EP2646958A1 - Système et procédé de sécurisation - Google Patents

Système et procédé de sécurisation

Info

Publication number
EP2646958A1
EP2646958A1 EP11799498.8A EP11799498A EP2646958A1 EP 2646958 A1 EP2646958 A1 EP 2646958A1 EP 11799498 A EP11799498 A EP 11799498A EP 2646958 A1 EP2646958 A1 EP 2646958A1
Authority
EP
European Patent Office
Prior art keywords
plant
security system
asset
data
data file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP11799498.8A
Other languages
German (de)
English (en)
Inventor
Eamonn Kelly Brennan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP2646958A1 publication Critical patent/EP2646958A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management

Definitions

  • This invention relates to a security system and method and, in particular, to a security system and method for tracing plant and equipment.
  • plant and/or equipment is intended to embrace, inter alia, plant, equipment, tools, boats, yachts, agricultural machinery and equipment, quads, motorbikes, cars, vintage cars, domestic equipment, household equipment and commercial equipment and in general all plant and equipment at the risk of theft and which may be insurable.
  • system and method of the invention can be adapted for use with any or all of the above mentioned plant and equipment without departing from the scope of the invention.
  • the generic term "asset" is also employed to encompass the above mentioned terminology.
  • a security system for tracing plant or equipment comprising:
  • a database hub for receiving characterising data on the plant or equipment from a user
  • the security system is co-operable with third parties to facilitate the identification and recovery of the stolen plant or equipment.
  • the security system is web-based.
  • the security system is communicable online with the third parties.
  • the third parties are selected from the group comprising other users, law enforcement agencies, custom control agencies and insurance companies.
  • the security system further comprises a data file quality assessment function.
  • the data file quality assessment function is adapted to generate a star quality rating.
  • the data file quality assessment function is adapted for use in determining insurance premiums for the plant or equipment characterised in the data file.
  • the security system further comprises a for sale and/or a for hire function for plant or equipment.
  • the for sale and/or the for hire function is communicable online with external advertising websites.
  • the security system is accessible via a user mobile device.
  • the security system is adapted to record the GPS coordinates of the mobile device.
  • the asset comprises plant and the characterising data is selected from the group comprising a VIN number, a PIN number, an engine number, a front axle number, a rear axle number, a fleet number, a registration plate number, a chassis number, a plant make and a plant model.
  • the characterising data further comprises a photographic record of the plant.
  • the characterising data further comprises markings unique to the plant.
  • the invention also extends to a method for tracing an asset comprising:
  • the characterising data is received via the internet on a website and the data file is communicated to the third parties via the internet.
  • the characterising data is received via a mobile device on a website and the data file is communicated to the third parties via the mobile device.
  • the mobile device comprises a smartphone.
  • the method of the invention further comprises the step of assessing the quality of the data file.
  • the method further comprises the step of generating a star quality rating for the data file.
  • the asset comprises plant and the characterising data is selected from the group comprising a VIN number, a PIN number, an engine number, a front axle number, a rear axle number, a fleet number, a registration plate number, a chassis number, a plant make and a plant model.
  • the characterising data further comprises a photographic record of the plant. More preferably, the characterising data further comprises markings unique to the plant.
  • the invention relates to a computer readable medium containing program instructions for causing a computer to perform a method for tracing an asset comprising:
  • the invention also extends to a theft security method for an asset comprising a system as hereinbefore defined and to a computer readable medium containing program instructions for causing a computer to perform a method for tracing an asset as hereinbefore defined.
  • FIG. 1 is a schematic overview of the system of the invention
  • FIG. 2 is a block diagram of a computing device programmed in accordance with the invention.
  • FIG. 3 is a block diagram of a networked system of the invention in which client laptops and/or PC's are in communication with the hub of the invention via a Local Area Network (LAN), a Wide Area Network (WAN) or the internet employing personal computers, smartphones or the like;
  • LAN Local Area Network
  • WAN Wide Area Network
  • FIG. 3 is a block diagram of a networked system of the invention in which client laptops and/or PC's are in communication with the hub of the invention via a Local Area Network (LAN), a Wide Area Network (WAN) or the internet employing personal computers, smartphones or the like;
  • LAN Local Area Network
  • WAN Wide Area Network
  • Figure 4 is a general flow diagram of the security system and method of the invention
