GB2493629A - System for auditing assets - Google Patents

System for auditing assets Download PDF

Info

Publication number
GB2493629A
GB2493629A GB1214275.8A GB201214275A GB2493629A GB 2493629 A GB2493629 A GB 2493629A GB 201214275 A GB201214275 A GB 201214275A GB 2493629 A GB2493629 A GB 2493629A
Authority
GB
United Kingdom
Prior art keywords
asset
data
machine readable
data input
input station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1214275.8A
Other versions
GB201214275D0 (en
Inventor
Michael Chowney
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ASSET WORKS Ltd
Original Assignee
ASSET WORKS Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ASSET WORKS Ltd filed Critical ASSET WORKS Ltd
Publication of GB201214275D0 publication Critical patent/GB201214275D0/en
Publication of GB2493629A publication Critical patent/GB2493629A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Quality & Reliability (AREA)
  • Theoretical Computer Science (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Development Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A system for auditing assets comprises a communications network a server and at least one data input station, at which data relating to an asset located at the station and bearing a machine readable encoded identification may be inputted. The data input station, for example a smart phone, communicates asset-related data to a remote server. The remote server is arranged to control and direct the at least one data input station for inputting of asset-related data. Attached to the data input station are a code reader adapted to read a machine readable encoded identification borne by an asset. E.g. a barcode, and a camera adapted to record an image of said machine readable encoded identification and/or of said asset. The remote server may provide messages to the smart phone to give instructions for operation and may obtain location data. The system may additional include an anti-tamper RFID label including a barcode.

