that the object having the associated RFID tag is lost or stolen; and acquiring the lost or stolen object substantially in response to the act of notifying; wherein the act of notifying includes information about the designated area so as to enable determination of a current location of the object. - View Dependent Claims (28, 29, 30, 31)
-
Specification