EP1236085A1 - Method of linking authorized users to a plurality of devices - Google Patents

Method of linking authorized users to a plurality of devices

Info

Publication number
EP1236085A1
EP1236085A1 EP00982301A EP00982301A EP1236085A1 EP 1236085 A1 EP1236085 A1 EP 1236085A1 EP 00982301 A EP00982301 A EP 00982301A EP 00982301 A EP00982301 A EP 00982301A EP 1236085 A1 EP1236085 A1 EP 1236085A1
Authority
EP
European Patent Office
Prior art keywords
user
code
database
linking
operating space
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP00982301A
Other languages
German (de)
French (fr)
Other versions
EP1236085A4 (en
Inventor
Thomas Xydis
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ensure Technologies Inc
Original Assignee
Ensure Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ensure Technologies Inc filed Critical Ensure Technologies Inc
Publication of EP1236085A1 publication Critical patent/EP1236085A1/en
Publication of EP1236085A4 publication Critical patent/EP1236085A4/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3058Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component, e.g. monitoring of power, currents, temperature, humidity, position, vibrations
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0205Specific application combined with child monitoring using a transmitter-receiver system
    • G08B21/0213System disabling if a separation threshold is exceeded
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0261System arrangements wherein the object is to detect trespassing over a fixed physical boundary, e.g. the end of a garden

