WO2014041567A2 - A system for monitoring objects - Google Patents

A system for monitoring objects Download PDF

Info

Publication number
WO2014041567A2
WO2014041567A2 PCT/IN2013/000559 IN2013000559W WO2014041567A2 WO 2014041567 A2 WO2014041567 A2 WO 2014041567A2 IN 2013000559 W IN2013000559 W IN 2013000559W WO 2014041567 A2 WO2014041567 A2 WO 2014041567A2
Authority
WO
WIPO (PCT)
Prior art keywords
objects
server
pid
user
identity
Prior art date
Application number
PCT/IN2013/000559
Other languages
French (fr)
Other versions
WO2014041567A3 (en
WO2014041567A4 (en
Inventor
Satish DULIPATI. V
Original Assignee
Dulipati V Satish
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dulipati V Satish filed Critical Dulipati V Satish
Publication of WO2014041567A2 publication Critical patent/WO2014041567A2/en
Publication of WO2014041567A3 publication Critical patent/WO2014041567A3/en
Publication of WO2014041567A4 publication Critical patent/WO2014041567A4/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0492Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • H04W4/027Services making use of location information using location based information parameters using movement velocity, acceleration information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Definitions

  • the present invention relates to a system and method for secure real-time monitoring of objects that include machinery, equipment, products, material, valuables, packages, assets, documents and files within and outside business, manufacturing, official and administrative premises.
  • the present invention relates to a network based integrated, shareable, multi-user system that monitors the objects within and outside any premises.
  • the present invention relates to system implemented method that securely monitors in real-time, the authenticated ownership, movement, transfer and responsibility of objects without any restriction to location.
  • the present invention further provides automatic data recording, acquisition, processing, analysis, storage, transmission and reporting through wired or wireless means, thereby saving time and resources as well as improving overall monitoring efficiency, accuracy of database of objects.
  • a tracking and monitoring system is known in prior art that enables reporting of asset position, status, and alerts.
  • the system comprises of local and wide area monitoring systems that work together to provide container tracking and monitoring.
  • a tracking system which monitors movement or status changes of objects in the controlled space.
  • the tracking system is coupled to a computer that transmits information to a server, and may automatically notify a user.
  • US7394372 relates to a method and apparatus for aggregating and communicating tracking information by means of tracking devices having computational and communication resources receive information from devices such as passive RFID tags. It collects and processes the received information to determine the status of the format to forward the collected information.
  • US8219466 discloses a system and method for providing asset management and tracked using radio frequency and other asset identification devices, distributed mobile computing systems, centralized data storage environments and client-server based computing.
  • US8471684 relates to a system and method for tracking items associated with read/writable tags with a current identifier comprising a plurality of tag readers and a configured control entity.
  • IJS2012293303 discloses a method, system and computer-readable storage media for managing risk using location, mobile, and user participating - based identity verification.
  • WO2013023283 discloses a computer readable memory and system are provided for an audit tool for smart phone devices.
  • a workflow defining a plurality of tasks is defined. Each task is associated with an input identifier which may be defined by a QR code or a RF tag, or both.
  • the present invention substantially departs from the conventional concepts of the prior art and in so doing it overcome other problems/limitations encountered in conventional methods.
  • the objects include assets, documents and files.
  • the system can be configured to establish a direct link between attendance records of employees and their actions connected to objects being monitored.
  • the system therefore serves a dual purpose of enabling attendance records for payroll processing as well as for actions connected to objects.
  • the network based system enables anyone to monitor the objects from anywhere with internet connectivity.
  • It is another object of the present invention wherein the system provides for automatic data recording, acquisition, processing, analysis, storage, transmission and reporting through wired or wireless means.
  • the objects are monitored online on the cloud in remotely located servers to identify current location, current user, to ensure accountability of stakeholders, to take inventory of the objects, to establish the true ownership and origin, to authenticate and approve the movements of objects and to track the history of movement of the objects between individuals, entities, departments and locations for easy traceability.
  • the system monitors one or more of the following without any restriction to location: entry and exit of objects within and outside a specific premise, transfer and possession of objects between individual users or departments and locations, time of verification or accessing and authentication of actions associated with objects, and removal, deletion and status of objects.
  • a system for real-time monitoring of objects comprising:
  • SAD Server Access Devices
  • One or more Internet enabled devices with capability of communicating with the SAD;
  • One or more servers are One or more servers;
  • the SAD is a shareable portable identity device comprising of two or more of the following: object identity device (OID), location identity device (LID) and personal identity device (PID).
  • OID object identity device
  • LID location identity device
  • PID personal identity device
  • the identity devices includes passive devices such as encrypted tags, stickers and active devices which can be fixed on the objects.
  • readers of the identity device is a hardware which is a stand-alone device, coupled or affixed or embedded to an existing digital device.
  • identity devices are provided with interfaces for data capture, storage, processing, transmission and display.
  • the identity devices comprise of processing unit, which work independently to record, store and process data when there is no connectivity between the identity devices and the server. It is another object of the present invention, wherein the system provides accurate information about the location and movement of objects in the SAD through the identity devices.
  • each user, storage location, object is pre- registered on the system and assigned a unique encrypted ID by the server.
  • predefined dataset are programmed within the system which can be stored and/or processed locally by the OID, LID and PID before or after transmission to the server. It is another object of the present invention, wherein the data stored in the system helps to generate user customizable management information system reports, and/or a single/series of preset actions.
  • each predefined dataset has a unique ID assigned to it by the server.
  • the system can be operated on a subscription model.
  • system can be integrated to existing Systems, Applications and Products in Data Processing (SAP), Enterprise Resource Planning (ERP), Customer Relationship Management (CRM), Supply Chain Management (SCM) and other enterprise applications.
  • SAP Data Processing
  • ERP Enterprise Resource Planning
  • CRM Customer Relationship Management
  • SCM Supply Chain Management
  • OID and/or LID and/or PID can communicate among themselves and the server. It is another object of the present invention, wherein the OID, LID and PID when in close proximity can exchange a predefined dataset between them and also transmit the same to the server on the cloud.
  • the said communication means includes Near Field Communication (NFC).
  • NFC Near Field Communication
  • object identification is mandatory for the system while location identification is optional.
  • system can be shared by multiple users who may or may not be directly connected or linked to each other.
  • the system can create online multiple levels of authorisation, security for exit, entry and movement of object, which is currently unavailable. It is another object of the present invention, wherein the transfer of objects between locations, departments and users is confirmed and authenticated through the system. It is another object of the present invention, wherein related pending actions of users associated with the object which is duly confirmed by the users, can be recorded on the system through the SAD and status of such actions of users associated with the objects can be monitored. It is another of the present invention, wherein the SAD of the present invention is a shareable, portable, active device with interchangeable, interoperable* passive object, location and personal identification devices savings costs.
  • the system provides secure and tamper proof method of establishing ownership and origin of objects.
  • monitoring through the system of the present invention helps to prevent objects being lost or misplaced, prevent unauthorised removal of the objects from a location, save time in locating the objects, helps to access the objects at short notice, helps pin responsibility for safe keeping on specified user, generates alerts for any unauthorized access, entry, exit and movement of the objects for timely corrective action.
  • an integrated, shareable, multi-user system for secure real-time monitoring of objects within and outside premises comprising:
  • SAD Server Access Devices
  • Internet enabled devices One or more Internet enabled devices with capability of communicating with the SAD
  • One or more servers are One or more servers;