Description

AUDITING ASSETS
This disdosure relates to the auditing of assets. In its several aspects a method for auditing assets and apparatus for auditing assets are disclosed.
Asset management is a critical part of any business that has ownership interest in one or more assets, particirlarly when those assets are high in number, dispersed over a wide geographical area, and capable of being dismantled or moved. By an "asset" in this context is meant a tangible asset such as plant or equipment.
Ideally, owners of assets should like to be able dearly to identify which assets belong to them and also know where assets are located along with their condition and usage data.
The need for effective asset management is even greater in situations where third parties have day to day use and control over the assets, for example leased or rented assets.
Those companies that do not maintain strong control over their assets are at a significant disadvantage and expose themselves to risks of asset related frauds and inefficiencies. For example, a lessor needs to know which assets they own and where they are located in order to aid recovery at the termination of a lease and also to provide confirmation that the lessee is still in possession of the asset (and has not committed an out of trust sale) during the life of the lease.
The first component of asset management is for an asset register of sufficient integrity to be maintained that will enable the owner of assets to accurately identify each asset that they own. Such data should include an asset's make, model, serial number and details of any options that may be fitted.
1-leretofore, the collation of data of this kind has typically been a manual process, whereby asset identification data is input into an asset management IT system from data contained on the original invoice for particular assets. In many cases, the invoice may contain insufficient or incomplete asset identification detail, such as absence of serial numbers; and the asset owner may not make further enquiries in order to determine the missing information. This results in poor asset data integrity within many organisations, particularly within the asset leasing industry.
Besides asset identification data, other important data for asset management include where an asset is located and its condition and usage. Even where it may not be practicable or cost-justifiable to track every asset's location, best practice dictates that regular location checks should be undertaken at a frequency appropriate to the asset's value and associated risk of its disappearance.
Currently, many businesses perform low v&umes of asset auditing, if they perform such audits at all. This is mainly because there are few available options and the associated costs are high. Typically, an audit of the location, condition and usage of an asset will involve sending a person to physically verify an asset's location and condition, or fixing a tracking device to an asset that regularly transmits its location via satellite or mobile phone networks to the asset's owner. Both of these options involve significant costs, and are generally only considered cost-effective for very high value assets.
Dealerships selling motor vehicles, or other assets, need to perform regular checks on their inventory to confirm the existence and location of assets that are in stock. This is needed for internal control and statutory audit purposes. Such dealerships use stock management IT systems that record the location of each individual asset following a physical check. However, larger dealerships may occupy multiple sites, with stock assets often being moved between these sites. Such movements are not always recorded in their stock management system. Accordingly, dealerships currently need to peifoim physical, on-site inventory audits at each of their sites on a regular basis. Such audits are time-consuming and costly to perform.
The present disclosure adopts a different approach to the auditing of assets, by which term we include checking on the existence andlor status not on'y of a plurality of assets, but even of a single asset. As will become clear from the detailed description below, this is inherently less costly, more reliaNe. and more accurate than current auditing systems involving physical checks, and is readily scalable to businesses of different sizes.
According to a first aspect of this disclosure, a system for auditing assets comprises: a communications network; at least one data input station adapted to communicate with the communications network, at which data input station data relating to an asset located at the station and bearing a machine readable encoded identification may be inputted, the data input station being adapted to communicate asset-related data to the communications network; a remote server coupled to the communications network, and adapted to receive asset-related data communicated to the network by said at least one data input station and to store such data in memory associated with the remote server; the remote server being further adapted to control and direct the at least one data input station for inputting of asset-related data; at a said data input station, both a code reader associated with a User and adapted to read a machine readable encoded identification borne by an asset located at said data input station and to a camera associated with the User and adapted to record an image of said machine readable encoded identification and/or of said asset; both the code reader and the camera being adapted for coupling to the communications network at the data input station for communicating said machine readable encoded identification or data derived therefrom by said code reader and said image(s) of said machine readable encoded identification and/or said asset as asset-i-elated data to said communications network when directed by said remote server.
The data input station need not have a fixed location. it may be mobile for the purpose of auditing assets at a plurality of geographical locations.