  • Figure 5 is a detailed flow diagram of the creation of a Data File, Star Rating Theft Check and Theft Report for a piece of plant or equipment in accordance with the system and method of the invention
  • Figure 6 is a general flow diagram of the security system and method of the invention adapted for use with smartphones and similar mobile devices.
  • the system and method of the invention assists insurance companies to efficiently underwrite contractors' plant insurance and generates significant claims savings in doing so for insurers of plant and equipment.
  • the system and method also assists insurers in identifying insured contractors' plant thereby reducing fraudulent claims, under-declaration and plant cloning.
  • the system of the invention is also communicable with suppliers of security devices such as tracking and registration systems to create a theft solutions hub to reduce plant theft.
  • an automatically generated theft report provides police forces with the detailed plant and equipment characterisation data required to effectively identify and recover stolen plant and equipment. The above mentioned actions can be achieved in real time.
  • the plant owner can be rewarded by the relevant insurance company with reduced excess charges and/or reduced premiums.
  • the system and method of the invention is adapted for use in the traceable buying, selling and hiring of plant.
  • the detailed characterisation and resultant traceability of plant and equipment provided by the method and system of the invention reduces the risk of theft, improves stolen plant and equipment recovery rates and increases profits.
  • the following terms are employed:
  • User - a person who registers and pays to use the system of the invention (via username and password access);
  • Visitor - a person who views a public website incorporating the system of the invention without registration
  • System Administrator an individual who performs housekeeping functions relating to the operation of the website;
  • Asset - an item with some unique identification code(s) entered in the database of the system of the invention;
  • Master File - a collection of all assets added to database for a specific account;
  • Sub-File a logical grouping of one or more assets from an account's Master File.
  • a sub-file may be used to represent the set of assets at a given location for a given account.
  • a system of the invention is made up of a number of general modules or services communicable with a database hub 1.
  • a system administrator module 2 communicates with the database hub 1 to operate the system.
  • a user also communicates with the database hub 1 via a user module 3 while reports for the user are generated by the database hub 1 and communicated to the user via a user reports hub 4.
  • a history check can be performed on plant and equipment via a history check module 5 accessible via a publicly accessible website while hire and sales of equipment can be performed employing the database hub 1 via a hire and sales module 6 also accessible via the public website.
  • the system of the invention is also provided with an export facility module 7 to trace export and/or import of plant and equipment while the database hub 1 is also communicable with insurance companies and law enforcement agencies (e.g.
  • FIG. 1 is a block diagram of a typical computing device 10 for use with the systems and methods of the invention.
  • the computing device 10 is made up of a processor 1 1 , RAM 12, ROM 13, memory 14 and an input/output module 15 for operating the computing device 10.
  • Application data in accordance with the invention is stored in RAM 12 in the form of tasks or applications 16 when the computing device 10 is in operation and software tasks are being performed by the computing device 10.
  • the computing device 10 can include various forms of computer readable media.
  • Apps 17, an operating system 18 and data 19 can be stored in the memory 14.
  • FIG 2 is a block diagram of a networked system 20 of the invention in which the computing devices 10 of Figure 2 in the form of user PC's 21 and/or laptops 22 adapted to implement the systems and methods of the invention as outlined further below are in communication with the hub 1 via the internet 23 from disparate locations and user types.
  • smartphones, tablets and other mobile devices can be used in combination with or in place of the PC's 21 and/or laptops 22.
  • the system shown in Figure 1 incorporates the following functions: - an Asset Management Database and associated business process/workflow to allow users to add details of their plant machinery to the database;
  • the modules or services described in Figure 1 are operated by sub-systems which serve as the main operating functions of the system of the invention. As will be described further below, the sub-systems are logically grouped to implement real functionality for end users. In a preferred embodiment of the invention, the subsystems are grouped as follows:
  • Tag/Fleet Reference this reference is used to allow users to cross reference any asset to their internal asset management system (e.g. Coins)
  • VIN Vehicle Registration Number is a standard 17 digit number used to uniquely identify road vehicles.
  • - Serial, Chassis or PIN Provide Information Number: The Serial Number identifies an off-road machine in the same way as a VIN. The numbers vary in format between manufacturers.
  • - Engine Number A serial number either on a plate or stamped which uniquely identifies the engine