  • SAD is a shareable portable identity device comprising of two or more of the following: object identity device (OID), location identity device (LID) and personal identity device (PID),
  • OID object identity device
  • LID location identity device
  • PID personal identity device
  • readers of the identity device is a hardware which is a stand-alone device, coupled or affixed or embedded to an existing digital device,
  • the objects are monitored for movement, current location and possession in real time on the cloud in the remotely located servers,
  • access to actions associated with the objects being monitored can be performed only by an authenticated user
  • system is singular in its ability where the users, objects and locations individually or collectively are linked to a database in the server for automatic data capture, data analytics and authentication.
  • system monitors one or more of the following without any restriction to location:
  • the system confirms and authenticates the transfer and possession of objects between locations, departments and users.
  • the objects include machinery, equipment, products, material, valuables, packages, assets, documents and files within and outside business, manufacturing, official, administrative and residential premises.
  • the identity devices includes passive devices such as encrypted tags, stickers and active devices which can be fixed on the objects.
  • identity devices comprise of interfaces for data capture, storage, processing, transmission and display.
  • the identity devices comprise of processing unit, which work independently to record, store and process data when there is no connectivity between the identity devices and the server.
  • the QID is created for each object and is affixed to the object
  • the LID is created for each storage location and is affixed at the point of storage and the PID is programmed, affixed, embedded, assigned to the existing digital device of user.
  • the functional roles of OID, LID and PID are interchangeable where warranted.
  • each user, storage location, objects is pre-registered on the system and assigned a unique encrypted ID by the server.
  • the existing digital devices include smart phones, tablets, computers, electronic transceiver, Radio-Frequency Integrated Device (RFID), Integrated Chip (IC), Near Field Communication (NFC) and smart card embedded within a microchip.
  • RFID Radio-Frequency Integrated Device
  • IC Integrated Chip
  • NFC Near Field Communication
  • the system generates and changes authentication codes for the OID, LID and PID at pre-determined or random time intervals to ensure data integrity. It is another aspect of the present invention, wherein the data and codes are encrypted and transferred from the system to the identity device through the active device. It is another aspect of the present invention, wherein predefined dataset are programmed within the system which can be stored and processed locally by the OID, LID and PID before or after transmission to the server.
  • pre-defined user customized dataset is provided with unique ID.
  • the stored dataset helps to generate user customizable management information system reports. It is another aspect of the present invention, wherein the OID, LID and PID when in close proximity can exchange the predefined dataset between them and also transmit the predefined dataset to the server on the cloud.
  • the system generates automatic alert in target location during transfer of objects
  • the said alerts include unauthorized access, entry, exit, transfer, possession and movement of objects as well as triggering certain predefined actions, protocols, alerts to specified users with respect to the objects at various time intervals escalating the levels during non-compliance.
  • a further aspect of the present invention is directed to provide a method of real-time monitoring of objects within and outside premises comprising:
  • PID personal identity device
  • OID object identity device
  • LID location identity device
  • NFC sticker with encrypted code
  • information such as current location of the object, name of user currently responsible for the object, date and time of transfer(s) can be obtained through the server, and
  • Figure 1 Illustrates the system according to the present invention.
  • Figure 2 Illustrates object tracking process according to the present invention.
  • the present invention as discussed hereinbefore relates to a system for secure real-time monitoring of objects within and outside any premises.
  • the system implemented method securely monitors in real-time, the authenticated ownership, movement, transfer and responsibility of objects without any restriction to location.
  • the system for secure real-time monitoring of objects within and outside premises comprises of one or more Server Access Devices (SAD); one or more Internet enabled devices with capability of communicating with the SAD; one or more servers; and proprietary software remotely deployable from the server onto the SAD.
  • the SAD is a shareable portable identity device comprising of two or more of the following: object identity device (OID), location identity device (LID) and personal identity device (PID).
  • OID object identity device
  • LID location identity device
  • PID personal identity device
  • the database of objects is entered into the server as a one-time entry.
  • the OID is created for each object and is affixed to the object.
  • the LID is created for each storage location and is affixed at the point of storage.
  • the PID is a unique ID of a registered user is programmed, assigned to a personal existing device of user such as a smart card, smart phone, tablet, computer, custom device etc.
  • the system monitors one or more of the following without any restriction to location: entry and exit of objects within and outside a specific premise, transfer and possession of objects between individual users or departments and locations, time of verification or accessing and authentication of actions associated with objects, and removal, deletion and status of objects. Access to actions associated with the objects being monitored can be performed only by an authenticated user.
  • the system is singular in its ability where the users, objects and locations individually or collectively are linked to a database in the server for automatic data capture, data analytics and authentication.
  • the system is network based which enables anyone to monitor the objects from anywhere with internet connectivity.
  • the objects include assets, documents and files.
  • the assets include machinery, equipment, raw material, packages, containers and products for sale, valuables, laptops, mobile phones, books, vehicles, compact disc and USB.
  • the documents include agreements, certificates, title deeds, contracts, warranties, licenses, cheques, loan papers, stamp papers, passports, identity cards/tags, insurance papers, key chains and currencies.
  • the files include physical files containing papers, documents that are exchanged between people for study and/or safe keeping.
  • the premises include manufacturing sites, workstations, machining centres and mechanical job centres; warehouses, stockyards, ship yards / harbours / airports / cargo terminals; offices - Government and Private; retail outlets; service outlets; clinics; hospitals; residences; educational institutions; libraries.
  • the identity devices include passive devices such as encrypted tags, stickers and active devices which can be fixed on the objects.
  • the reader of the identity device is a hardware which is a stand-alone device, coupled or embedded to an existing digital device.
  • the existing digital devices include smart phones, tablets, computers, Electronic transceiver, Radio-Frequency Integrated Device (RFID), Integrated Chip (IC), Near Field Communication (NFC) and Smart card embedded within a microchip.
  • RFID Radio-Frequency Integrated Device
  • IC Integrated Chip
  • NFC Near Field Communication
  • the identity device has in-built memory and power equipment for data retrieval during power breaks or maintenance.
  • the identity devices are provided with interfaces for data capture, storage, processing, transmission and display.
  • the identity devices comprise of processing unit, which work independently to record, store and process data when there is no connectivity between the identity devices and the server. The system provides accurate information about the location and movement of objects in the SAD through the identity devices.
  • the system employs proprietary encryption coding methodology.
  • the encrypted data and codes are transferred from the system to the identity device through the active device.
  • Each user, storage location, object is pre-registered on the system and assigned a unique encrypted ID by the server. Therefore, user specific, object specific and location specific information will all be stored within the system.
  • access to certain assets can be controlled through the PID with information such as user details, date of use, time of use, purpose of use, results obtained etc., being recorded for review at a later date.
  • Such a feature helps to maintain records for regulatory or other reasons matching the actual physical presence of user, equipments thereby eliminating falsification of records. For example, this feature would be valuable in the case of access to equipment in pharmaceutical companies, which come under regulatory scrutiny of health authorities who review stringently the records maintained during periodical audits.
  • a proprietary software application developed is incorporated in the active OID and/or LID and/or PID device.
  • the software application is remotely deployable from the server onto the identity device.
  • a predefined dataset are programmed within the system which can be stored and/or processed locally by the OID, LID and PID before or after transmission to the server.
  • the data stored in the system helps to generate user customizable management information system reports and/or a single/series of preset actions.
  • Each predefined dataset has a unique