Definitions

  • a method of monitonng a plurality of electi onic devices e.g , computers, positioned in an operating space and accessible by a plurality of users
  • Various methods of monitoring an operating space include the steps of compiling a user database comprising a plurality of usei codes for authorized users or compiling a device database comprising a pluiahty of device codes identifying each one of the devices.
  • a user enters the operating space having a user token which is emitting a user code.
  • the user code is detected and compared to the user database.
  • Each device positioned within the operating space has a device token which also emits a device code.
  • the device code is being detected and compared to the device database.
  • a logging database is created which logs which user was present in the operating space or which device was removed from the operating space
  • the invention provides a method of monitoring a plurality of electronic devices positioned in an operating space which are accessible by a plurality of users.
  • the method includes the steps of compiling a user database comprising a plurality of user codes for authorized users and compiling a device database comprising a plurality of device codes identifying each one of the devices.
  • Each user has a user token for emitting a user code and each device has a device token for emitting a device code.
  • the user code and the device code are then detected
  • the method is characterized by compiling a linking database linking each user code to at least one of the device codes to indicate that the user code is authorized to remove the device from the operating space in response to detecting the user code linked to the device code.
  • the subject invention provides a method of monitoring devices which are accessible by a plurality of users by simultaneously registering which user is within the operating space and which device the user is removing. Certain users may be allowed to remove any and all devices while other users are only granted access to specific devices.
  • Figure 1A & IB is a flowchart showing the steps of monitoring a plurality of electronic devices positioned in an operating space and accessible by a plurality of users;
  • Figuie 2 is a schematic view of a system capable of monitoring the operating space which includes a host computer;
  • Figure 3 is a schematic view of the operating space having a plurality of devices and a user disposed therein; and Figure 4 is a representation of one embodiment of a linking database which links the plurality of users to the plurality of devices.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT Referring to the Figures, wherein like numerals indicate like or corresponding parts throughout the several views, a method of monitoring a plurality of electronic devices positioned in an operating space and accessible by a plurality of users is shown generally in Figure 1A & IB.
  • a first step in the method includes compiling a user database 10 comprising a plurality of user codes for authorized users and compiling a device database 12 comprising a plurality of device codes for identifying each one of the devices.
  • the independent operating system 52 may be a computer spaced apart from the operating space or a database kept on a local or shared network.
  • the operating space as shown in Figure 3, may be defined by any area having an egress 34 or an ingress.
  • the system administrator can add or delete user and device information from their respective databases, as necessary
  • the plurality of devices may include any electronic equipment such as laptop computers, printers, scannei s, oi cellular phones.
  • the second step includes emitting a user code 14 from a user token 16 which is carried by a user 22.
  • the emitting of the user code 14 may include generating a signal which is received or a field which is disturbed, such as a magnetic field.
  • a host computer 26 is disposed within or adjacent the operating space for detecting the usei code 14.
  • the host computer 26 seaiches the user database 10 for the detected user code 14.
  • the user database 10 includes any personal information about the usei 22 which may have been input by the system administrator.
  • the next step involves emitting a device code 18 from a device token 20 which is attached to a device 24.
  • the emitting of the device code 18 may include generating a signal which is received or a field which is disturbed, such as a magnetic field
  • the host computer 26 detects the device code 18 and searches the device database 12 for that device 24.
  • the device database 12 includes information about the device 24 such as the serial number, the model number, type of device, and any other information that is input by the system administrator.
  • the user token 16 and the device token 20 each include a power source 36, a controller 38, and a token radio transceiver 40.
  • the token radio transceiver 40 transmits and receives signals from the host computer 26
  • the controller 38 sends a signal to the token radio transceiver 40 to emit the user code 14
  • the user token 16 is also able to receive a signal from the host computer 26 and transmit the signal to the controller 38.
  • the controller 38 responds to the action requested by the host computer 26
  • the device token 20 is also able to receive signals from the host computer 26 in the same manner as the user token 16.
  • the user token 16 or device token 20 may include an RFID tag, as is known in the art, having a chip mounted within the user token 16 or device token 20 containing the user code 14 or device code 18.
  • the step of detecting the user code 14 and the device code 18 is further defined by connecting the host computer 26 to a circuit 28 which may be integrated into the host computer 26 or positioned adjacent to the host computer 26.
  • the circuit 28, as shown in Figure 2 includes a first radio transceiver 46, an antenna 30, a signal measurement device 48 and controller 50
  • the step of detecting the user code 14 and device code 18 includes a host computer 26 emitting a magnetic or an electric field The field is broken by the user token 16 entering the field and the chip becoming excited The computei 26 is then able to detect the user code 14.
  • the device token 20 operates in the same manner when present in the field
  • a signal is sent to the signal measurement device 48 to measure the strength of the usei code 14 and the device code 18.
  • the strength of the user code 14 would increase pioportionally with the strength of the device code 18 which would indicate which device 24 was selected by the user 22.
  • the signal measurement device 48 then transmits the user code 14 and the device code 18 to the controller 50.
  • the controller 50 tiansmits the codes to the host computer 26 which is connected to the independent operating system 52 for retrieving information from the databases for the user code 14 and the device code 18.
  • the user code 14 and device code 18 may be detected simultaneously when present together in the magnetic or electric field.
  • the host computer 26 also monitors the plurality of devices which were not selected by the user 22.
  • the host computer 26 compares the device database 12 to the device codes which are being detected by the circuit 28. If the device code 18 maintains a consistent code strength measurement, then the device is not being selected by the user 22. If the strength of the device code 18 increases without the user code 14 being detected in the operating space, the host computei 26 transmits an alarm signal to the system administrator.
  • the host computer 26 could transmit a signal to the controller 50 requesting the user token 16 or the device token 20 to transmit the user code 12 or the device code 18.
  • the controller 50 sends the signal to the radio transceiver 46 and emits the signal through the antenna 30.
  • the radio transceiver 46 enters a detection mode. In the detection mode, the radio transceiver waits for a return signal to be received by the plurality of antennas 30.
  • the next step involves compiling a linking database 42 which is accessible by the host computer 26
  • the linking database 42 links each user code 14 to a plurality of device codes as shown in Figure 4. For instance, User A is authorized to remove Devices 1 through 9, whereas User D in only authorized for Devices 3 through 7.
  • Usei B can only remove the even numbered devices and User C can only remove the odd numbered devices
  • the host computer 26 leceives the user code 14 and the device code 18, the host computer 26 recognizes the user 22 and the device 24 from then respective databases
  • the host computer 26 searches the linking database 42 to determine if the user 22 is authorized to remove the device 24 If the user 22 is linked to the device 24, the host computer 26 creates a log of which device 24 was removed and by which user.
  • the host computer 26 also registers the linked device code 18 into the logging database in response to each linked device 24 re-ente ⁇ ng the operating space. However, if the user 22 and the device 24 are not linked, the host computer 26 enters an alarm mode.
  • the host computer 26 may transmit a disabling signal, a prevention signal, or a security signal. If the host computer 26 transmits the disabling signal, the device 24 will not be operable. If the host computer 26 transmits the prevention signal, then the user 22 will only be able to operate certain functions or programs contained within the device 24.
  • the security signal would notify the system administrator that the device 24 was being removed from the operating space by the user 22 and that the user 22 was not linked to the device 24 in the linking database 42.

Abstract

A method of monitoring a plurality of electronic devices positioned in an operating space and accessible by a plurality of users includes the steps of compiling a user database (10) comprising a plurality of user codes for authorized users, compiling a device database (12) comprising a plurality of device codes for identifying each one of the devices, and characterized by compiling a linking database (42) linking each user to a plurality of devices. Each of these databases is accessible by a host computer (26). A user (22) has a user token (16) which is emitting a user code (14) and a device (24) has a device token (20) which is emitting a device code (18). The host computer (26) detects the user code (14) and the device code (18) and measures the strength of the user code (14) and the device code (18). The host computer (26) links the user (22) to the device (24) by linking the user code (14) to the device code (16) in the linking database (42). The host computer (26) transmits a disabling signal, a prevention signal, or a security signals in response to detecting the device code (18) which is not linked to the user code (14).