In a preferred arrangement, the data input station comprises a smartphone, the smartphone serving both as said code reader and as said camera, the smartphone including a camera adapted to record an image of a said machine readable encoded identification and/or asset, and being pie-loaded with applications software enabling the smartphone to i-cad said machine readable encoded data via its camera. Preferably the machine readable encoded identification includes data adapted for interaction with said applications software when read to cause said applications software automatically to communicate asset-rated data included in said machine readable encoded identification to said remote server via the communications network.
Preferably, the remote server is adapted to communicate with a said smartphone via the communications network providing messages directing the User for operation of the smartphone in sequential steps to i-cad a said machine readable encoded identification and to record an image of the machine readable encoded identification and/or of the asset using the smartphone's camera and to communicate such recorded image(s) to the remote server, and optionally to enter additiona' alphanumeric asset-rdated data via a keyboard associated with the smartphone. such additional alphanumerc asset-related data, optionally including one or more of make, model, serial number, condition and usage of the asset, and for communicating such additional alphanumeric asset-related data to said remote server.
The remote server preferably includes an interrogation engine adapted to interrogate the communications network and/or the data input station to identify the geographical location of the data input station; and the memory associated with the remote server being adapted to associate asset-related data communicated to said server from a said data input station with said geographical location in an asset audit database.
The system preferably also includes at least one data display station coupled to the network at (a) location(s) optionally remote from the remote server, said at least one data display station being adapted for password-controlled access via the communications network to said asset audit database or to selected data entries therein.
In a preferred arrangement, each of the at least one data input station is adapted to act as a data display station, the data input station including a monitor (preferably the display screen of the smartphone when the data input station comprises a smartphone) and communication between the data input station and the remote server upon reading of a machine readable encoded identification by the camera allows password controlled access to data in the asset audit database relating to the asset identified by the machine readable encoded identification and display of such data on said monitor, and optionally for amendment to such data by the User if allowed by the security level associated with their password.
In arrangements preferred for auditing of high value assets, the asset may additionally bear a radio frequency identification (REID), and the system additionally includes a RFID reader arranged to be coupled to the smartphone, preferably via BluetoothiM technology, for reading the RFID. The RFID may be provided on a label which is fixed to the asset, the RFID label including anti-tamper features that render the RFID inoperable if the label is removed from an asset. The RFID suitably includes an antenna and an electronic chip bearing a unique identification and coupled to the antenna, and the anti-tamper features may be provided by mounting the chip and antenna on a label substrate to form the RFID label, and by providing adhesives of different strengths between the chip and antenna and the substrate and between the label and the asset so that, upon an attempt being made to remove the label from the asset, the antenna is destroyed and/or the chip is removed from an electronic circuit comprising the chip and the antenna, so that the REID is rendered inoperative. The machine readable encoded identification may be printed on the RFID label.
In a second and alternative aspect of this disclosure, there is provided a method for auditing assets, the method comprising the steps of: employing a code reader at a data input station to read a machine readable encoded identification borne by an asset located at the data input station; recording an image of the machine readable encoded identification and/or of the asset itself using a camera located at the data input station; and communicating both said machine readable encoded identification or data derived therefrom by said code reader and said image(s) of said machine readable encoded identification andlor said asset as asset-related data via a communications network to a remote server.
Preferably, the data input station comprises a smartphone serving both as said code reader and as said camera, the smartphone including a camera that can record an image of a said machine readable encoded identification and/or asset, and being pre-loaded with applications software enabling the smartphone to read said machine readable encoded data via its camera. Preferably the machine readable encoded identification interacts with said applications software when read to cause the applications software automatically to communicate asset-rated data included in said machine readable encoded identification to said remote server via the communications network.
Preferably, the remote server provides messages via the communications network directing the User for operation of the smartphone in sequential steps to read a said machine readable encoded identification and to record an image of the machine readable encoded identification and/or of the asset using the smartphone' s camera and to communicate such recorded image(s) to the remote server, and optionally to enter additional alphanumeric asset-related data via a keyboard associated with the smartphone, such additional alphanumeric asset-related data, optionally including one or more of make, model, serial number, condition and usage of the asset, and for communicating such additional alphanumeric asset-related data to said remote server.
Preferably, the remote server interrogates the communications network and/or the data input station to identify the geographical location of the data input station; and an asset audit database associates asset-related data with the geographical location at which that asset-related data was produced.