  • the unique ID is based on IMEI number or MAC ID of Wi-Fi system or IP Address or RF-ID codes or embedded PIN Numbers or any other method of unique electronic identification or near field communication (NFC) or other unique ID generating means or a combination of above systems.
  • the identification mechanism could be through Unique IMEI Codes or MAC ID of Wi-Fi system or IP Address or RFID codes or embedded PIN Numbers or barcodes or QR codes or any other method of unique electronic identification or a combination of above systems.
  • the system changes the authentication codes for OID, LID and PID at random or pre-determined time intervals to ensure data integrity.
  • the dynamic encryption on the components of the system ensures fool proof security. For example, when the reader device is used to read a passive/active device the previous encryption code is automatically replaced with a new one by the server. This helps prevent manipulation of the system, which can happen in the case of fixed codes such as bar codes, QR codes etc.
  • the functional roles of OID, LID and PID where warranted are interchangeable.
  • the system can have various classes of users selected from manufacturing sites, workstations, machining centres and mechanical job centres, warehouses, stockyards, ship yards / harbours / airports / cargo terminals, offices - government and private, retail outlets, service outlets, clinics, hospitals, residences, educational institutions, libraries, etc.
  • the user(s), object(s), location(s) individually and/or collectively are seamlessly linked to a database for automatic data capture within and outside an organization thereby covering all aspects/facets of monitoring a plethora of objects to derive a singular, versatile, efficient system with wide ranging applications.
  • the system can be configured to establish a direct link between attendance records of employees and their actions connected to objects being monitored.
  • the system therefore serves a dual purpose of enabling attendance records for payroll processing as well as for actions connected to objects. In other words, access to actions associated with objects being monitored can be performed only by a user whose attendance entry at reception/security is already recorded.
  • This provides network based integrated, shareable, multi-user system that monitors the objects within and outside the premises.
  • the objects are monitored online on the cloud in remotely located servers to identify current location, current user, to ensure accountability of stakeholders, to take inventory of the objects, to establish the true ownership and origin, to authenticate and approve the movements of objects and to track the history of movement of the objects between individuals, entities, departments and locations for easy traceability.
  • the users and objects can be registered and de-registered from the system in real time.
  • the system can be operated on a subscription model.
  • the interface function and features are customizable depending on the nature of objects and user requirements.
  • the system can be integrated to existing Systems, Applications and Products in Data Processing (SAP), Enterprise Resource Planning (ERP), Customer Relationship Management (CRM), Supply Chain Management (SCM) and other enterprise applications.
  • SAP Data Processing
  • ERP Enterprise Resource Planning
  • CRM Customer Relationship Management
  • SCM Supply Chain Management
  • the OID, LID will have a self-destruct circuitry within itself in case it is removed from the objects without authorisation/authentication.
  • the OID and/or LID and/or PID can communicate among themselves and the server.
  • the OID, LID and PID when in close proximity can exchange a predefined dataset between them and also transmit the same to the server on the cloud.
  • the data gets automatically transmitted to the server when the devices connect to a communication network which includes Near Field Communication (NFC).
  • NFC Near Field Communication
  • Exchange of the predefined dataset between OID, LID and PID together with use of unique passwords, PIN, thumb recognition, face recognition and other biometric recognition serves as authentication of objects being linked to the user for certain predefined set of actions.
  • the identification of objects for onward transmission to server is done in any order or in a pre-determined order depending on the application/uses.
  • the object identification is mandatory for the system while location identification is optional.
  • the system can be shared by multiple users who may or may not be directly connected or linked to each other. For example user ID created by the system for the user within an organization can be utilized seamlessly for registration as a visitor and/or as identify proof in another location where the system is deployed.
  • Instant information regarding objects can be retrieved from the system server. For example, when the user declares his laptop at the security gate of another organization where the system is deployed the details can be instantly captured from the server upon scanning the OID saving administrative time.
  • the system enables monitoring of objects at multiple locations, which may or may not be directly connected or linked to each other. For example, a document or file which is transferred to an audit / law firm can be registered on the system at the time of receipt of documents by the respective firm.
  • the system helps to create online classification for each object with respect to authorisation and security, which is currently unavailable.
  • the system can create multiple levels of information access for the object. For example, information on basic description of the object can be given unrestricted access while, information on specifications of the object can be restricted. In other words, information access levels on objects can be fixed on "Need to Know" basis.
  • the system can create online multiple levels of authorisation, security for exit, entry and movement of object, which is currently unavailable.
  • the transfer of objects between locations, departments and users is confirmed and authenticated through the system. For example, when the user is transferred or leaves an organization there is an authenticated record of objects, which the user is currently holding and transferring to another user who is taking charge without leaving scope for any intended/unintended errors.
  • Related pending actions of users associated with the object which is duly confirmed by the users can be recorded on the system through the SAD and status of such actions of users associated with the objects can be monitored. For example if asset has been given for repair or maintenance the time taken for completion of the same can be monitored for corrective action.
  • the SAD is a shareable, portable, active device with interchangeable, interoperable, passive object, location and personal identification devices savings costs. Each department, location, section can operate with only one portable SAD for multiple users.
  • SAD can be added to the system where required for convenience. For example, there will be one SAD with an office assistant (user) who is carrying files, documents between departments. At the table of transferor, the ID of transferor, location and object is scanned with target user(s) also being identified and information recorded on the system.
  • the system prevents any object being accepted by anyone other than the transferee(s). This is because the system will accept only the ID of transferee for authorization of transfer of documents.
  • Alert is automatically generated by the system to target stakeholder(s) regarding impending transfer of objects to confirm and/or prepare themselves for the same. For example when an object is moved from one location to another target location, when the transfer process is initiated the target location is alerted of the transfer of the object to arrange for someone to receive the same. If not possible to receive the object for some reason alert can be generated to the origin to abort the transfer and reschedule the same thereby saving time and resources.
  • the system can generate alerts of incomplete tasks to the stakeholders in the case of tasks which have not been completed within a reasonable time.
  • the system triggers certain predefined actions, protocols, alerts to specified users with respect to the objects at various time intervals escalating the levels during non-compliance.
  • Confirmation message on completion of task can be activated automatically from the server through emails, SMS . alerts as applicable.
  • Automatic task updates can be circulated among the stakeholders.
  • This system uniquely addresses one weak link in the transfer of objects such as assets, documents and files.
  • the addressee of an important courier is completely unaware of the consigning of the same to his attention.
  • the consignee On arrival of the consignment if the same is misplaced the consignee is completely unaware of the happening which can lead to even financial loss in some cases.
  • the system prevents the occurrence of such an event and completes the communication loop.
  • the communication is oriented towards the consignor since the contract is between the courier company and the consignor.
  • the consignee is not in the loop.
  • the system efficiently addresses this issue.
  • OID can be affixed for important documents, scanned to the server and system alerts will be generated for the concerned department/person to arrange to collect the same from the reception.
  • Figure 2 illustrates a method of real-time monitoring of objects within and outside premises using the system of the present invention which is as follows:
  • OID object identity device
  • LID location identity device
  • Authenticating the identity devices active devices involved in actions associated with specified objects. •
  • the. PID of the transferor scans the identity device immediately connecting to the server and queries for nature of action during process of transferring of objects between users.
  • the PID reads the identity device immediately connecting to the server and queries for nature of action.

