AU2702300A - Method of operating a security system - Google Patents

Method of operating a security system Download PDF

Info

Publication number
AU2702300A
AU2702300A AU27023/00A AU2702300A AU2702300A AU 2702300 A AU2702300 A AU 2702300A AU 27023/00 A AU27023/00 A AU 27023/00A AU 2702300 A AU2702300 A AU 2702300A AU 2702300 A AU2702300 A AU 2702300A
Authority
AU
Australia
Prior art keywords
data
database
personal property
recorded
entity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU27023/00A
Inventor
Bruce Winston Bellve
Dennis Blacklaws
Stuart Martin Innes
Glenn Walter Thomson Stewart
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ROSNIM Ltd
Original Assignee
ROSNIM Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ROSNIM Ltd filed Critical ROSNIM Ltd
Publication of AU2702300A publication Critical patent/AU2702300A/en
Assigned to ROSNIM LIMITED reassignment ROSNIM LIMITED Amend patent request/document other than specification (104) Assignors: ASSETCARD HOLDINGS LIMITED
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising

Landscapes

  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Description

WO 00/51044 PCT/NZOO/00017 METHOD OF OPERATING A SECURITY SYSTEM TECHNICAL FIELD The present invention is related to a method of operating a computer database so as to uniquely identify, record and keep track of personal property belonging to an 5 entity so as to principally create an effective security system to help reduce crime. BACKGROUND ART There is at present a long standing problem in creating and maintaining a register which accurately records personal property belonging to a person or business at a given point of time. 10 The implementation of such a register may be useful as a security system helping to reduce the incidence of property crimes such as fraud, burglary and theft. As the register provides a means for recording and keeping track of personal property in such a way that it will make it difficult for criminals to realise the proceeds of crime. For example, if such a register existed repairing/agents, secondhand 15 dealers and members of the public could verify that a person in possession of an item is also the lawful owner thereof. In addition, the existence of such a register may be useful for the purposes of: e insurance claims verification in cases of loss or theft, e police loss reporting - providing positive identification for police records, 20 e recording inventory stock items, " recording the depreciation of items for use in the settling of a deceased estate, * requesting greater insurance cover, WO 00/51044 PCT/NZOO/00017 e asset tracking - providing a history of ownership during the economic life of an item of personal property * providing a list of items reported as stolen " recording any financial encumbrances associated with an item of personal 5 property. In particular the existence of such a register will be useful in relation to jewellery which is generally hard to identify and/or prove ownership thereof. This invention will offer the opportunity to laser inscribe, or etch, or engrave, or otherwise mark by as yet unknown means, a unique identifier on an individual 10 gemstone, or diamond, or other precious items such as ornaments, tableware, glassware, objets d'art, jewellery, and all items of value. Whilst at present it is possible for individuals to keep a personal list of personal property in their possession, this list may be inaccurate and could even contain items never in the possession of that person, perhaps in order to secure insurance 15 payouts in a fraudulent manner. It is an object of the present invention to address the foregoing problems or at least to provide the public with a useful choice. Another ancillary object of the present invention is to provide a means by which an entity can keep track of items of personal property it possesses. 20 Further aspects and advantages of the present invention will become apparent from the ensuing description which is given by way of example only. DISCLOSURE OF INVENTION According to one aspect of the present invention there is provided a method of operating a security system characterised by the steps of: 2 WO 00/51044 PCT/NZOO/00017 a) recording independently data on personal property acquired by an entity, and b) allowing at least one party to access at least some of that data to check veracity of information given separately by another party. 5 According to another aspect of the present invention there is provided a method of record keeping including the steps of: a) receiving a unique identifier for an entity; and b) receiving data relating to the entity identified; and c) storing the data in a database so the data is linked to that entity; and 10 d) providing access to the data to selected users. the method characterised in that the database is operated independently of the entity to which the data relates and the data relates to personal property acquired by the entity. Throughout this specification the term "personal property" shall refer to tangible 15 and intangible items of movable property including documents and information. For example, the term personal property may cover: * Equipment, including accessories, parts and fittings therefor e Machinery " Electrical apparatus 3 WO 00/51044 PCT/NZOO/00017 e Jewellery e Watches * Furniture e Clothing 5 e Vehicles e Insurance policies, all types but particularly life insurance policies and medical insurance policies " Stock e Shares or bonds 10 e Wills or other Deeds or important documents e Commercial business assets e Commercial stock items. However, it should be understood that this list should not be seen as limiting as it is given by way of example only and is not intended to be comprehensive. 15 For ease of reference only, the method(s) of the present invention will now simply be referred to as being a security system. Throughout this specification the term "entity" shall refer to individual people, married or de facto couples, partnerships, trusts, companies or other legal entities: 4 WO 00/51044 PCT/NZOO/00017 able to have their personal property recorded on the data repository of the present invention. The term EFTPOS as used throughout this specification shall refer to any means of ELECTRONIC FUNDS TRANSFER at POINT OF SALE. 5 Throughout this specification the term merchant shall refer to any entity who is a manufacturer, retailer/wholesaler or distributor of goods. It is envisaged that in general the data will be independently recorded/received via what can be considered a two step process consisting of: first, collecting the data, and then secondly storing the data. These two steps are now discussed in more 10 detail below. Data Collection It is envisaged that the data relating to personal property may be independently collected via a variety of different methods. For example, the data may be collected by any one of the following methods: 15 * Writing it down e Manual input * Digital/analogue scanning or reading " Data file transfer e Or any combination of the above. 