  • attachment which uniquely identifies an attachment such as a bucket or a blade.
  • ° Search is based on chassis and serial/identification numbers entered ° User is given a warning in this case to re-check the details and/or to contact the System Administrator.
  • ° Security system has a structured form for entering the
  • the system distinguishes between a delete and a transfer by using a reason code.
  • More than one asset may be listed on a theft report
  • the user may approve the emailing of the theft report to system configured contacts e.g. the stolen vehicle unit, port authorities, etc.
  • This information may be used to publish a league table of most effective security tagging and tracking devices.
  • the system of the invention is also provided with a Sales and Hire module 6.
  • a user can search the Sales and Hire module 6 by:
  • the seller of the plant can then be contacted by email as required.
  • Plant Administrators would have full access to all functions required to manage all aspects of the plant Data Files a company owns including transfer of ownership and adding of new plant items.
  • Site Managers may manage one or more site files and associated plant machinery. However, Site Managers cannot transfer ownership or add new plant items but may update details of a plant item and instigate a stolen report. Other staff can be set up with read only or limited access to the system as required.
  • Plant Owner provides the insurance agencies and brokers with a report from the system of all information they require to attach to a policy application form.
  • Access by the police and security services may be granted by a Plant Owner via a security code.
  • This code is generated on the system by the plant owner and may be used by the police to access the full plant files information relating to a Theft Report.
  • the security services user will be required to:
  • the system of the invention incorporates a Star Rating System. Users are compelled by the system of the invention to maintain accurate and complete data about their assets which is supplied to their insurance
  • the format of the star rating system is "N Star (x%)" where N is the star rating from 1 to 5 and x% is a second dimension or qualifier to the star rating. For example, “3 Star (50%)”.
  • FIGS 4 and 5 are flow diagrams which illustrate the manner in which the above mentioned functions are inter-related to effect various transactions employing the system and method of the invention.
  • a plant owner user accesses the web-based system of the invention online to create plant Data Files for their plant or equipment.
  • Data entry is effected employing dropdown menus.
  • the plant to be registered is characterised according to Category, Make, Model, Identification Numbers, Uploaded Images or Video Footage, Theft Solution data relevant to the plant, Service History, Safety Checks, Ownership Records and Data Transfers, Insurance Details and Finance Details.
  • the Identification Numbers are selected from any or all of the VIN Number, PIN Number, Engine Number, Front and Rear Axle Number, Fleet Number, Registration Plate and Chassis Number.
  • the Theft Solutions data can include Other Registration Schemes (e.g. Cesar (Trade Mark)), Tracking Systems (e.g. Alatus (Trade Mark), Cobra Trak (Trade Mark), Sat Trak (Trade Mark)) and Marking Systems (Datatag (Trade Mark), SelectaMark (Trade Mark)).
  • Cesar Trade Mark
  • Tracking Systems e.g. Alatus (Trade Mark), Cobra Trak (Trade Mark), Sat Trak (Trade Mark)
  • Marking Systems Datatag (Trade Mark), SelectaMark (Trade Mark)
  • Marking Systems are made up of Data Dots, Transponders and the like.
  • the system of the invention is also adapted to record Unique Markings i.e. unique characterisation data based on unique markings on the plant or equipment.
  • Unique Markings can be made up of Unique Overt Markings (e.g. damage to the plant, engravings, stickers etc.), Unique Covert Markings (e.g. chemical tracing, microdots etc.) and Unique Concealed Markings.
  • Theft Solution data relating to Immobilisers, Isolators and Unique Keys can also be entered (e.g. Met Lock (Trade Mark), Kosran (Trade Mark)).
  • the data submitted by the Plant Owner user is collated by the system of the invention to create a Data File for the plant or equipment.
  • a Star Rating as described above is created for the plant and added to the Data File together with an automatically created Unique Reference Number.
  • a Plant Identification Disk is then created (incorporating a 2D or 3D readable Barcode Reference) which can be placed by the Plant Owner on the plant.
  • the Plant Identification Disk can be formed from destructible vinyl which breaks into smaller pieces (i.e. pixelates) should an attempt be made to remove the Disk.
  • the Barcode Reference is readable employing mobile phone technology
  • a Barcode Reader e.g. to determine whether an item of registered plant is stolen, the Barcode on the plant is photographed using a mobile phone and employing an app., the system of the invention is searched to determine whether the plant is listed as stolen (the Plant Owner having previously reported the plant as stolen).
  • suspect plant can be examined to compare its identity with the characterisation data recorded in the system of the invention i.e. searching can be conducted based on the entered characterisation data, the barcode or the Plant Reference Number.
  • the Plant Owner creates a Theft Report by entering details of the theft for the plant Data File.