The asset audit database or to selected data entries therein may be displayed at at least one data display station coupled to the network at (a) location(s) optionaHy i-emote from the remote server employing password-controlled access.
Each of the at least one data input station may act as a data display station, and communication between the data input station and the remote server upon reading of a machine readable encoded identification by the camera allows password controlled access to data in the asset audit database relating to the asset identified by the machine readable encoded identification and display of such data on a monitor at the data input station, and optionally allows amendment to such data by the User if allowed by the security level associated with their password.
Embodiments of methods and systems for auditing assets employing the teachings of this disclosure are described hereinbelow by way of example only with reference to the accompanying drawings, in which: Fig. I schematically illustrates an embodiment of a system for providing an audit of assets; Fig. 2 is of assistance in explaining the management of authorised users of the system; Fig. 3 shows an example of displayed data derived from an asset audit database created and maintained using the teachings of this disclosure; Fig. 4 provides an example of a report created detailing irregularities apparent as the result of an asset audit; Fig. 5 shows a smartphone display; and Fig. 6 shows a RFID label and reader.
A machine readable encoded identification 1 is applied to each of a plurality of assets to be audited. The assets may comprise obviously mobile tangible assets such as the dozer-truck 2 shown in Fig. 1, or less obviously mobile assets such as industrial plant or a packaging line. The machine readable encoded identification preferably comprises a two-dimensional bar code. A number of two-dimensional barcode systems are commercially available, including those available under the respective Trademarks Data MatrixTM, AztecrM, MaxiCodetM, Se,nacoderM, Microsoft TagLM, and, in particular, QRFM code.
For reasons that will become apparent bdow. we prefer the use of QR codes for the reason that code reading application software capable of reading QR codes is incorporated into or readily freely available for the majority of currently available smartphones. Thus, by way of example: QR codes can be read by Google's mobile AndroidTM operating system via the Google GogglestM application or via certain third-party barcode scanner applications; Nokia's Symbian'TM operating system is provided with a barcode scanner, which is able to read QR codes; although Apple's operating system for its iPhoneiM smartphone does not include a QR code reader, QR Code reading apps can be freely downloaded for the iPhoneTM mobile phone; and BlackBerrytM devices include a scanner for QR codes. An example of a QR code is shown at 1 on label 3. There are numerous ways in which a two-dimensional barcode may be applied to an asset, including printing the two-dimensional barcode on to an asset label that is then fixed to the asset, incorporating the two-dimensional barcode into the manufacturer's identification plate, or by printing, etching or otherwise marking the two-dimensional barcode directly on to the asset itself. The machine readable encoded identification may be covert. Thus, in place of a regular visible code, a covert code may be printed in ultraviolet or infrared ink. A covert code may even be overprinted on top of a visible code, thus deterring copying of labels, since, in general, copying will only copy the visible code. The manner in which the code is applied to the asset should deter or make tampering apparent. Typically, the code may be affixed to the asset by use of a durable, adhesive asset label 3. hi a preferred arrangement, asset label 3 is made from high density polyethylene suitable for thermal overprinting and protective lamination. We have found that a base material weight of 75gsm, with a 5% tolerance gives good results. Preferably, the label adhesive will be based on deep freeze substrates to cope with condensing environments giving an inherent water resistance. The adhesive should preferably prove stable in conditions between -40°C & +80°C.
The asset label itself can also include other technologies and features such as the use of radio frequency identification (RFID) components, thus allowing the asset label to be additionally readable using RFID reading devices, as explained in more detail below with reference to Fig. 6.
As an alternative to a label, the two-dimensional bar code and/or a RFID may be embedded in the glazing set of the asset, if a vehicle, for example in the vehicle windscreen.
The two-dimensional barcode 1 will contain re-direct instructions via a communications network 4. suitably a global communications network such as the Internet, to a URL that identifies a remote server 5 for purposes to be explained below. In addition, an alphanumeric identifier 6, in this example in hexadecimal code, may also be applied to the asset label.
Fig. 1 also shows a company logo 7 on the asset label 3. This will enable a lessor for the asset to mark their asset with a visual statement as to their ownership interest, thereby deterring certain frauds perpetrated by lessees, such as fraudulent multiple lease financing. Fraudulent multiple lease financing is where a lessee undertakes a sale and leaseback (whereby the purported owner of the asset raises funds by selling it to a lessor who then immediately leases it back) with more than one lessor at the same time.
Typically, when approached for a sale and leaseback deal, a lessor will conduct an on-site inspection of the asset prior to completing the transactions and releasing funds and is likely to notice any on-asset statement of interest from another lessor.
As explained below, any authorised user equipped with a smartphone 8 may audit an asset 2 located at a data input station, namely the location where the user of the smartphone is located. This is a key feature in reducing the cost of performing an audit, as a user inputting data at a data input station (who may be the lessee) will typically possess their own srnartphone, reducing the capital expenditure in implementation of a system for conducting asset audits.