5 WO 00/51044 PCT/NZOO/00017 However, it should be appreciated the above list is given by way of example only and is not intended to be limiting as other methods may also be employed without departing from the scope of the present invention. In preferred embodiments, data will be collected about an item of personal 5 property at the point of sale ("POS"). Where available the data on personal property may be collected and stored as part of an EFTPOS transaction when an item of personal property is purchased. To facilitate the EFTPOS transaction some entities may be issued with a card ("Database Card") which has a unique identifier shown thereon and assigned by the administrators of the security 10 system. In general the identifier may be in the form of a number. For ease of reference the identifier will now be referred to as a Database Card number. The Database Card may also contain a magnetic strip, or other data storing medium/device on which at least one further unique identifier can be stored in addition to the Database Card number. Other entities such as merchants or 15 commercial business owners for example, may not be issued with a card, but nevertheless will be assigned a unique identifier, generally a number. It is envisaged that only items of personal property which meet a predetermined threshold value will be recorded in the data repository. To a large extent what criteria is used to determine whether an item of personal property is recorded will 20 depend on the nature of the personal property in question. Accordingly, other criteria may also be employed for setting the threshold value without departing from the scope of the present invention. If EFTPOS is not available at the POS details of the item(s) of personal property and entity purchasing it, may be recorded by the seller for subsequent forwarding 6 WO 00/51044 PCT/NZOO/00017 to the data repository. How this data may be forwarded to the repository is discussed in more detail below. In some preferred embodiments entities who are merchants may routinely transfer a file of stock data to the data repository. The stock data recorded can then also be 5 used when stock item(s) are sold to an entity. If not EFTPOS or via prior stock data file, then by direct entry via Web Browser form, or file transfer from Merchant's own system, or via facsimile or electronic mail, or other means of data transfer. If an item of personal property is already in the possession of an entity, or has 10 been purchased from another party not able or perhaps willing to forward information to the data repository, the entity itself may forward the data to the repository. Where data is collected in this manner it is flagged at the time of entry into the repository for subsequent verification by the administrators of the security system, or the insurer of the item(s) of personal property. This subsequent 15 verification of data entered into the repository is an important feature of the present invention as it helps to maintain the integrity of the core data in the repository. Storing the Data Once data concerning the personal property acquired by an entity has been 20 collected this is recorded in a data repository. The repository will generally be in the form of a computer database remote from the source of the data (i.e. where the data was collected). 7 WO 00/51044 PCT/NZOO/00017 In preferred embodiments the database may be a relational database. In all preferred embodiments the data recorded will be recorded so it is indexed to an entity. It is envisaged the data may be transferred from its point of collection via a 5 communications network to a remote database for recordal thereof. For example, the communications network may include: the Internet including electronic mail (email); phone networks including mobile telephone, standard telephone and facsimile machines; radio telephones; standard mail; radio waves; EFTPOS; or any combination of the foregoing; or any other method by which data can be 10 transmitted. In preferred embodiments the data may be recorded to the database as part of the EFTPOS transaction at the POS. In cases where EFTPOS is not available at the POS the data may be emailed or faxed to the administrators of the security system for recordal on the database. Alternately, the data may be recorded on the 15 database via a data entry screen on a web page or via transfer of a data file. Other means of data transfer and recordal may also be employed without departing from the scope of the present invention. It is envisaged that in some future embodiments at least a portion of the data collected shall also be recorded on a smart card. 20 Throughout this specification the term smart card shall refer to a plastic card or the like which includes an embedded integrated circuit thereon for storing information. 8 WO 00/51044 PCT/NZO0/00017 In some further embodiments the data recorded on the smart card will replicate that stored on the database for the entity to which the personal property relates. The data may be stored on the smart card either substantially contemporaneously with its recordal on the database (for example, as part of the EFTPOS transaction), 5 or alternatively downloaded from the database itself at a subsequent time. It is envisaged that recordal of data to a smart card and retrieval of data stored on a smart card may be achieved via any device suitably configured to read and/or write to the integrated circuit on the smart card. That data recorded will depend on the type of the personal property. 10 It is envisaged that there will generally be four types of personal property, namely: goods, jewellery, watches and miscellaneous items. The four types of personal property which can be recorded for an entity are now each discussed in turn below. 1. Goods 15 Throughout this specification the term "goods" shall be defined as meaning commodities excluding watches, jewellery, and commodities which are perishable or consumable in nature. In preferred embodiments the data recorded for goods may include data for at least the following fields: 20 a) an identification number b) a description 9 WO 00/51044 PCT/NZOO/00017 c) a photograph(s) d) the purchase price e) the purchase date f) the seller's details 5 In addition the data recorded for goods may also include a data field for the age of the item at the date of purchase. It is envisaged that generally goods may be further classified into those that include a serial number and those that do not. If the goods include a serial number thereon, this will be the data recorded 10 in the identification number field. If there is no serial number on the goods, this field will be initially left blank until a unique identification number ("UIN") has been assigned to it by the administrators of the security system. A form of label including this number will then be sent to the owner for attachment to the item in question. 15 2. Jewellery The data recorded for jewellery may include data for at least the following fields: a) an identification number (which may be engraved, or etched, or laser inscribed, or marked by some yet to be developed means, on 20 item) b) the seller's details 10 WO 00/51044 PCT/NZOO/00017 c) a description d) a photograph(s) e) the purchase price f) the purchase date. 5 In addition the data recorded for jewellery may also include data for one or more the following fields, once an appraisal by a gem lab has been conducted: g) an appraisal number h) an appraiser identification number or code 10 i) a replacement value j) an indemnity value j) a laser inscribed identification number k) a patent number 1) an international gem lab identification number or code 15 m) X-ray(s) n) photomicrograph or chart reports/certificates showing external or internal blemishes. o) gem lab comments 11 WO 00/51044 PCT/NZOO/00017 In general, an appraisal will be undertaken if the item of jewellery is worth more than a specified minimum value. It is envisaged that all gem labs and persons certified to undertake appraisals will be assigned either a gem lab or an appraiser identification 5 number or code which will identify the particular gem lab and person that conducted the appraisal. The gem lab comment fields will generally include information concerning the condition of the item of jewellery. 