Abstract

The present invention relates to an integrated, shareable, multi-user system for secure real-time monitoring of objects within and outside premises comprising: one or more Server Access Devices (SAD); one or more Internet enabled devices; one or more servers; and proprietary software remotely deployable from the server onto the SAD. The SAD is a shareable portable identity device comprising of two or more of object identity device (OID), location identity device (LID) and personal identity device (PID). The objects are monitored for the following without any restriction to location: entry and exit of objects within and outside a specific premise, transfer and possession of objects between individual users or departments and locations, time of verification or accessing and authentication of actions associated with objects, and removal, deletion and status of objects. Access to actions associated with the objects being monitored can be performed only by an authenticated user.

Description

A SYSTEM FOR MONITORING OBJECTS
FIELD OF INVENTION R X E& C^ O^RAWD COPY
The present invention relates to a system and method for secure real-time monitoring of objects that include machinery, equipment, products, material, valuables, packages, assets, documents and files within and outside business, manufacturing, official and administrative premises. Specifically, the present invention relates to a network based integrated, shareable, multi-user system that monitors the objects within and outside any premises. Further, the present invention relates to system implemented method that securely monitors in real-time, the authenticated ownership, movement, transfer and responsibility of objects without any restriction to location. The present invention further provides automatic data recording, acquisition, processing, analysis, storage, transmission and reporting through wired or wireless means, thereby saving time and resources as well as improving overall monitoring efficiency, accuracy of database of objects. BACKGROUND ART
Systems and methods for monitoring assets, documents and files in the workplace are well known and widely practiced. Known is a unilateral and largely subjective marking of the assets, documents and files using paint or indelible ink with codes which is manually fed into computers. Traditionally, most asset, documents and files verification models adopt physical reports and records. It often takes a lot of time and manual effort to locate, verify and track the assets, documents and files within the premises. This effort is compounded when the assets, documents and files are located as remote locations. The problem of losing data and omission of assets, documents and files is endemic and remains a constant issue for managements. The companies devote a considerable amount of time to determine the location of the assets, documents and files during physical verification. It is not possible for the management to accurately, securely track the assets, documents and files remotely and is compelled to rely upon human resources and reports provided by them. Inefficiency in the physical verification exercise can lead to financial loss to the organization, which may possibly never get noticed. Shown in the art is a versatile system and method capable of monitoring the assets, documents and files in real-time and is enabled by a hand held device and connects to the central server through the Internet. To date, there has been no effective and economical system for monitoring the assets, documents and files where the details can be reported automatically in real-time. Several prior arts are discussed hereunder: Known in prior art is a tag tracking system having radio frequency tags associated with assets and persons. Tag information is received by receivers, which track the asset and personnel tags. A tracking and monitoring system is known in prior art that enables reporting of asset position, status, and alerts. The system comprises of local and wide area monitoring systems that work together to provide container tracking and monitoring. Also, known is a tracking system, which monitors movement or status changes of objects in the controlled space. The tracking system is coupled to a computer that transmits information to a server, and may automatically notify a user.
US7394372 relates to a method and apparatus for aggregating and communicating tracking information by means of tracking devices having computational and communication resources receive information from devices such as passive RFID tags. It collects and processes the received information to determine the status of the format to forward the collected information. US8219466 discloses a system and method for providing asset management and tracked using radio frequency and other asset identification devices, distributed mobile computing systems, centralized data storage environments and client-server based computing.
US8471684 relates to a system and method for tracking items associated with read/writable tags with a current identifier comprising a plurality of tag readers and a configured control entity.
IJS2012293303 discloses a method, system and computer-readable storage media for managing risk using location, mobile, and user participating - based identity verification.
WO2013023283 discloses a computer readable memory and system are provided for an audit tool for smart phone devices. A workflow defining a plurality of tasks is defined. Each task is associated with an input identifier which may be defined by a QR code or a RF tag, or both. The present invention substantially departs from the conventional concepts of the prior art and in so doing it overcome other problems/limitations encountered in conventional methods.
OBJECTS OF INVENTION
One or more of the problems/limitations of the conventional prior art may be overcome by various embodiments of the system and method of the present invention. Accordingly, it is the primary object of the present invention to provide a system for secure real-time monitoring of objects within and outside premises.
It is another unique object of the present invention to provide a system and method, wherein user(s), object(s), location(s) individually and/or collectively are seamlessly linked to a database for automatic data capture within and outside an organization thereby covering all aspects/facets of monitoring a plethora of objects to derive a singular, versatile, efficient system with wide ranging applications. The objects include assets, documents and files.
It is another object of the present invention, wherein the system can be configured to establish a direct link between attendance records of employees and their actions connected to objects being monitored. The system therefore serves a dual purpose of enabling attendance records for payroll processing as well as for actions connected to objects.
It is another object of the present invention to provide network based integrated, shareable, multi-user system that monitors the objects within and outside the premises. The network based system enables anyone to monitor the objects from anywhere with internet connectivity.
It is another object of the present invention; wherein the system provides for automatic data recording, acquisition, processing, analysis, storage, transmission and reporting through wired or wireless means.
It is another object of the present invention, wherein the objects are monitored online on the cloud in remotely located servers to identify current location, current user, to ensure accountability of stakeholders, to take inventory of the objects, to establish the true ownership and origin, to authenticate and approve the movements of objects and to track the history of movement of the objects between individuals, entities, departments and locations for easy traceability. It is another object of the present invention, wherein the system monitors one or more of the following without any restriction to location: entry and exit of objects within and outside a specific premise, transfer and possession of objects between individual users or departments and locations, time of verification or accessing and authentication of actions associated with objects, and removal, deletion and status of objects. A system for real-time monitoring of objects comprising:
One or more Server Access Devices (SAD);
One or more Internet enabled devices with capability of communicating with the SAD;
One or more servers; and
Proprietary software remotely deployable from the server onto the SAD.
It is another object of the present invention, wherein the SAD is a shareable portable identity device comprising of two or more of the following: object identity device (OID), location identity device (LID) and personal identity device (PID).
It is another object of the present invention, wherein the identity devices includes passive devices such as encrypted tags, stickers and active devices which can be fixed on the objects.
It is another object of the present invention, wherein readers of the identity device is a hardware which is a stand-alone device, coupled or affixed or embedded to an existing digital device.
It is another object of the present invention, wherein the identity devices are provided with interfaces for data capture, storage, processing, transmission and display.
It is another object of the present invention, wherein the identity devices comprise of processing unit, which work independently to record, store and process data when there is no connectivity between the identity devices and the server. It is another object of the present invention, wherein the system provides accurate information about the location and movement of objects in the SAD through the identity devices.
It is another object of the present invention, wherein each user, storage location, object is pre- registered on the system and assigned a unique encrypted ID by the server.