By virtue of the smartphone 8 incorporating software for reading a QR code 1 on label 3 affixed to asset 2, or being loaded with readily available applications software for doing this, smartphone 8 may serve as a code reader by exposing the smartphone's camera to the QR code I. To guard against the possibility that the label may have been removed from the asset, or its QR Code may have been previously copied into the smartphone to facilitate a fraudulent audit, we consider it essential to additionally provide image confirmation that the label exists and is affixed to the asset, and preferably also of the condition of the asset (whether it appears visually still to be in serviceable condition and whether it has been altered). Accordingly, in addition to employing the smartphone camera as a QR reader, that same camera is employed to record an image of the label or of the asset, and preferably images of both.
In addition to asset-specific machine readable encoded identification, the QR code incorporates instructions which, when read cause the smartphone to communicate with a specific URL (namely that of remote server 5) over the global communications network 4.
The technology to achieve this is readily available commercially since magazine advertisements increasingly include a QR code that will link a reader with the advertiser's website when read by a smartphone. In the present case, connection with server 5 will set up two-way web connected communications between the smai-tphone 8 and server 5.
Messages from server 5 are displayed on the display screen of smartphone 8, and suitably direct the user to record an image of the QR code 1, label 3 andlor asset 2. Preferably all three are required, offering reassurance that the label has not been tampered with, is still affixed to the asset, and confirming the visible condition and visible appearance of the asset. The in-built camera in the smartphone is employed to record such images and to upload these via the communications network 4 to server 5. As further explained below with reference to Fig. 6, incorporation of REID components can provide enhanced security against a fraudulent audit.
If the a user is employing a mobile phone other than a typical smartphone, and displaying content provided by the server via mobile internet browser software, the user may need to exit this software in order to select the in-built camera application for the image recordal. However, with a typical smartphone. the user will usually be able to click on an Tniage' button, which will interact with the appropriate application program interface in order to launch the camera application in photo mode without needing to exit the smartphone software communications application. Once the required photograph(s) are taken, the image(s) is (are) stored within memoly, and the user selects "upload image" from either the mobile internet browser or smartphone software application and chooses the appropriate image(s) from the memory. Once confirmed, the image(s) is care) uploaded to server 5 via a mobik phone connection to communications network 4.
Server 5 includes memory that stores the machine readable encoded identification or data derived therefrom by the code reader and image(s) of the machine readable encoded identification andlor the asset itself as asset-related data (for example, as illustrated in Fig. 3) in an asset audit database.
Although use of a smartphone is preferred, as it incorporates both a code reader and a camera, these may be provided as separate components with appropriate applications software, provided that these separate components may be coupled to the communications network at the data input station.
The server 5 may additionally direct a User to enter additional alphanumeric asset-related data via a keyboard associated with the smartphone 8. This additional alphanumeric asset-related data may include the alphanumeric identifier 6, make, model, serial number, condition or usage of the asset.
The server 5 includes an interrogation engine which interrogates the smartphone 8 or other device serving as a data input station of the telephone system to which it is connected to determine the geograplucal location of the data input station by means of GPS or assisted GPS services that access data from a global navigation satellite system (GNSS) 9. Some devices that could be employed as data input stations for communicating to the communications network 5 may not possess OPS functionality, in which case an approximate geographical location may still be obtained by cell tower or wireless access point trianu1ation. The server 5 will store this determined location of the data input station with data derived from the two-dimensional barcode in the asset-related data for that particular asset stored in the asset audit database at server 5 (See. for example locations 10 in the example of asset-related data shown in Fig. 3).
In addition to smartphone 8 acting as the data input station, additional devices serving as data display stations 11 may be coupled to the communications network 4, as shown in Fig. 1. These may take various forms, including mobile phone devices 12 coupled via the mobile phone system to the network 4, devices 13 coupled directly via their browsers to the network and devices 14 coupled by Ethernet or Intranet to a server 15 which is coupled to the network 4. Thus, for example, a particular Lessee may have a family of assets all leased from an owner associated with serverS. Data for this family of assets may be downloaded from server S to the Lessee's server 15 via network 4 for access by that Lessee's authorised staff via their respective devices 14 coupled to the Lessee's computer system.
The system may provide for authorised Users to amend or delete data related to a specific asset in the asset audit database via a data input station such as smartphone 8, or via a data display station 11. A User will need to seek such authorisation and will be issued with a username and password, details of which will be recorded in a password memory associated with server 5.