  • the Theft Report includes details of the theft and is forwarded to a police Officer (who can alert Customs or Port authorities where appropriate).
  • the police Officer is permitted access to the system of the invention by generating a one-off Unique Security Code for use by one officer (Username and Password required).
  • the system of the invention is adapted to permit the police Officer to nominate another user. In this instance, a unique Security Code is generated that permits access to the nominee once he/she logs into the system.
  • a forensic trail is created by users that shows all viewings of the Theft Report and Data File.
  • the system of the invention is also communicable with the relevant Theft Solutions providers described above to notify the Theft Solutions Providers of the theft.
  • the Data File is adaptable to incorporate a default Geo-Fence to restrict movement of the plant to within a designated cordoned geographical area which can be read directly from the Data File or accessed via the Barcode reader.
  • the created Data Files on the system of the invention can be made available to view by the general public in a restricted format so that public users of the system can search the Data Files for plant to hire, purchase, value and also to investigate whether plant being offered for sale elsewhere is reported as stolen. Plant Owners can also offer their registered plant for sale or hire. In one
  • the system is provided with templates to extract data from the Data Files and to transmit this data to other websites and magazines in the form of advertisements for sale or hire.
  • the system of the invention is also provided with public access to enable the public to report sightings of stolen plant.
  • stolen plant can be reported as recovered and the Data File updated accordingly.
  • FIG. 6 is a flow diagram of a further embodiment of the invention for use with smartphones and other mobile devices such as iPhones (Trade Mark), iPads (Trade Mark) and the like which the functions described in relation to Figures 4 and 5 are employed in the mobile devices.
  • smartphones and other mobile devices such as iPhones (Trade Mark), iPads (Trade Mark) and the like which the functions described in relation to Figures 4 and 5 are employed in the mobile devices.
  • users can access the hub 1 at the website of the system of the invention via a mobile device to perform any of the desired range of functions as described above.
  • a user can perform a check to determine if an item of plant (i.e. an asset) is registered. Via the mobile device, the user can simply enter the Manufacturer's Identification Numbers (e.g. Serial Numbers, VIN, PIN, Transmission No., Engine Number, Axle Numbers, Component Numbers etc.) to search for a record of the plant. Alternatively, a search can be performed employing the Unique Reference Number from the ID Tag on the plant if present. Searches may also be performed based on ID Tag data from other Registration Schemes.
  • Manufacturer's Identification Numbers e.g. Serial Numbers, VIN, PIN, Transmission No., Engine Number, Axle Numbers, Component Numbers etc.
  • Searches may also be performed based on ID Tag data from other Registration Schemes.
  • the system and the user can therefore identify whether the plant is reported as stolen. If the plant is stolen, system automatically records the GPS position of the where the plant was viewed by the user and the owner and police can be alerted as before via email and/or text alerts as desired.
  • the user can be queried as to whether the user wishes to purchase the plant or whether the user wishes to verify a seller as the legal owner of the plant. In the latter instance, the seller (if present), is requested to enter the seller's PIN Number into the mobile device to access verification information such as photographs and Data Access Permits.
  • the purchaser can continue with the purchasing transaction in the usual manner safe in the knowledge that the seller is the rightful owner of the plant.
  • the owner can be alerted that there is no proof of ownership and that the transaction should not be proceeded with.
  • the owner can be alerted to the attempted potentially fraudulent transaction and given the GPS co- ordinates of the user.
  • the owner may elect to then report the plant as stolen where the owner cannot verify the location of the relevant plant item. A Theft Report is then generated in the usual manner.
  • the system and method of the invention therefore transforms data relating to plant into an identifiable fingerprint unique to individual assets such as plant and the like.
  • the method and system of the invention facilitates the rapid and efficient notification of police, port authorities, auction rooms, insurance companies and other bodies of the theft of an asset in real time. Accordingly, the likelihood of cross-border movement and sale of stolen assets is reduced and the likelihood of asset recovery increased.
  • GPS positioning technology in combination with the unique fingerprint of each asset also facilitates the immediate location of assets to prevent fraudulent sales and the reporting of stolen assets.
  • the method and system of the invention rewards and facilitates accurate record keeping of assets thereby further increasing the likelihood of stolen asset recovery.
  • the method and system of the invention acts as a theft deterrent due to the increased likelihood of detection and asset recovery.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Operations Research (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