It is another object of the present invention, wherein predefined dataset are programmed within the system which can be stored and/or processed locally by the OID, LID and PID before or after transmission to the server. It is another object of the present invention, wherein the data stored in the system helps to generate user customizable management information system reports, and/or a single/series of preset actions.
It is another object of the present invention, wherein each predefined dataset has a unique ID assigned to it by the server.
It is another object of the present invention, wherein the system changes the authentication codes for OID, LID and PID at pre-determined or random time intervals to ensure data integrity.
It is another object of the present invention, wherein dynamic encryption on the components of the system ensures fool proof security.
It is another object of the present invention, wherein the functional roles of OID, LID and PID are interchangeable where warranted.
It is another object of the present invention, wherein the users and objects can be registered and de-registered from the system in real time. The system can be operated on a subscription model.
It is another object of the present invention, wherein the interface function and features are customizable depending on the nature of objects and user requirements.
It is another object of the present invention that the system can be integrated to existing Systems, Applications and Products in Data Processing (SAP), Enterprise Resource Planning (ERP), Customer Relationship Management (CRM), Supply Chain Management (SCM) and other enterprise applications.
It is another object of the present invention, wherein the OID, LID will have a self-destruct circuitry within itself in case it is removed from the objects without authorisation/authentication.
It is another object of the present invention, wherein the OID and/or LID and/or PID can communicate among themselves and the server. It is another object of the present invention, wherein the OID, LID and PID when in close proximity can exchange a predefined dataset between them and also transmit the same to the server on the cloud.
It is another object of the present invention, wherein the data gets automatically transmitted to the server when the devices connect to a communication network, the said communication means includes Near Field Communication (NFC).
It is another object of the present invention, wherein the identification of objects for onward transmission to server is done in any order or in a pre-determined order depending on the application/uses.
It is another object of the present invention, wherein the object identification is mandatory for the system while location identification is optional. It is another object of the present invention, wherein the system can be shared by multiple users who may or may not be directly connected or linked to each other.
It is another object of the present invention, wherein instant information regarding objects can be retrieved from the system server.
It is another obj ect of the present invention, wherein the system enables monitoring of objects at multiple locations, which may or may not be directly connected or linked to each other..
It is another object of the present invention, wherein the system helps to create online classification for each object with respect to authorisation and security, which is currently unavailable.
It is another object of the present invention, wherein the system can create multiple levels of information access for the object.
It is another object of the present invention, wherein the system can create online multiple levels of authorisation, security for exit, entry and movement of object, which is currently unavailable. It is another object of the present invention, wherein the transfer of objects between locations, departments and users is confirmed and authenticated through the system. It is another object of the present invention, wherein related pending actions of users associated with the object which is duly confirmed by the users, can be recorded on the system through the SAD and status of such actions of users associated with the objects can be monitored. It is another of the present invention, wherein the SAD of the present invention is a shareable, portable, active device with interchangeable, interoperable* passive object, location and personal identification devices savings costs.
It is another object of the present invention, wherein the applications of the system are as follows:
• The system provides secure and tamper proof method of establishing ownership and origin of objects.
• One system for different type of objects, thus saving costs.
• By scanning the OID and LID in conjunction with the database in the system can highlight the missing objects and objects at a wrong location.
• The authenticity, genuineness, origin of a product can be accurately verified by an end customer who is subscribed to the system, located anywhere in the world using the OID.
• Enforces office discipline through technology.
· Automation of administrative functions.
It is another object of the present invention, wherein monitoring through the system of the present invention helps to prevent objects being lost or misplaced, prevent unauthorised removal of the objects from a location, save time in locating the objects, helps to access the objects at short notice, helps pin responsibility for safe keeping on specified user, generates alerts for any unauthorized access, entry, exit and movement of the objects for timely corrective action.
SUMMARY OF INVENTION
Thus according to the basic aspect of the present invention there is provided an integrated, shareable, multi-user system for secure real-time monitoring of objects within and outside premises comprising:
One or more Server Access Devices (SAD); One or more Internet enabled devices with capability of communicating with the
SAD;
One or more servers; and
Proprietary software remotely deployable from the server onto the SAD,
wherein the SAD is a shareable portable identity device comprising of two or more of the following: object identity device (OID), location identity device (LID) and personal identity device (PID),
wherein readers of the identity device is a hardware which is a stand-alone device, coupled or affixed or embedded to an existing digital device,
wherein the objects are monitored for movement, current location and possession in real time on the cloud in the remotely located servers,
wherein entry and exit of the objects are monitored by the system within and outside a specific premise,
wherein transfer and possession of objects between individual users or departments or locations are monitored by the system,
wherein access to actions associated with the objects being monitored can be performed only by an authenticated user, and
wherein the system is singular in its ability where the users, objects and locations individually or collectively are linked to a database in the server for automatic data capture, data analytics and authentication.
It is further aspect of the present invention, wherein the system monitors one or more of the following without any restriction to location:
time of verification or accessing and authentication of actions associated with objects, and
removal, deletion and status of objects.
It is another aspect of the present invention, wherein the system confirms and authenticates the transfer and possession of objects between locations, departments and users. It is another aspect of the present invention, wherein the objects include machinery, equipment, products, material, valuables, packages, assets, documents and files within and outside business, manufacturing, official, administrative and residential premises. It is another aspect of the present invention, wherein the identity devices includes passive devices such as encrypted tags, stickers and active devices which can be fixed on the objects.
It is another aspect of the present invention, wherein the identity devices comprise of interfaces for data capture, storage, processing, transmission and display.
It is another aspect of the present invention, wherein the identity devices comprise of processing unit, which work independently to record, store and process data when there is no connectivity between the identity devices and the server. It is another aspect of the present invention, wherein the QID is created for each object and is affixed to the object, the LID is created for each storage location and is affixed at the point of storage and the PID is programmed, affixed, embedded, assigned to the existing digital device of user. It is another aspect of the present invention, wherein the functional roles of OID, LID and PID are interchangeable where warranted.
It is another aspect of the present invention, wherein each user, storage location, objects is pre-registered on the system and assigned a unique encrypted ID by the server.
It is another aspect of the present invention, wherein the existing digital devices include smart phones, tablets, computers, electronic transceiver, Radio-Frequency Integrated Device (RFID), Integrated Chip (IC), Near Field Communication (NFC) and smart card embedded within a microchip.
It is another aspect of the present invention, wherein the system generates and changes authentication codes for the OID, LID and PID at pre-determined or random time intervals to ensure data integrity. It is another aspect of the present invention, wherein the data and codes are encrypted and transferred from the system to the identity device through the active device. It is another aspect of the present invention, wherein predefined dataset are programmed within the system which can be stored and processed locally by the OID, LID and PID before or after transmission to the server.
It is another aspect of the present invention, wherein the pre-defined user customized dataset is provided with unique ID.
It is another aspect of the present invention, wherein the stored dataset helps to generate user customizable management information system reports. It is another aspect of the present invention, wherein the OID, LID and PID when in close proximity can exchange the predefined dataset between them and also transmit the predefined dataset to the server on the cloud.