3. Watches 10 The data recorded for watches may include data for at least the following fields: a) an identification number (if engraved on item) b) the sellers details c) the serial number 15 d) the make e) the model number f) a description g) the case number h) the caliber number 12 WO 00/51044 PCT/NZOO/00017 i) the movement number j) the bracelet number k) photographs 1) the purchase price 5 m) the purchase date In addition the data recorded for watches may also include data for the following fields, once an appraisal by a gem lab has been conducted: n) an appraisal number o) an appraisal date 10 p) an appraiser identification number or code q) a replacement value r) an indemnity value s) gem lab comments t) an international gem lab identification number or code 15 u) a patent number. In general, an appraisal will be undertaken if the watch is worth more than a pre-determined minimum value. 13 WO 00/51044 PCT/NZOO/00017 The gem lab comments will generally include data concerning the condition of the watch. 4. Miscellaneous Items This type of personal property is a catchall which covers items of personal 5 property not covered for whatever reason by the above listed types of personal property. For example, miscellaneous items of personal property may include: e Valuable documents such as Wills and Insurance policies " Household items which do not meet the threshold criteria for automatic recordal on the database 10 * Credit card details e Firearms - in particular where they do not meet the threshold criteria set out above * Commercial business assets that would be expected to be stored in the business's asset register. 15 However, it should be appreciated that this list is not intended to be limiting and other items of personal property may fall within this category. The data recorded for miscellaneous items will include fields appropriate for identifying the kind of personal property in question. Where merchants opt to file transfer stock data, the stock data recorded for an 20 entity should include data for fields which substantially correspond to the fields 14 WO 00/51044 PCT/NZ00/00017 covered by the four types of personal property discussed above; with the exception of the data fields covered by the gem lab appraisals for watches and jewellery. In addition to the data mentioned above for the four types of personal property the 5 data recorded for an entity may include data for the following fields: * Insurer details e Insurer claims history - detailing whether an item is subject to an insurance claim has been recovered etc. * Police case history - listing whether an item has been reported as stolen etc. 10 * Finance details - listing financial institutions with a claim to the item. It is envisaged to maintain the security of the database a log will be kept recording the history of all accesses and changes made to the database, including the records accessed, the time of access, and if known the party accessing the database. It is envisaged that the parties/users who can access the data can include: 15 a) the entity on whom the data was recorded b) the Police c) insurers d) the public e) administrators of the security system 15 WO 00/51044 PCT/NZOO/00017 f) merchants g) commercial business owners h) jewellery retailers i) gem labs 5 j) secondhand dealers k) repair and service agents 1) financial institutions It is envisaged that access to the data stored on the database may be achieved in a variety of different ways. 10 In general access to the data on the database may be achieved via a communications network. In some embodiments access to the database may be via a call center which will have telephone operators able to access the database to make changes thereto or to retrieve information therefrom. As an alternative to, or to supplement, telephone 15 operators at the call center, an interactive voice response (IVR) system capable of recording callers messages may be utilised. In the future the IVR may be capable of accessing the database and performing similar functions to that of a telephone operator. In preferred embodiments, access to the database may be via the Internet. 16 WO 00/51044 PCT/NZOO/00017 The degree of access to the data on the database by a party/user depends on the unique identifier (i.e. generally a Database Card number) assigned to that entity. To further enhance the security of the database, at least one additional identifier may be required. The additional identifier may include: 5 e A personal identification number (PIN) * Fingerprints or voice prints e A retinal vessel layout " A password e Or any other suitable means for identifying an individual which may in the 10 future be devised. The veracity of the information which can be checked by accessing the data can include: a) verification of ownership for property offered for sale; b) verification of ownership for personal property put in for repair; 15 c) verification of ownership for personal property to be insured; d) authentication of the value of personal property that is insured or is to be insured; e) authentication or details of the owner of personal property found or recovered; 17 WO 00/51044 PCT/NZOO/00017 f) identification of property subject to an insurance claim; g) verification of whether or not personal property has been reported as stolen. If the party/user seeking access to the database is a member of the public and is 5 not an entity as defined herein; the user will only be able to access the data to check whether a serial numbered item of personal property is stolen or not. Thus, the present invention may have advantages over the prior art which can include: 1. The provision of an independent database which accurately records 10 personal property belonging to an entity at a given point of time. 2. The existence of the database may be useful as a security system helping to reduce the incidence of property crime such as fraud, burglary and theft. 3. In addition, the existence of such a database may be useful for the purposes of: 15 e insurance claims verification in cases of loss or theft; e police loss reporting - providing positive identification for police records * recording the depreciation of items for use in the settling of a deceased estate 20 e requesting greater insurance cover 18 WO 00/51044 PCT/NZ0O/00017 providing integrity and linkages to a jewellery appraisal system that imposes standards for international grading, identification, methodology, and nomenclature for gem labs and individual jewellery appraisers. 5 e asset tracking - providing a history of ownership during the economic life of an item of personal property e providing a list of items reported as stolen * recording any financial encumbrances associated with an item of personal property. 10 In particular the existence of such a database will be useful in relation to jewllery which is generally hard to identify and/or prove ownership thereof. 4. Ownership records are kept safely away from a house or place of business. 5. Ownership records are available when applying for travel insurance. 6. Businesses will have a secure method of maintaining an asset database 15 which can include all assets, not just serial numbered assets. 7. The database is capable of recording all the stock items of a secondhand dealer making it easier for the police to access and also verify that the books are "clean". 8. Parties can verify whether a party in possession of an item is the owner. 20 9. Merchants can keep their stock records stored securely off the site and in addition can check goods for the purchase date when repairs are claimed under warranty. 