System and method for alerting and tracking with improved confidentiality
First Claim
1. An alerting and tracking system comprising:
- a central unit;
a plurality of first signal sources;
a verification unit;
a second group of associated signal sources;
a logical AND gate;
a first list of identity tags provided by the plurality of first signal sources for unauthorized personnel;
a second list associating the identity tags with personal information; and
a transmitter, whereinthe central unit is logically connected to the plurality of first signal sources, the verification unit, and the transmitter, and provides a logical true alerting signal if at least one of the plurality of first signal sources is logically high,the verification unit is connected to the second group of associated signal sources, and produces a verification signal,the logical AND gate provides an alarm signal if the logical true alerting signal is true and the verification signal is true,the central unit communicates with at least one identity tag of the identity tags in the first list of identity tags provided by the plurality of first signal sources, the at least one identity tag associated with an individual, andthe second list associating the identity tags with personal information is available only to authorized personnel.
0 Assignments
0 Petitions
Accused Products
Abstract
An alarm system comprising at least one first signal source communicating with a central unit configured for providing a logically true alerting signal when predetermined conditions are met. The signal sources may include transponders and a confidential list containing the relation between an RFID chip and the name of the person identified may be stored in a computer. A verification unit is connected to independent signal sources and is configured for providing a logically true verification signal when predetermined conditions are met. The signal sources may also comprise means for measuring bio-functions, and the verification unit may be carried by a safety manager. In such a case, the safety manager will also be able to confirm or reject an alerting alarm from the central unit manually. An alarm signal is activated if and only if the alerting signal is true and the verification signal is true.
12 Citations
20 Claims
-
1. An alerting and tracking system comprising:
-
a central unit; a plurality of first signal sources; a verification unit; a second group of associated signal sources; a logical AND gate; a first list of identity tags provided by the plurality of first signal sources for unauthorized personnel; a second list associating the identity tags with personal information; and a transmitter, wherein the central unit is logically connected to the plurality of first signal sources, the verification unit, and the transmitter, and provides a logical true alerting signal if at least one of the plurality of first signal sources is logically high, the verification unit is connected to the second group of associated signal sources, and produces a verification signal, the logical AND gate provides an alarm signal if the logical true alerting signal is true and the verification signal is true, the central unit communicates with at least one identity tag of the identity tags in the first list of identity tags provided by the plurality of first signal sources, the at least one identity tag associated with an individual, and the second list associating the identity tags with personal information is available only to authorized personnel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
8. An alerting and tracking method, comprising the steps of:
-
providing risk exposed individuals with identity tags, registering which identity tag belongs to which individual and storing information on which identity tag belongs to which individual confidentially, when a threat is identified, triggering a first alerting signal, verifying the threat by way of producing a verification signal from a verification unit being connected to a second group of associated signal sources, triggering an alarm if and only if the first alerting signal is true and the threat is verified, and obtaining a first list of identity tags for personnel who are not authorized to get the information on which identity tag belongs to which individual. - View Dependent Claims (9)
-
Specification