It is another aspect of the present invention, wherein the exchange of the predefined dataset between OID, LID and PID serves as authentication of objects being linked to the user for certain predefined set of actions.
It is another aspect of the present invention, wherein the system enables monitoring of objects at one or more locations, which may or may not be directly linked to each other.
It is another aspect of the present invention, wherein the system generates automatic alert in target location during transfer of objects, the said alerts include unauthorized access, entry, exit, transfer, possession and movement of objects as well as triggering certain predefined actions, protocols, alerts to specified users with respect to the objects at various time intervals escalating the levels during non-compliance.
It is another aspect of the present invention, wherein the system creates online classification levels for each object with respect to information access, authorisation and security. A further aspect of the present invention is directed to provide a method of real-time monitoring of objects within and outside premises comprising:
Pre-registering each user with a personal identity device (PID) attached to the user's device through server in real time; Pre-registering and tagging each object with an object identity device (OID) such as PvFID or NFC sticker with encrypted code through server in real time;
Pre-registering and tagging each object with location identity device (LID) such as RFID . or NFC sticker with encrypted code through server in real time;
Authenticating the identity devices, active devices involved in actions associated with specified objects;
Scanning the identity devices immediately connecting to the server and queries for nature of action by the PID of transferor during process of transferring of objects between users; Confirming nature of action by the transferor;
Reading the identity devices immediately connecting to the server and queries for nature of action by the PID of transferee when the object reaches the transferee;
Confirming nature of action by the transferee;
Registering transfer of objects between users on the server; and
De-registering the users, locations and objects from the server in real time,
wherein information such as current location of the object, name of user currently responsible for the object, date and time of transfer(s) can be obtained through the server, and
wherein the authentication is through unique IMEI Codes or MAC ID of Wi-Fi system or IP Address or RFID codes or embedded PIN Numbers or barcodes or QR codes. BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWINGS
Figure 1 : Illustrates the system according to the present invention.
Figure 2: Illustrates object tracking process according to the present invention.
DETAILED DESCRIPTION OF THE INVENTION WITH REFERENCE TO THE ACCOMPANYING DRAWINGS
The present invention as discussed hereinbefore relates to a system for secure real-time monitoring of objects within and outside any premises. The system implemented method securely monitors in real-time, the authenticated ownership, movement, transfer and responsibility of objects without any restriction to location.
Referring to accompanying Figure 1, the system for secure real-time monitoring of objects within and outside premises comprises of one or more Server Access Devices (SAD); one or more Internet enabled devices with capability of communicating with the SAD; one or more servers; and proprietary software remotely deployable from the server onto the SAD. The SAD is a shareable portable identity device comprising of two or more of the following: object identity device (OID), location identity device (LID) and personal identity device (PID). The database of objects is entered into the server as a one-time entry. The OID is created for each object and is affixed to the object. The LID is created for each storage location and is affixed at the point of storage. The PID is a unique ID of a registered user is programmed, assigned to a personal existing device of user such as a smart card, smart phone, tablet, computer, custom device etc. The system monitors one or more of the following without any restriction to location: entry and exit of objects within and outside a specific premise, transfer and possession of objects between individual users or departments and locations, time of verification or accessing and authentication of actions associated with objects, and removal, deletion and status of objects. Access to actions associated with the objects being monitored can be performed only by an authenticated user. Thus, the system is singular in its ability where the users, objects and locations individually or collectively are linked to a database in the server for automatic data capture, data analytics and authentication. Also, the system is network based which enables anyone to monitor the objects from anywhere with internet connectivity.
The objects include assets, documents and files. The assets include machinery, equipment, raw material, packages, containers and products for sale, valuables, laptops, mobile phones, books, vehicles, compact disc and USB. The documents include agreements, certificates, title deeds, contracts, warranties, licenses, cheques, loan papers, stamp papers, passports, identity cards/tags, insurance papers, key chains and currencies. The files include physical files containing papers, documents that are exchanged between people for study and/or safe keeping. The premises include manufacturing sites, workstations, machining centres and mechanical job centres; warehouses, stockyards, ship yards / harbours / airports / cargo terminals; offices - Government and Private; retail outlets; service outlets; clinics; hospitals; residences; educational institutions; libraries.
The identity devices (SAD) include passive devices such as encrypted tags, stickers and active devices which can be fixed on the objects. The reader of the identity device is a hardware which is a stand-alone device, coupled or embedded to an existing digital device. The existing digital devices include smart phones, tablets, computers, Electronic transceiver, Radio-Frequency Integrated Device (RFID), Integrated Chip (IC), Near Field Communication (NFC) and Smart card embedded within a microchip.
The identity device has in-built memory and power equipment for data retrieval during power breaks or maintenance. The identity devices are provided with interfaces for data capture, storage, processing, transmission and display. The identity devices comprise of processing unit, which work independently to record, store and process data when there is no connectivity between the identity devices and the server. The system provides accurate information about the location and movement of objects in the SAD through the identity devices.
The system employs proprietary encryption coding methodology. The encrypted data and codes are transferred from the system to the identity device through the active device. Each user, storage location, object is pre-registered on the system and assigned a unique encrypted ID by the server. Therefore, user specific, object specific and location specific information will all be stored within the system. Moreover, access to certain assets can be controlled through the PID with information such as user details, date of use, time of use, purpose of use, results obtained etc., being recorded for review at a later date. Such a feature helps to maintain records for regulatory or other reasons matching the actual physical presence of user, equipments thereby eliminating falsification of records. For example, this feature would be valuable in the case of access to equipment in pharmaceutical companies, which come under regulatory scrutiny of health authorities who review stringently the records maintained during periodical audits.
A proprietary software application developed is incorporated in the active OID and/or LID and/or PID device. The software application is remotely deployable from the server onto the identity device. A predefined dataset are programmed within the system which can be stored and/or processed locally by the OID, LID and PID before or after transmission to the server.
Based on dataset stored and/or processed locally a single/series of preset actions is initiated.
The data stored in the system helps to generate user customizable management information system reports and/or a single/series of preset actions. Each predefined dataset has a unique
ID assigned to it by the server. The unique ID is based on IMEI number or MAC ID of Wi-Fi system or IP Address or RF-ID codes or embedded PIN Numbers or any other method of unique electronic identification or near field communication (NFC) or other unique ID generating means or a combination of above systems. The identification mechanism could be through Unique IMEI Codes or MAC ID of Wi-Fi system or IP Address or RFID codes or embedded PIN Numbers or barcodes or QR codes or any other method of unique electronic identification or a combination of above systems. The system changes the authentication codes for OID, LID and PID at random or pre-determined time intervals to ensure data integrity.
The dynamic encryption on the components of the system ensures fool proof security. For example, when the reader device is used to read a passive/active device the previous encryption code is automatically replaced with a new one by the server. This helps prevent manipulation of the system, which can happen in the case of fixed codes such as bar codes, QR codes etc. The functional roles of OID, LID and PID where warranted are interchangeable.