19 WO 00/51044 PCT/NZOO/00017 BRIEF DESCRIPTION OF DRAWINGS Further aspects of the present invention will become apparent from the ensuing description which is given by way of example only and with reference to the accompanying drawings in which: 5 Figure 1 is a block diagram illustrating recordal of data for newly purchased items of personal property in the form of goods according to one preferred embodiment of the present invention, and Figure 2 is a block diagram illustrating how the database may be accessed by interested parties in one preferred embodiment of the present 10 invention, and Figure 3 illustrates the main database structure, and Figure 4 illustrates the stock database structure. BEST MODES FOR CARRYING OUT THE INVENTION For ease of reference only, when discussing the diagrams and examples of 15 preferred embodiments of the present invention the term "member" will now be used instead of the term "entity". Example 1 - recordal of data when purchasing new goods. As is shown in Figure 1 a member at 1 buys a new item in the form of goods (not shown) at the POS which meets the threshold value for recordal on the database 6. 20 At 2 the merchant swipes the members Database Card in an EFTPOS card reader 2 and the member enters their PIN. The merchant at 2 then enters the stock unit number and value of the item purchased into the EFTPOS terminal. Once this is completed EFTPOS passes the data at 4 to the database 6. However prior to 20 WO 00/51044 PCT/NZOO/00017 recordal, at 5 the database links the stock unit data to the transaction data so that the item purchased can be recorded against the member's record on the database. It should be appreciated that this example presupposes the merchant already has their stock data recorded on the database 6. If this were not the case more data 5 would be required to be forwarded to the database 6. If a merchant does not have an EFTPOS facility, the merchant may at 10 manually capture the member's Database Card number and the stock unit number and price. This may at 13 be added to a file of transactions which is uploaded from the merchants system via the Internet 14. Alternatively, this operation is performed 10 as a "back office" function so as to not unduly delay the customer when purchasing goods. This information is then passed on the to the database 6 either: a) Directly 11 via the Internet, (via web page); or b) Indirectly 12 via a facsimile or email processed by the administrators of the security system. 15 Example 2 - recordal of data for personal property already in the possession of the member A member may add items attached to their record on the database in a variety of different ways. One method is for the member to phone the call center operated by the 20 administrators of the security system. The member then gives the telephone operator their database card number, PIN and password. The member then details any changes to be made to the member's record to the operator. Once these details have been relayed to the operator the operator then adds or removes items from the member's database records. 21 WO 00/51044 PCT/NZOO/00017 Another method is for the member to enter details into the appropriate fields appearing on a web page of a website operated by the administrators of the security system. Either before entering any data into the fields or alternatively before recording the data on the database, the web page will prompt for the 5 member to log on with their card number, PIN and password. Upon satisfying the necessary security requirements the data will then be attached to the member's record on the database. It is envisaged that items may also be removed from the member's record upon sale, destruction or loss via similar methods to those outlined above. 10 Example 3 - recordal of data for items of jewellery/watches At the time of purchase of jewellery or a watch by a member the Jewellery retailer may record the data fields relating to the jewellery/watch at the POS substantially as has been detailed in Example 1. If the item meets the appraisal value, the retailer will send the jewellery/watch to the gem lab for appraisal thereof. Once 15 the gem lab appraisal has been undertaken the gem lab will record the appraisal data, against the member's record on the database generally via file transfer. For insurance purposes, items of jewellery will undergo annual inspections. In this regard, a further software application may periodically access the database to generate reminders which are sent out to the retailer and/or member informing 20 them that an item of jewellery/watch needs to be taken to the Jewellery retailer or gem lab for an annual inspection. Example 4 - functions of the parties/users able to access the database A summary of the functions for each party is as follows: 1.0 The Insurer 22 WO 00/51044 PCT/NZOO/00017 e Administration- administrators of the security system will set up the insurer's "system managers" who will then administer the insurance users. e User access - will be achieved via a web browser and the security 5 system home page, with the insurer ID and individual logon ID and password, being administered by the systems managers. The users' ID will be recorded as an "audit stamp" on all records accessed. * View members records - the user will be able to view records for an individual member, using the database card number provided by the 10 member at the time the claim was reported. e Add claims data to members records - the user will be able to update the members records with claims reference, date of loss, claim reported date. (As the number of records grows on the database, this loading may be better performed by a file download from the insurer). 15 e Initiate a post-loss valuation - the user will be able to request valuation of an item or items, with the results being emailed to the user. e Update members records - the user will be able to manually update a claim record to show the item has been found, the claim has been paid and is now closed or it has been closed without payment. (Again as the 20 volume of claims grows, it is envisaged that recording of the paid out items be performed via a file download from the insurer). 2.0 The Merchant. 23 WO 00/51044 PCT/NZO0/00017 e Administration - administrators of the security system will set up the merchant's "system managers" who will then administer the merchant's users. e User access - will access the database via a web browser, with a 5 merchant organisation ID and individual logon and password, as administered by the "systems managers". The user's ID will be recorded as an "audit stamp" on all records accessed. * Record stock data - facility to record serial number or stock unit number of all stock items at time of delivery to store. This may be 10 either entered manually or via file transfer. (This information may be available as file from the Merchant's supplier). * Sales - will record member's database card number and serial number or stock unit number at POS and assign a purchase value. This may be part of an EFTPOS transaction. 15 e Initiate file transfer of member's purchase data to the database for example via EFTPOS. " View own records - the users will be able to display the merchant's own transaction records for review. In addition, users are able to view all stock records for the merchant. 