L'invention concerne un système et un procédé de sécurisation destinés à effectuer un suivi d'un actif tel qu'une installation ou des équipements comprenant un concentrateur de base de données destiné à recevoir d'un utilisateur des données de caractérisation concernant l'installation ou les équipements ; une fonction de création de fichiers de données destinée à enregistrer les données de caractérisation dans un fichier de données afin d'identifier de manière unique l'installation ou l'équipement et une fonction de signalement de vol destinée à signaler le fait que l'installation ou l'équipement a été volé, le système de sécurisation pouvant coopérer avec des tiers afin de faciliter l'identification et la restitution rapide et immédiate de l'installation ou de l'équipement volé.
EP11799498.8A 2010-11-30 2011-11-29 Système et procédé de sécurisation Withdrawn EP2646958A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IES20100750 2010-11-30
PCT/IE2011/000062 WO2012073227A1 (fr) 2010-11-30 2011-11-29 Système et procédé de sécurisation

Publications (1)

Publication Number Publication Date
EP2646958A1 true EP2646958A1 (fr) 2013-10-09

Family

ID=45390141

Family Applications (1)

Application Number Title Priority Date Filing Date
EP11799498.8A Withdrawn EP2646958A1 (fr) 2010-11-30 2011-11-29 Système et procédé de sécurisation

Country Status (2)

Country Link
EP (1) EP2646958A1 (fr)
WO (1) WO2012073227A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105357217B (zh) * 2015-12-02 2018-11-16 北京北信源软件股份有限公司 基于用户行为分析的数据盗取风险评估方法和系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7424473B2 (en) * 2001-12-26 2008-09-09 Centricmedia, Inc. System and method for asset tracking with organization-property-individual model
US9536405B2 (en) * 2006-10-05 2017-01-03 Trimble Inc. Unreported event status change determination and alerting
CA2634951A1 (fr) * 2008-07-03 2010-01-03 Evan R. Jones Lecteur centralise de codes a barres

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2012073227A1 *

Also Published As

Publication number Publication date
WO2012073227A1 (fr) 2012-06-07

Similar Documents

Publication Publication Date Title
EP3577593B1 (fr) Intégrité d'enregistrements de données
US11681815B2 (en) Secure tracking of items utilizing distributed computing
US11367134B2 (en) Data processing system and method for facilitating transactions with user-centric document access
US6449611B1 (en) Business model for recovery of missing goods, persons, or fugitive or disbursements of unclaimed goods using the internet
US6898574B1 (en) Lender and insurer transaction processing system and method
US20140039935A1 (en) Insurance verification system (insvsys)
US8712873B2 (en) System for and method of remotely auditing inventoried assets
US20100161816A1 (en) Identity information services, methods, devices, and systems
US20130227653A1 (en) System and method for streamlined registration of products over a communication network and for verification and management of information related thereto
US20080109875A1 (en) Identity information services, methods, devices, and systems background
US20080114663A1 (en) Product resale system and method
US20140039934A1 (en) Insurance verification system (insvsys)
US20050209892A1 (en) [Automated system and method for providing accurate, non-invasive insurance status verification]
US20090287498A2 (en) System and method for streamlined registration of electronic products over a communication network and for verification and management of information related thereto
US20120089835A1 (en) System and Method for Automatic Authentication of an Item
JP2005514696A (ja) 組織−所有物−個人モデルによる資産追跡システム及びその方法
WO2000028445A2 (fr) Systeme et procede de traitement de transactions pour preteurs et assureurs
US7653625B1 (en) Method for validation of proper ownership for resale of goods
US20200013097A1 (en) Connectivity Hub with Data-Hiding Features
WO2006122343A1 (fr) Systeme et procede d'enregistrement d'actifs
WO2009071985A2 (fr) Système et procédé pour surveiller l'état de biens soumis à des droits
EP2646958A1 (fr) Système et procédé de sécurisation
JP2021177384A (ja) 自動車売買支援プログラム及び自動車売買支援システム
US20160048845A1 (en) Method for eliminating the use of paper in electronic transactions by legally valid manuscript biometrics, so-called formalised paperless solution
US11756127B1 (en) Systems and methods for managing financial transaction information

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20130626

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20160601