Referring to Fig. 2, a particular company wishes to grant authorised user statns to three employees 16. A co-ordinator 17 for that company provides the email addresses for the three employees 16 via communications network 4 to server 5. Server 5 will then email unique passwords to each of these three employees 16 via the network 4. On a regular basis, the co-ordinator 17 is required to confirm each of the email addresses that still require authorised user status. If any of the employees 1 leaves the company, they should no thnger have authorised user status, and access privileges for the specific email address concerned will be revoked on server 5 when the appropriate communication is received from co-ordinator 17.
An audit session may be commenced by communication of a two-dimensional barcode 1 to server S by a data input station such as smartphone 8 (Figs. I and 5).
Although this will result in server 5 accessing the related data in its asset audit database and interrogating the geographical location, it will initially display only very limited data on display screen 18 of smartphone 7, as shown in Fig. 5. In this case, all that is displayed is the asset's make, model and serial number at 19, together with input fields for the User to input their username 20 and password 21 to fully log-in to the system. Following a successful log-in, then, depending on the level of security associated with the User identified by that username and password, additional data for that asset will be displayed, and may be editable by the User.
In the case of a new leased asset, the authorised User, once logged in, will also be able electronically to communicate from their data input station their initial receipt and acceptance of the asset. Receipt of this data may prompt start of the lease. It will be readily appreciated that this greatly simplifies lease inception as compared with current manual systems.
Following log-in, the User is prompted to record an image of the coded label andior of the asset itself, and preferably both and to upload such image 22 to the data record for the particular asset (Fig. 3) in the asset audit database.
Thus it will be seen that the present system provides a simple method of capturing the initial asset identification data and also the geographic location of the asset, and this data is suitably veilfied or amended each time an on-going audit is performed for the asset in question.
The capture of a recorded image of the asset itself, enables visual inspection to confirm that the asset still exists, is in serviceable condition, and has not been altered in unauthorised fashion. Digital images should be date-stamped on capture confirming that the image was captured at the time of the audit.
1-lowever, for added security, use is additionally made of RFID technology Wig. 6).
Printed RFID labels are readily available commercially. While the geometry of individual labels will differ, a REID label 23 will comprise a label substrate 24 bearing both a data chip 25 input with a unique code and an antenna 26 coupled to the chip in an electronic circuit and, where the label is active as opposed to passive, also a battery to increase read range. Preferred RFID labels for our purpose also incorporate anti-tamper features whereby the label is made inoperable if removed from an asset. This can be achieved, for example, by using adhesive compounds of different strengths in the label between the substrate and the antenna and chip, so that the antenna is destroyed if an attempt is made to remove the label from the asset. In some anti-tamper labels, the effect of removing an affixed label may also remove the chip from a circuit including the antenna. It will readily be appreciated that a REID label may be printed with a QR code 1, so that one and the same label serves both as a QR label and as a REID label, and, by virtue of the anti-tamper features discussed above, can readily indicate whether the label has been removed from the asset to which it was affixed.
Some RFID labels operate over a short range, in which case a portable RFID reader will need to used in proximity to the smartphone. Connection between the reader and the smartphone may be by cable, as for example via a USB cable, but we prefer the use of a mobile, battery operated, REID reader 27 with BluetoothTM connectivity to the smartphone. Suitable such readers are readily available from various sources.
The advantage of employing additional REID technology, especially with the tamper-proof label technology is that the REID label must be present in the immediate proximity of the reader to be read, confirming that the specific asset to which the label is affixed is at the GPS location of the smartphone at the time the reading is taken, whereas someone intent upon a fraudulent audit might seek to use the smartphone to read a photocopied version of the QR code and use the camera to take an image of a different, but closely similar asset present at the GPS location when the real asset is elsewhere. For lesser value assets, we consider the combination of QR code reading and image to suffice, but for especially valuable assets, we prefer the audit additionally to require a REID label to be read.
The data record (Fig. 3) for a particular asset may be viewed (if not also amended) by any authorised User having need to check the asset database.
Reports 28 (Fig. 4) and alerts can also be generated. Thus, for example, as illustrated in Fig. 4. assets may be leased by Lessor 29 to a Lessee 30 for a specific geographical area. Since the geographical location of any particular asset is recorded each time an audit is conducted, any unexpected thcation 31 maybe recorded in Report 28.
It will readily be appreciated that the embodiments of our system described in detail hereinabove simplify and streamfine asset and inventory management processes, by replacing existing time-consuming and expensive manual processes with a technological solution. The system can provide both improved data integrity and a richness in available data not previously available for lessors, dealers, manufacturers and end users who may employ the system. The system will deter lessee fraud, as the lessee will be aware of the lessor's greater interest and control over the asset. The location of an asset or stock item and its visible appearance can be determined whenever desired by requiring an audit to be conducted. Asset owners, are able to access the available data as desired for the benefit of their business, induding enhancement of their asset management processes by greater control and visibility over their asset portfolios.