20 3.0 The Member * Access - via phone or web browser, with a card number, PIN and password. * Update records can add existing items to their record and remove items therefrom including the reason and the date of removal. Member is not 24 WO 00/51044 PCT/NZOO/00017 able to amend value sent by merchant or dealer, or entered by a gem lab as part of an appraisal. However member can upon contacting the administrators of the security system initiate error correction. The administrators security system will then investigate and make the 5 necessary changes if found to be valid. * View own records - the member can view their records. " List items - the member can initiate a hard copy of the lists of the items on their records. " Transfer of an item - the member can initiate the transfer of an item of 10 personal property to a new owner by providing the administrators of the security system with details of the new owner. The administrators of the security system then contact the new owner and the new owner provides authentication to complete the update to his/her/its records. " Update records - the member can at any time change their name, and 15 address details as well as their insurer details. * Jewellery/Watch items in existence - if the member is in possession of an item of jewellery or watch which has not been purchased from a jeweller, the member can visit a jewellery retailer for inspection and recording of the item so that it can be recorded against the member's 20 records. If it meets the threshold value the item of jewellery may be sent to a gem lab for an appraisal. 4.0 The Business 25 WO 00/51044 PCT/NZ0O/00017 " Administration - the administrators of the security system will set up the businesses "system managers" who will then administer businesses users. * User access - will access the database via a web browser, with a 5 business organisation ID, an individual logon and password, as administered by the "systems managers". The users ID will be recorded as an "audit stamp" on all records accessed. e View own records - the users will be able to display the businesses own transaction records for review. In addition users are able to 10 review all asset records (i.e. items owned by the business). e Update records - the users will be able to either manually or via file transfer update the businesses records. " List of items - the users will be able to initiate a hard copy of the items listed in their records. 15 5.0 The Police e Administration - the administrators of the security system will set up the police "system managers" who will then administer the police users. e User access - will access the database via a web browser, with a police 20 ID and individual logon and password, as administered by the "system managers". The user's ID will be "stamped" on all records accessed. * View members records - users will have access to a members records, via the member's card number supplied at the time of reporting a stolen item. 26 WO 00/51044 PCT/NZOO/00017 Update member records - users will be able to update the members record to record the police reference, date reported stolen, item recovered and date as appropriate. It is envisaged that updating a members record may be automated from the case files once a members 5 card number has been recorded on the police files. * General searches - users will be able to conduct searches of the database for stolen items or items recovered via: a) characteristics - make/model, serial number, description, size, colour, number of gems etc.; or 10 b) by area - where recovered or where the thefts occurred; or c) by reported items - search of items reported as stolen or lost. * List of possible owners - users will be able to use the database to positively identify the owner of a recovered item or produce a list of possible owners. 15 0 Check dealer records - users will be able to check the stock records of secondhand dealers held on the database. It is envisaged that this may be an automated process. 6.0 Jewellery Retailer ("Jeweller") e Administration - the administrators of the security system will set up 20 the jewellers' "system managers" who will then administer the jewellers users. " User access - will access the database via a web browser, with a jeweller ID and individual logon and password, as administered by the 27 WO 00/51044 PCT/NZOO/00017 "systems manager". The jewellers' ID will be "stamped" on all records accessed. * View members records - users will be able to view a members records and add items to a member's records. In addition users can record 5 details of the item. Jeweller may also update the records for transfer of an item to a new owner when the new owner brings the item in for inspection. Will update the members record at annual review. e Appraisals - jewellers can initiate appraisal of new and recorded items and will forward items to the gem lab along with a job ticket. Once the 10 item is returned from the gem lab the jeweller will contact the member and arrange date of collection. Jeweller may elect to send out reminder letters for the next inspection. 7.0 The gem lab e Administration - the administrators of the security system will set up 15 the gem labs "system managers" who will then administer the gem labs database users. " User access - will access the database via a web browser, with an organisation ID and individual logon and password, as administered by "systems managers". Users ID will be recorded as an "audit stamp" on 20 all records accessed. " View members records - users will be able to display a members records to view the item(s) they are appraising. " Appraisal - the gem lab will perform an appraisal on the watch/item of jewellery. 28 WO 00/51044 PCT/NZOO/00017 Update members records - once the appraisal has been performed the gem lab will update the member's record either manually or via file transfer. 8.0 Secondhand dealer 5 0 Sales - same as for the merchant e Purchasing stock - dealers have the option of recording details of all their items of stock in the stock records of the database. Data relating to a dealers stock may be recorded on the database either via manual entry or via file transfer using the Internet. Prior to purchasing an item 10 of stock the dealer has the option of conducting a search of the database to determine that the item has not been reported as stolen or it does not belong to a person other than the seller. e User access - will access the database via a web browser, with dealer ID, and individual logon and password, as administered by "systems 15 managers". Users ID will be recorded as an "audit stamp" on all records accessed. * View own records - the users are able to view all stock records of the dealer. e Administration - the administrators of the security system will set up 20 the dealers "system managers" who will then administer the dealers users. 9.0 The Repairer / Service Agent ("Repairer") 29 WO 00/51044 PCT/NZOO/00017 e Administration and user access - the administration of the dealers access to the database will be the same as that described above for the secondhand dealer. * Search - upon receiving a job the repairer can initiate a search on serial 5 number and description to determine the person that presented the item for repair is the owner. If not the repairer /service agent can advise the insurer or the police. 10.0 The Public " The Public - the public will be able to access the database via either 10 the call center or the Internet. e Search - the public will be able to initiate a search on serial number and description, and owner to determine whether or not an item has been listed as stolen. If the search indicates that the item is stolen - the public are able to advise police of any information they have. 15 11.0 Administrators of the Security System " Administration - maintain own users security profiles - set up new organisations initial security and access - maintain organisation relationships - initiate and monitor file transfer activities. " Access via web browsers - with organisation ID, logon and password. 