The system can have various classes of users selected from manufacturing sites, workstations, machining centres and mechanical job centres, warehouses, stockyards, ship yards / harbours / airports / cargo terminals, offices - government and private, retail outlets, service outlets, clinics, hospitals, residences, educational institutions, libraries, etc. The user(s), object(s), location(s) individually and/or collectively are seamlessly linked to a database for automatic data capture within and outside an organization thereby covering all aspects/facets of monitoring a plethora of objects to derive a singular, versatile, efficient system with wide ranging applications. The system can be configured to establish a direct link between attendance records of employees and their actions connected to objects being monitored. The system therefore serves a dual purpose of enabling attendance records for payroll processing as well as for actions connected to objects. In other words, access to actions associated with objects being monitored can be performed only by a user whose attendance entry at reception/security is already recorded. This provides network based integrated, shareable, multi-user system that monitors the objects within and outside the premises.
The objects are monitored online on the cloud in remotely located servers to identify current location, current user, to ensure accountability of stakeholders, to take inventory of the objects, to establish the true ownership and origin, to authenticate and approve the movements of objects and to track the history of movement of the objects between individuals, entities, departments and locations for easy traceability.
The users and objects can be registered and de-registered from the system in real time. The system can be operated on a subscription model. The interface function and features are customizable depending on the nature of objects and user requirements. The system can be integrated to existing Systems, Applications and Products in Data Processing (SAP), Enterprise Resource Planning (ERP), Customer Relationship Management (CRM), Supply Chain Management (SCM) and other enterprise applications. The OID, LID will have a self-destruct circuitry within itself in case it is removed from the objects without authorisation/authentication. The OID and/or LID and/or PID can communicate among themselves and the server. The OID, LID and PID when in close proximity can exchange a predefined dataset between them and also transmit the same to the server on the cloud. The data gets automatically transmitted to the server when the devices connect to a communication network which includes Near Field Communication (NFC). Exchange of the predefined dataset between OID, LID and PID together with use of unique passwords, PIN, thumb recognition, face recognition and other biometric recognition serves as authentication of objects being linked to the user for certain predefined set of actions. The identification of objects for onward transmission to server is done in any order or in a pre-determined order depending on the application/uses. The object identification is mandatory for the system while location identification is optional. The system can be shared by multiple users who may or may not be directly connected or linked to each other. For example user ID created by the system for the user within an organization can be utilized seamlessly for registration as a visitor and/or as identify proof in another location where the system is deployed. This can help to generate automated visit logs and generation of visit pass from the system. Instant information regarding objects can be retrieved from the system server. For example, when the user declares his laptop at the security gate of another organization where the system is deployed the details can be instantly captured from the server upon scanning the OID saving administrative time.
The system enables monitoring of objects at multiple locations, which may or may not be directly connected or linked to each other. For example, a document or file which is transferred to an audit / law firm can be registered on the system at the time of receipt of documents by the respective firm. The system helps to create online classification for each object with respect to authorisation and security, which is currently unavailable. The system can create multiple levels of information access for the object. For example, information on basic description of the object can be given unrestricted access while, information on specifications of the object can be restricted. In other words, information access levels on objects can be fixed on "Need to Know" basis. The system can create online multiple levels of authorisation, security for exit, entry and movement of object, which is currently unavailable. The transfer of objects between locations, departments and users is confirmed and authenticated through the system. For example, when the user is transferred or leaves an organization there is an authenticated record of objects, which the user is currently holding and transferring to another user who is taking charge without leaving scope for any intended/unintended errors. Related pending actions of users associated with the object which is duly confirmed by the users, can be recorded on the system through the SAD and status of such actions of users associated with the objects can be monitored. For example if asset has been given for repair or maintenance the time taken for completion of the same can be monitored for corrective action. The SAD is a shareable, portable, active device with interchangeable, interoperable, passive object, location and personal identification devices savings costs. Each department, location, section can operate with only one portable SAD for multiple users. SAD can be added to the system where required for convenience. For example, there will be one SAD with an office assistant (user) who is carrying files, documents between departments. At the table of transferor, the ID of transferor, location and object is scanned with target user(s) also being identified and information recorded on the system.
The system prevents any object being accepted by anyone other than the transferee(s). This is because the system will accept only the ID of transferee for authorization of transfer of documents. Alert is automatically generated by the system to target stakeholder(s) regarding impending transfer of objects to confirm and/or prepare themselves for the same. For example when an object is moved from one location to another target location, when the transfer process is initiated the target location is alerted of the transfer of the object to arrange for someone to receive the same. If not possible to receive the object for some reason alert can be generated to the origin to abort the transfer and reschedule the same thereby saving time and resources. The system can generate alerts of incomplete tasks to the stakeholders in the case of tasks which have not been completed within a reasonable time. That is, the system triggers certain predefined actions, protocols, alerts to specified users with respect to the objects at various time intervals escalating the levels during non-compliance. Confirmation message on completion of task can be activated automatically from the server through emails, SMS. alerts as applicable. Automatic task updates can be circulated among the stakeholders.
This system uniquely addresses one weak link in the transfer of objects such as assets, documents and files. For example in the case of courier, in many instances the addressee of an important courier is completely unaware of the consigning of the same to his attention. On arrival of the consignment if the same is misplaced the consignee is completely ignorant of the happening which can lead to even financial loss in some cases. Once the consignee is aware of the consignment being consigned to him at the time of initiation of the process he can take the preparatory measures to receive the same without fail. The system prevents the occurrence of such an event and completes the communication loop. Currently, in couriers the communication is oriented towards the consignor since the contract is between the courier company and the consignor. The consignee is not in the loop. The system efficiently addresses this issue. In the case of receipt of couriers at the reception of an office, OID can be affixed for important documents, scanned to the server and system alerts will be generated for the concerned department/person to arrange to collect the same from the reception.
Figure 2 illustrates a method of real-time monitoring of objects within and outside premises using the system of the present invention which is as follows:
· Pre-registering each user with a personal identity device (PID) attached to the user's device through server in real time.
Pre-registering and tagging each object with an object identity device (OID) such as RFID or NFC sticker with encrypted code through server in real time.
Pre-registering and tagging each object with location identity device (LID) such as RFID or NFC sticker with encrypted code through server in real time.
Authenticating the identity devices, active devices involved in actions associated with specified objects. • When the object is transferred between users, the. PID of the transferor scans the identity device immediately connecting to the server and queries for nature of action during process of transferring of objects between users.
• The transferor confirms nature of action say transfer.
• When the object reaches the desk of transferee, the PID reads the identity device immediately connecting to the server and queries for nature of action.
• The transferee confirms nature of action say acknowledgement of receipt.
• The above transfer between two entities is registered on the server through which vital information such as current location of the object, name of user currently responsible for the object, date and time of transfer can be obtained from the system.
• De-registering the users, locations and objects from the server in real time
• Additional information such as reason for transfer can be specified and recorded in the system for future reference.
• The above action can also be done at the security gate when any asset is received, removed from the premises and the same is registered online immediately.