Claims (1)

  1. <claim-text>Claims 1. A system for auditing assets comprising: a communications network; at least one data input station adapted to communicate with the communications network, at which data input station data relating to an asset located at the station and bearing a machine readable encoded identification may be inputted, the data input station being adapted to conrnmnicate asset-related data to the communications network; a remote server coupled to the communications network, and adapted to receive asset-related data communicated to the network by said at least one data input station and to store such data in memory associated with the remote server; the remote server being further adapted to control and direct the at least one data input station for inputting of asset-related data; at a said data input station, both a code reader associated with a User and adapted to read a machine readable encoded identification borne by an asset located at said data input station and a camera associated with the User and adapted to record an image of said machine readable encoded identification and/or of said asset; both the code reader and the camera being adapted for coupling to the communications network at the data input station for communicating said machine readable encoded identification or data derived therefrom by said code reader and said image(s) of said machine readable encoded identification and/or said asset as asset-related data to said communications network when directed by said remote server.</claim-text> <claim-text>2. A system for auditing assets according to Claim 1, wherein the at least one data input station is mobile, enabling auditing of assets at a plurality of geographical locations by one and the same data input station.</claim-text> <claim-text>3. A system for auditing assets according to Claim 1 or 2, wherein the at least one data input station comprises at least one smartphone, the smartphone serving both as said code reader and as said camera, the smartphone including a camera adapted to record an image of a said machine readable encoded identification and/or asset, and being pre-loaded with applications software enabling the smartphone to read said machine readable encoded data via its camera.</claim-text> <claim-text>4. A system for auditing assets according to Claim 3, wherein the machine readable encoded identification includes data adapted for interaction with said applications software when read to cause said applications software automatically to communicate asset-rated data included in said machine readable encoded identification to said remote server via the communications network.</claim-text> <claim-text>5. A system for auditing assets according to Claim 3 or 4, wherein the remote server is adapted to communicate with a said smartphone via the communications network providing messages directing the User for operation of the smartphone in sequential steps to read a said machine readable encoded identification and to record an image of the machine readable encoded identification and/or of the asset using the smartplione' s camera and to communicate such recorded image(s) to the remote server, and optionally to enter additional alphanumeric asset-related data via a keyboard associated with the smartphone, such additional alphanumeric asset-related data, optionally including one or more of make, model. serial number, condition and usage of the asset, and for communicating such additional alphanumeric asset-related data to said remote server.</claim-text> <claim-text>6. A system for auditing assets according to any preceding Claim, wherein the remote server includes an interrogation engine adapted to interrogate the communications network and/or the at least one data input station to identify the geographical location of the at least one data input station; and the memory associated with the remote server being adapted to associate asset-related data communicated to said server from a said data input station with said geographical location in an asset audit database.</claim-text> <claim-text>7. A system for auditing assets according to any preceding Claim, wherein the system also includes at least one data display station coupled to the network at (a) location(s) optionally remote from the remote server, said at least one data display station being adapted for password-controlled access via the communications network to said asset audit database or to selected data entries therein.</claim-text> <claim-text>8. A system for auditing assets according to Claim 7, wherein each of the at least one data input station is adapted to act as a data display station, the data input station including a monitor (preferably the display screen of the sniartphone when the data input station comprises a smartphone); and wherein the remote server, upon reading of a machine readable encoded identification by the camera, allows password controlled access to data in the asset audit database relating to the asset identified by the machine readable encoded identification and display of such data on said monitor, and optionally for amendment to such data by the User if allowed by the security level associated with their password.</claim-text> <claim-text>9. A system for auditing assets according to Claim 3 or any Claim appendent thereto, wherein the asset additionally bears a radio frequency identification (REID), and wherein the system additionally includes a REID reader arranged to be coupled to the smartphone, preferably via BluetoothTM technology, for reading the REID.</claim-text> <claim-text>10. A system for auditing assets according to Claim 10, wherein the REID is provided on a label which is fixed to the asset, and the RFID label includes anti-tamper features that render the RFID inoperable if the label is removed from an asset.</claim-text> <claim-text>II. A system according to Claim 10, wherein the REID label comprises a label substrate and an antenna and an electronic chip bearing a unique identification coupled to the antenna in an electronic circuit mounted on the substrate, and wherein the anti-tamper features include adhesive compounds with different strengths between the substrate and the antenna and/or chip and between the label and the asset, whereby the antenna is destroyed andlor the chip is removed from the circuit, if an attempt is made to remove the label from the asset.</claim-text> <claim-text>12. A system for auditing assets according Claims 10 or I I, wherein the machine readable encoded identification is printed on the RFID label.i3. A method for auditing assets, the method comprising the steps of: employing a code reader at a data input station to read a machine readable encoded identification borne by an asset located at the data input station; recording an image of the machine readable encoded identification andlor of the asset itself using a camera located at the data input station; and communicating both said machine readable encoded identification or data derived therefrom by said code reader and said image(s) of said machine readable encoded identification and/or said asset as asset-related data via a communications network to a remote server.14. A method for auditing assets according to Claim 13, wherein the data input station comprises a smartphone serving both as said code reader and as said camera, the smartphone including a camera that can record an image of a said machine readable encoded identification and/or asset, and being pre-loaded with applications software enabling the smartphone to read said machine readable encoded data via its camera.15. A method for auditing assets according to Claim 14, wherein the machine readable encoded identification interacts with said applications software when read to cause the applications software automatically to communicate asset-related data included in said machine readable encoded identification to said remote server via the communications network.16. A method for auditing assets according to Claims 14 oi 15, wherein the remote server provides messages via the communications network directing the User for operation of the smartphone in sequential steps to read a said machine readable encoded identification and to record an image of the machine readable encoded identification and/or of the asset using the snrnrtphone's camera and to communicate such recorded image(s) to the remote server, and optionally to enter additional alphanumeric asset-related data via a keyboard associated with the smartphone, such additional alphanumeric asset-related data, optionally including one or more of make, model, serial number, condition and usage of the asset, and for communicating such additional alphanumeric asset-related data to said remote server.17. A method for auditing assets according to any of Claims 13 to 16, wherein the remote server interrogates the communications network and/or the data input station to identify the geographical location of the data input station; and an asset audit database associates asset-related data with the geographical location at which that asset-related data was produced.18. A method for auditing assets according to any of Claims 13 to 17, wherein the asset audit database or selected data entries therein may be displayed at at least one data display station coupled to the network at (a) ocation(s) optionally remote from the remote server employing password-controlled access.19. A method for auditing assets according to Claim 18, wherein each of the at least one data input station may act as a data display station, and communication between the data input station and the remote server upon reading of a machine readable encoded identification by the camera allows password controlled access to data in the asset audit database relating to the asset identified by the machine readable encoded identification and display of such data on a monitor at the data input station, and optionally allows amendment to such data by the User if allowed by the security level associated with their password.20. A method for auditing assets according to any of Claims 13 to 19, including the further step of reading a RFID borne by the asset.21. A method according to Claim 20, wherein the REID is mounted on a label affixed to the asset, and is tamper resistant, being rendered inoperative if an attempt is made to remove the label from an asset to which it was affixed.22. A system for auditing assets, the system being substantially as hereinbefore described with reference to and as shown in the accompanying drawings.23. A method for auditing assets, the method being substantially as hereinbefore described with reference to the accompanying drawings.</claim-text>
GB1214275.8A 2011-08-09 2012-08-09 System for auditing assets Withdrawn GB2493629A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GBGB1113687.6A GB201113687D0 (en) 2011-08-09 2011-08-09 Auditing assets