20 The users ID will be recorded as an "audit stamp" on all records accessed. * Operate a call center - maintain call log with reference to member ID register members - maintain members' records - investigate areas advised by members. 30 WO 00/51044 PCT/NZOO/00017 e Statistical reporting - the administrators of the security system may provide certain parties with statistical information regarding the use of the database. It should be appreciated that some parties/users may have more than one 5 role/function for example a retailer may be both a merchant and a business user. Example 5 - access by interested parties. As is shown in Figure 2 the database 6 may be accessed by interested parties substantially as follows. 10 The merchant 1 may access the database 6 via the Internet for either: a) manual entry of data via a web page operated by the administrators of the security system, or b) for uploading a stock data file. The merchant 1 may transfer data to the database 6 via the EFTPOS network 2. The EFTPOS network is capable 15 of transferring data or file transfer to the database 6 but does not have direct access to the database itself, or c) for uploading a data file that contains details of the member's Database Card number and information relating to the item(s) of goods purchased, where these details have been recorded at POS within the merchant's own 20 systems, or d) the Merchant may forward details of the item(s) and the member(s) Database Card number via facsimile or email or any other means yet to be devised. 31 WO 00/51044 PCT/NZ0O/00017 The secondhand dealer 3 may access the database 6 via the Internet and either enter data manually into a data-entry web page via the Internet, or alternatively transfer file data via the Internet to the database 6. Similarly, the insurer 4, commercial business 5, gem lab 6, jewellery retailer 7, 5 repairer 8, police 10 and the call center 11 may also access the database 6 via the Internet as has been described above. The member 12 may either access the database 6 via the Internet, at home, at work at a jewellery retailer, or at any other authorised outlet, or alternatively via the call center 11. Generally this access will be via the web site operated by the 10 administrators of the security system. The public 9 may access the database 6 to check whether an item has been stolen via a web site operated by the administrators of the security system. On the site a web page provides fields in which an interested member of the public can enter the serial number, make/model and description, and the owner's name, of the item 15 they want to purchase. Once submitted the response from the database 6 may be "OK" "not OK" or "not found" or words to that effect. The call center will generally access the database 6 via the Internet either for manual entry of data or file transfer of data. Although, in some circumstances the call center or administrators of the security system may have direct access to the 20 database 6. Example 6 - main database structure. As is shown in Figure 3 the main database consists of records 100 linked to a members record 1 which has a field 2 for the members database card number as well as fields for security details 3, address details 4 and insurer details 5. 32 WO 00/51044 PCT/NZOO/00017 The database is structured so that linked to the members record 1 via the database card number are the following sets of records: non-serial numbered goods 6, serial numbered goods 7, jewellery 8, watches 9 and other (i.e. miscellaneous items) 10. The data fields covered by these records are substantially the same as those 5 outlined under the Disclosure of the Invention section of this specification. Linked to the members record and at least one unique data field (e.g. serial number or UIN (i.e. unique identification number)) for an item listed in records 6, 7 and 10 are review history records 20, 21 and 22 having fields appropriate for a review of the items listed in records 6, 7 and 10 such as date, comments on 10 condition, depreciation where relevant. Similarly, linked to the members record 1 and at least one unique data field e.g. identification or serial number in records 8 and 9 is a set of records relating to an appraisal history 11 and 12 and inspection history 13 and 14 having appropriate fields such as: Date of Inspection, Retailer ID, Preventative Maintenance 15 required?, Preventative Maintenance details, Preventative Maintenance actions, Alterations or upgrades as a result of the Preventative Maintenance, general comments, Date of Appraisal, Appraiser ID, plus the re-assessed values. There is also provided a set of records relating to an insurer claims history 15 which is linked to the members record and at least one unique data field in the 20 records 6 to 10. This set or records 15 has data fields covering whether an item listed in records 6 to 10 is under an insurance claim, or has been recovered, or paid out, a claim reference, date of loss and claim reported date. The database also has a set of records relating to the police case history 16 of items of personal property. Again this set of records is linked to the member's 25 record 1 and at least one unique data element from the fields listed in the records 6 through 10. The data fields in this set of records 16 may be those that the police 33 WO 00/51044 PCT/NZOO/00017 deem appropriate but is likely to include police reference number and the date the article was reported as stolen, found or recovered, and the status of items lost, stolen, or recovered. The database also has a set of records 17 logging all changes and accesses to 5 records 10 in the database. Again, this log will be linked into a members record via the database card number as well as the unique data elements from the fields of the records accessed or changed. Although not shown the database has a set of records capturing any financial liens over items of personal property recorded in records 6-10. Again this is linked to 10 the member's record 1. Example 7 - Stock Database Structure In addition to having the database structure outlined in Example 6, the database will also include records recording a merchants stock. As is shown in Figure 4 the stock database consists of a set of records 200 linked to a merchant record 201 15 which has a field 202 for the merchant's database number (i.e. equivalent to the member's database card number except a card is not issued to merchants) as well as fields for security details 203, address details 204 and organisation details 205. The database is structured so that it is linked to the merchant's record 200 via the merchant database number are the following sets of records: 20 - non-serial numbered goods 206, - serial numbered goods 207 - jewellery 208 - watches 209 34 WO 00/51044 PCTINZ0O/00017 - other (miscellaneous items) 210. The data fields covered by these records are substantially the same as those outlined under the Disclosure of Invention section of this specification. The database also has a set of records 217 logging all changes and accesses to the 5 stock records 200 in the database. This log will be linked into a merchants records via the merchants database number, as well as the unique data elements from the fields of the records accessed or changed. Aspects of the present invention have been described by way of example only and it should be appreciated that modifications and additions may be made thereto 10 without departing from the scope thereof as defined in the appended claims. 35