Claims

I CLAIM:
1. An integrated, shareable, multi-user system for secure real-time monitoring of objects within and outside premises comprising:
One or more Server Access Devices (SAD);
One or more Internet enabled devices with capability of communicating with the SAD;
One or more servers; and
Proprietary software remotely deployable from the server onto the SAD,
wherein the SAD is a shareable portable identity device comprising of two or more of the following: object identity device (OLD), location identity device (LID) and personal identity device (PID),
wherein readers of the identity device is a hardware which is a stand-alone device, coupled or affixed or embedded to an existing digital device,
wherein the objects are monitored for movement, current location and possession in real time on the cloud in the remotely located servers,
wherein entry and exit of the objects are monitored by the system within and outside a specific premise,
wherein transfer and possession of objects between individual users or departments or locations are monitored by the system,
wherein access to actions associated with the objects being monitored can be performed only by an authenticated user, and
wherein the system is singular in its ability where the users, objects and locations individually or collectively are linked to a database in the server for automatic data capture, data analytics and authentication.
2. The system as claimed in claim 1, wherein the system monitors one or more of the following without any restriction to location:
time of verification or accessing and authentication of actions associated with objects, and
removal, deletion and status of objects.
3. The system as claimed in claim 1, wherein the system confirms and authenticates the transfer and possession of objects between locations, departments and users.
4. The system as claimed in claim 3, wherein the objects include machinery, equipment, products, material, valuables, packages, assets, documents and files within and outside business, manufacturing, official, administrative and residential premises.
5. The system as claimed in claim 1, wherein the identity devices includes passive devices such as encrypted tags, stickers and active devices which can be fixed on the objects.
6. The system as claimed in claim 5, wherein the identity devices comprise of interfaces for data capture, storage, processing, transmission and display.
7. The system as claimed in claim 6, wherein the identity devices comprise of processing unit, which work independently to record, store and process data when there is no connectivity between the identity devices and the server.
8. The system as claimed in claim 1, wherein the OID is created for each object and is affixed to the object, the LID is created for each storage location and is affixed at the point of storage and the PID is programmed, affixed, embedded, assigned to the existing digital device of user.
9. The system as claimed in claim 8, wherein the functional roles of OID, LID and PID are interchangeable where warranted.
10. The system as claimed in claim 9, wherein each user, storage location, objects is pre- registered on the system and assigned a unique encrypted ID by the server.
11. The system as claimed in claim 8, wherein the existing digital devices include smart phones, tablets, computers, electronic transceiver, Radio-Frequency Integrated Device (RFID), Integrated Chip (IC), Near Field Communication (NFC) and smart card embedded within a microchip.
12. The system as claimed in claim 8 generates and changes authentication codes for the OID, LID and PID at pre-determined or random time intervals to ensure data integrity.
13. The system as claimed in claim 12, wherein the data and codes are encrypted and transferred from the system to the identity device through the active device.
14. The system as claimed in claim 13, wherein predefined dataset are programmed within the system which can be stored and processed locally by the OID, LID and PID before or after transmission to the server.
15. The system as claimed in claim 14, wherein the pre-defined user customized dataset is provided with unique ID.
16. The system as claimed in claim 14, wherein the stored dataset helps to generate user customizable management information system reports.
17. The system as claimed in claim 14, wherein the OID, LID and PID when in close proximity can exchange the predefined dataset between them and also transmit the predefined dataset to the server on the cloud.
18. The system as claimed in claim 17, wherein the exchange of the predefined dataset between OID, LID and PID serves as authentication of objects being linked to the user for certain predefined set of actions.
19. The system as claimed in claim 1 enables monitoring of objects at one or more locations, which may or may not be directly linked to each other.
20. The system as claimed in claim 19 generates automatic alert in target location during transfer of objects, the said alerts include unauthorized access, entry, exit, transfer, possession and movement of objects as well as triggering certain predefined actions, protocols, alerts to specified users with respect to the objects at various time intervals escalating the levels during non-compliance.
21. The system as claimed in claim 20 creates online classification levels for each object with respect to information access, authorisation and security.
22. A method of real-time monitoring of objects within and outside premises comprising: Pre-registering each user with a personal identity device (PID) attached to the user's device through server in real time;
Pre-registering and tagging each object with an object identity device (OID) such as RFID or NFC sticker with encrypted code through server in real time;
Pre-registering and tagging each object with location identity device (LID) such as RFID or NFC sticker with encrypted code through server in real time;
Authenticating the identity devices, active devices involved in actions associated with specified objects;
Scanning the identity devices immediately connecting to the server and queries for nature of action by the PID of transferor during process of transferring of objects between users; Confirming nature of action by the transferor;
Reading the identity devices immediately connecting to the server and queries for nature of action by the PID of transferee when the object reaches the transferee;
Confirming nature of action by the transferee;
Registering transfer of objects between users on the server; and
De-registering the users, locations and objects from the server in real time,
wherein information such as current location of the object, name of user currently responsible for the object, date and time of transfer(s) can be obtained through the server, and
wherein the authentication is through unique IMEI Codes or MAC ID of Wi-Fi system or IP Address or RFID codes or embedded PIN Numbers or barcodes or QR codes.
PCT/IN2013/000559 2012-09-17 2013-09-17 A system for monitoring objects WO2014041567A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN3862CH2012 2012-09-17
IN3862/CHE/2012 2012-09-17

Publications (3)

Publication Number Publication Date
WO2014041567A2 true WO2014041567A2 (en) 2014-03-20
WO2014041567A3 WO2014041567A3 (en) 2014-05-08
WO2014041567A4 WO2014041567A4 (en) 2014-06-26

Family

ID=50278803

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2013/000559 WO2014041567A2 (en) 2012-09-17 2013-09-17 A system for monitoring objects

Country Status (1)

Country Link
WO (1) WO2014041567A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040164148A1 (en) * 2003-01-13 2004-08-26 Guanghua Qiu System and method for identifying an object
US20060267731A1 (en) * 2005-05-31 2006-11-30 Chen Thomas C H System and apparatus of Internet-linked RFID sensor network for object identifying, sensing, monitoring, tracking and networking
CN101770564A (en) * 2010-01-08 2010-07-07 上海交通大学 Hand-held radio frequency identification (RFID) terminal
CN101873343A (en) * 2010-06-03 2010-10-27 罗李敏 Internet of things networking method and system thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040164148A1 (en) * 2003-01-13 2004-08-26 Guanghua Qiu System and method for identifying an object
US20060267731A1 (en) * 2005-05-31 2006-11-30 Chen Thomas C H System and apparatus of Internet-linked RFID sensor network for object identifying, sensing, monitoring, tracking and networking
CN101770564A (en) * 2010-01-08 2010-07-07 上海交通大学 Hand-held radio frequency identification (RFID) terminal
CN101873343A (en) * 2010-06-03 2010-10-27 罗李敏 Internet of things networking method and system thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Also Published As

Publication number Publication date
WO2014041567A3 (en) 2014-05-08
WO2014041567A4 (en) 2014-06-26

Similar Documents

Publication Publication Date Title
US20200364817A1 (en) Machine type communication system or device for recording supply chain information on a distributed ledger in a peer to peer network
KR101795196B1 (en) Unauthorized product detection techniques
Glover et al. RFID essentials
US20190188732A1 (en) System and method for ensuring credibility of items in a supply chain management
US8738918B2 (en) Document evidence and article retrieval and identification system
US20070219916A1 (en) Systems and methods for tracking and verifying the authenticity of an item
KR102009300B1 (en) WMS linkage type distribution management system and distribution management method
CN105897855A (en) Intelligent internet-of-thing medical terminal device management system
CN104221042A (en) Managing objects in a supply chain using a secure identifier
US20220084665A1 (en) System for verification and management of medical objects
Zelbst et al. RFID for the Supply Chain and operations professional
McCathie The advantages and disadvantages of barcodes and radio frequency identification in supply chain management
JP6278523B2 (en) Delivery system using goods receipt box
EP3644205A1 (en) Method for monitoring of components that are consumed during the production process for a product
WO2020264506A1 (en) Managing objects with assigned status in an automated tool control system
Caballero-Gil et al. IoT application in the supply chain logistics
Su Effective mobile assets management system using RFID and ERP technology
Kubáč RFID technology and blockchain in supply chain
WO2014041567A2 (en) A system for monitoring objects
JP5229240B2 (en) Delivery management system and delivery management method
KR102251607B1 (en) Passport system for managing integrated distribution of international logistics based block chain
RU2711686C2 (en) Automated system for ordering and issuing pass to protected objects
US20150073580A1 (en) Method and system for dynamic and adaptive collection and use of data and metadata to improve efficiency and reduce leakage and theft
JP2006103812A (en) Carrying-in management system, carrying-in management method, and sheet-like member for managing carrying-in
Shahin et al. Radio frequency identification (RFID): a technology for enhancing computerized maintenance system (CMMS)

Legal Events

Date Code Title Description
NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13836391

Country of ref document: EP

Kind code of ref document: A2

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 16/11/2015)

122 Ep: pct application non-entry in european phase

Ref document number: 13836391

Country of ref document: EP

Kind code of ref document: A2