Publications (2)

Publication Number Publication Date
GB201214275D0 GB201214275D0 (en) 2012-09-26
GB2493629A true GB2493629A (en) 2013-02-13

Family

ID=44735635

Family Applications (2)

Application Number Title Priority Date Filing Date
GBGB1113687.6A Ceased GB201113687D0 (en) 2011-08-09 2011-08-09 Auditing assets
GB1214275.8A Withdrawn GB2493629A (en) 2011-08-09 2012-08-09 System for auditing assets

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GBGB1113687.6A Ceased GB201113687D0 (en) 2011-08-09 2011-08-09 Auditing assets

Country Status (2)

Country Link
GB (2) GB201113687D0 (en)
WO (1) WO2013021158A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IT201900012333A1 (en) * 2019-07-19 2021-01-19 Logibiotech Srl PROCEDURE FOR ARCHIVING AND TRACEABILITY OF CITO-HISTOLOGICAL SLIDES AND HISTOLOGICAL BIOCASSETTES

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11610183B2 (en) 2017-06-29 2023-03-21 Walmart Apollo, Llc Systems and methods for performing and tracking asset inspections
US11427232B2 (en) * 2019-10-16 2022-08-30 Bnsf Railway Company Systems and methods for auditing assets

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030031819A1 (en) * 2001-07-17 2003-02-13 Adams Matthew Thomas Tamper evident label with transponder employing multiple propagation points
US20040128613A1 (en) * 2002-10-21 2004-07-01 Sinisi John P. System and method for mobile data collection
US20040177032A1 (en) * 2003-03-03 2004-09-09 Bradley A. (Tony) W. System, method, and apparatus for identifying and authenticating the presence of high value assets at remote locations
US20070156492A1 (en) * 2005-12-30 2007-07-05 Enfotrust Networks, Inc. Systems and methods for managing asset installation and evaluation
US20100121480A1 (en) * 2008-09-05 2010-05-13 Knapp Systemintegration Gmbh Method and apparatus for visual support of commission acts
WO2011005513A1 (en) * 2009-06-22 2011-01-13 Kd Secure Llc An inspection compliance system using a handheld device, and related methods for facilitating inspections and maintenance operations
WO2011009130A2 (en) * 2009-07-17 2011-01-20 Primary Marking Systems, Inc. Systems and methods for the tracking of evidence

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EE05523B1 (en) * 2005-12-30 2012-02-15 Priit@Vimberg Method and system for unified resource management and management
NZ572768A (en) * 2006-05-09 2011-10-28 Ticketmaster Apparatus for access control and processing
WO2008047387A2 (en) * 2006-10-17 2008-04-24 Speck System Limited A system for land record information management
EP2209301A1 (en) * 2008-12-04 2010-07-21 Alcatel, Lucent Camera control method for remote controlling a camera and a related camera control server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030031819A1 (en) * 2001-07-17 2003-02-13 Adams Matthew Thomas Tamper evident label with transponder employing multiple propagation points
US20040128613A1 (en) * 2002-10-21 2004-07-01 Sinisi John P. System and method for mobile data collection
US20040177032A1 (en) * 2003-03-03 2004-09-09 Bradley A. (Tony) W. System, method, and apparatus for identifying and authenticating the presence of high value assets at remote locations
US20070156492A1 (en) * 2005-12-30 2007-07-05 Enfotrust Networks, Inc. Systems and methods for managing asset installation and evaluation
US20100121480A1 (en) * 2008-09-05 2010-05-13 Knapp Systemintegration Gmbh Method and apparatus for visual support of commission acts
WO2011005513A1 (en) * 2009-06-22 2011-01-13 Kd Secure Llc An inspection compliance system using a handheld device, and related methods for facilitating inspections and maintenance operations
WO2011009130A2 (en) * 2009-07-17 2011-01-20 Primary Marking Systems, Inc. Systems and methods for the tracking of evidence

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IT201900012333A1 (en) * 2019-07-19 2021-01-19 Logibiotech Srl PROCEDURE FOR ARCHIVING AND TRACEABILITY OF CITO-HISTOLOGICAL SLIDES AND HISTOLOGICAL BIOCASSETTES

Also Published As

Publication number Publication date
WO2013021158A2 (en) 2013-02-14
GB201113687D0 (en) 2011-09-21
GB201214275D0 (en) 2012-09-26
WO2013021158A3 (en) 2013-11-07

Similar Documents

Publication Publication Date Title
US10387695B2 (en) Authenticating and managing item ownership and authenticity
US10152720B2 (en) Authentication tags and systems for golf clubs
US20170053293A1 (en) System and method for streamlined registration and management of products over a communication network related thereto
CN101960896B (en) System and method for streamlined registration of electronic products over a communication network and for verification and management of information related thereto
US11301576B2 (en) Secure data delivery system
US9449325B2 (en) System and method for authenticity verification
US7774268B2 (en) System, method, and apparatus for identifying and authenticating the presence of high value assets at remote locations
US8712873B2 (en) System for and method of remotely auditing inventoried assets
US20160210547A1 (en) Identification Tag with Magnet Attachment and System for Supply Chain Management
US20180107914A1 (en) System for tracking inventory (used or new) using one or more of a multiplicity of identification methods optionally including but not limited to rfids and a database management system
CN112470441A (en) Secure tracking of items using distributed computing
US20110231316A1 (en) Method, system and computer readable media containing a program for identifying whether a product is genuine
US20150035650A1 (en) System and Method Employing Near Field Communication and QR Code Technology to Access and Manage Server-Side Personal and Business Property Security Status Accounts
US9373015B2 (en) Asset verification and tagging
US20110078074A1 (en) Systems, methods, and media for industry resource management and contract management
US20120173411A1 (en) Management method of article
CN101599129A (en) Provide service method, correspondence markings and tag reading device based on label information
US20010053949A1 (en) Secure tracking of articles
KR101798603B1 (en) Manufacturing method of label comprising a code for certificating an item&#39;s authentication
GB2493629A (en) System for auditing assets
Ting et al. A two-factor authentication system using radio frequency identification and watermarking technology
US20090265791A1 (en) Method a system and a unit for controlling listing of items on electronic market databases
WO2017195084A2 (en) Method and network-based utility for virtual unique identification, monitoring and lifecycle management of an asset
CN203204620U (en) Medical staff vocational qualification fast querying monitoring system
KR100718799B1 (en) Billing service system and method thereof using rfid

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)