Claims (24)

1. A method of operating a security system characterised by the steps of: c) recording independently data on personal property acquired by an entity, and d) allowing at least one party to access at least some of that data to check veracity of information given separately by another party.
2. A method as claimed in claim 1 wherein the data is recorded on a computer database which is remote from the source of the data.
3. A method as claimed in either claim 1 or 2 wherein the recorded data is indexed to an entity.
4. A method as claimed in claim 2 wherein the data is transferred from its point of collection via a communications network, to a remote database for recordal thereof.
5. A method as claimed in claim 4 wherein the data is recorded to the database as part of the EFTPOS transaction at the POS.
6. A method as claimed in claim 1 wherein at least a portion of the data is also recorded on a smart card.
7. A method as claimed in claim 6 wherein the data recorded on the smart card replicates that stored on the database for the entity to which the personal property relates.
8. A method as claimed in claim 1 wherein the personal property is in the form of goods and the data recorded includes data for at least the following fields: 36 WO 00/51044 PCTINZ0O/00017 a) an identification number b) a description c) a photograph(s) d) the purchase price e) the purchase date f) the seller's details
9. A method as claimed in claim 8 wherein the data recorded for goods also includes a field for data relating to the age of item at time of purchase.
10. A method as claimed in claim 1 wherein the personal property is in the form of jewellery and the data recorded includes data for at least the following fields: a) an identification number (if engraved on item) b) the seller's details c) a description d) a photograph(s) e) the purchase price f) the purchase date.
11. A method as claimed in claim 10 wherein the data recorded for jewellery also includes data for one or more of the following fields, once an appraisal by a gem lab has been conducted: 37 WO 00/51044 PCT/NZOO/00017 g) an appraisal number h) an appraiser identification number or code i) replacement value j) indemnity value 1) a laser inscribed or etched identification number m) a patent number n) an international gem lab identification number or code o) X-ray(s) p) photomicrograph or chart reports/certificates showing external or internal blemishes. q) gem lab comments
12. A method as claimed in claim 1 wherein the personal property is in the form of watches and the data recorded includes data for at least the following fields: a) an identification number (if engraved on item) b) the seller's details c) the serial number d) the make e) the model number 38 WO 00/51044 PCT/NZOO/00017 f) a description g) a photograph(s) h) the case number i) the caliber number j) the movement number k) the bracelet number 1) the purchase price m) the purchase date
13. A method as claimed in claim 12 wherein the data recorded also includes data for the following fields, once an appraisal by a gem lab has been conducted: n) an appraisal number o) an appraisal date p) an appraiser identification number or code q) a replacement value r) an indemnity value s) gem lab comments t) an international gem lab identification number or code u) a patent number. 39 WO 00/51044 PCT/NZOO/00017
14. A method as claimed in claim 1 wherein the personal property is in the form of miscellaneous items and the data recorded includes fields appropriate for identifying the kind of personal property in question.
15. A method as claimed in any one of claims 8 to 14 wherein the data recorded for an item of personal property also includes data for the following fields: * Insurer details; e Insurer claims history; * Police case history; * Finance details.
16. A method as claimed in claim 1 wherein access to the data stored on the database is via a communications network.
17. A method as claimed in claim 16 wherein access is via the Internet.
18. A method as claimed in claim 1 wherein the veracity of the information which can be checked by accessing the data includes: a) verification of ownership for property offered for sale; and/or b) verification of ownership for personal property put in for repair; c) verification of ownership for personal property to be insured; d) authentication of the value of personal property that is insured or is to be insured; e) authentication or details of the owner of personal property found or recovered; f) identification of property subject to an insurance claim; 40 WO 00/51044 PCT/NZOO/00017 g) verification of whether or not personal property has been reported as stolen.
19. According to another aspect of the present invention there is provided a method of record keeping including the steps of: a) receiving a unique identifier for an entity; and b) receiving data relating to the entity identified; and c) storing the data in a database so the data is linked to that entity; and d) providing access to the data to selected users. the method characterised in that the database is operated independently of the entity to which the data relates and the data relates to personal property acquired by the entity.
20. A method as claimed in claim 18 wherein the data received includes stock data and the data recorded for an entity includes data for the fields which substantially correspond to the fields stated in claims 8 to 14.
21. A database created by the methods of either claim 1 or claim 18.
22. Data acquired by the methods of claim 1 or claim 18.
23. A method of operating a security system substantially as described herein with reference to any example and/or drawing thereof.
24. A method of record keeping substantially as described herein with reference to any example and/or drawing thereof. 41
AU27023/00A 1999-02-25 2000-02-24 Method of operating a security system Abandoned AU2702300A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
NZ33150499 1999-02-25
NZ331504 1999-02-25
PCT/NZ2000/000017 WO2000051044A1 (en) 1999-02-25 2000-02-24 Method of operating a security system

Publications (1)

Publication Number Publication Date
AU2702300A true AU2702300A (en) 2000-09-14

Family

ID=19926895

Family Applications (1)

Application Number Title Priority Date Filing Date
AU27023/00A Abandoned AU2702300A (en) 1999-02-25 2000-02-24 Method of operating a security system

Country Status (3)

Country Link
AU (1) AU2702300A (en)
NZ (1) NZ514043A (en)
WO (1) WO2000051044A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6830074B2 (en) * 2018-02-20 2021-02-17 株式会社Happy Price Reuse product distribution management system and reuse product distribution management method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5606507A (en) * 1994-01-03 1997-02-25 E-Stamp Corporation System and method for storing, retrieving and automatically printing postage on mail

Also Published As

Publication number Publication date
NZ514043A (en) 2001-09-28
WO2000051044A1 (en) 2000-08-31

Similar Documents

Publication Publication Date Title
US20220253868A1 (en) Title registration system and protocol
US7778841B1 (en) System and method for generating information relating to histories for a plurality of vehicles
US8234133B2 (en) Receipt insurance systems and methods
US20200111068A1 (en) Title Registration System and Protocol
US8849683B2 (en) Receipt insurance systems and methods
US20090070238A1 (en) Database system and method for tracking goods
US6898574B1 (en) Lender and insurer transaction processing system and method
US20060212357A1 (en) Method for integrated point-of-sale and web-based property registration and verification
US9697544B1 (en) System and method for generating information relating to a vehicle's history
US20020032626A1 (en) Global asset information registry
US20030050891A1 (en) Method and system for registration and tracking of items
US20110093401A1 (en) Recall exchange platform
US8577689B1 (en) Jewelry registration, verification and recovery system and method
US20120173411A1 (en) Management method of article
US20070219819A1 (en) Method and system for detecting title fraud
US20210233341A1 (en) Digital identification validation system
Buchanan et al. Investigating and prosecuting Nigerian fraud
US20020165741A1 (en) Method and system for providing registration and loss protection services to consumer jewelry owners
US20160267603A1 (en) Systems and Methods for Tracking and Validating Commodities Purchases
Clayton Investigative techniques
AU2702300A (en) Method of operating a security system
EP3991066B1 (en) A method for managing data and storing them in blockchain
AU2017100000A4 (en) QuodR is a software package designed to prevent insurance fraud and the trade of stolen goods in our communities, World-Wide.
US11756127B1 (en) Systems and methods for managing financial transaction information
Jacquez et al. The Fair Credit Reporting Act: Is It Fair for Consumers

Legal Events

Date Code Title Description
TC Change of applicant's name (sec. 104)

Owner name: ROSNIM LIMITED

Free format text: FORMER NAME: ASSETCARD HOLDINGS LIMITED