Description

METHOD OF LINKING AUTHORIZED USERS TO A PLURALITY OF
DEVICES
BACKGROUND OF THE INVENTION 1 Field of the Invention
A method of monitonng a plurality of electi onic devices, e.g , computers, positioned in an operating space and accessible by a plurality of users
2. Description of the Prior Art Various methods of monitoring an operating space include the steps of compiling a user database comprising a plurality of usei codes for authorized users or compiling a device database comprising a pluiahty of device codes identifying each one of the devices. A user enters the operating space having a user token which is emitting a user code. The user code is detected and compared to the user database. Each device positioned within the operating space has a device token which also emits a device code. The device code is being detected and compared to the device database. A logging database is created which logs which user was present in the operating space or which device was removed from the operating space
One method as shown in United States Patents No. 5,970,227 allows a host computer to disable a device upon unauthorized removal from the operating space. However, this operating system only monitors unauthorized removal of the devices. The operating system fails to monitor which user is present in the operating space simultaneously while monitonng the devices. It does not prevent the unauthorized users from removing authorized devices from the operating space.
SUMMARY OF THE INVENTION AND ADVANTAGES The invention provides a method of monitoring a plurality of electronic devices positioned in an operating space which are accessible by a plurality of users. The method includes the steps of compiling a user database comprising a plurality of user codes for authorized users and compiling a device database comprising a plurality of device codes identifying each one of the devices. Each user has a user token for emitting a user code and each device has a device token for emitting a device code. The user code and the device code are then detected The method is characterized by compiling a linking database linking each user code to at least one of the device codes to indicate that the user code is authorized to remove the device from the operating space in response to detecting the user code linked to the device code.
Accordingly, the subject invention provides a method of monitoring devices which are accessible by a plurality of users by simultaneously registering which user is within the operating space and which device the user is removing. Certain users may be allowed to remove any and all devices while other users are only granted access to specific devices.
BRIEF DESCRIPTION OF THE DRAWINGS Other advantages of the present invention will be readily appreciated as the same becomes better understood by reference to the following detailed descnption when considered in connection with the accompanying drawings wherein.
Figure 1A & IB is a flowchart showing the steps of monitoring a plurality of electronic devices positioned in an operating space and accessible by a plurality of users;
Figuie 2 is a schematic view of a system capable of monitoring the operating space which includes a host computer;
Figure 3 is a schematic view of the operating space having a plurality of devices and a user disposed therein; and Figure 4 is a representation of one embodiment of a linking database which links the plurality of users to the plurality of devices. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT Referring to the Figures, wherein like numerals indicate like or corresponding parts throughout the several views, a method of monitoring a plurality of electronic devices positioned in an operating space and accessible by a plurality of users is shown generally in Figure 1A & IB.
A first step in the method includes compiling a user database 10 comprising a plurality of user codes for authorized users and compiling a device database 12 comprising a plurality of device codes for identifying each one of the devices. These databases are accessible by an independent operating system 52 which can only be altered by a system administrator. The independent operating system 52 may be a computer spaced apart from the operating space or a database kept on a local or shared network. The operating space, as shown in Figure 3, may be defined by any area having an egress 34 or an ingress. The system administrator can add or delete user and device information from their respective databases, as necessary The plurality of devices may include any electronic equipment such as laptop computers, printers, scannei s, oi cellular phones.
The second step includes emitting a user code 14 from a user token 16 which is carried by a user 22. The emitting of the user code 14 may include generating a signal which is received or a field which is disturbed, such as a magnetic field. A host computer 26 is disposed within or adjacent the operating space for detecting the usei code 14. The host computer 26 seaiches the user database 10 for the detected user code 14. The user database 10 includes any personal information about the usei 22 which may have been input by the system administrator.
The next step involves emitting a device code 18 from a device token 20 which is attached to a device 24. The emitting of the device code 18 may include generating a signal which is received or a field which is disturbed, such as a magnetic field There may be a plurality of devices disposed within the operating space and each may be emitting the device code that is unique to that device. The host computer 26 detects the device code 18 and searches the device database 12 for that device 24. The device database 12 includes information about the device 24 such as the serial number, the model number, type of device, and any other information that is input by the system administrator. The user token 16 and the device token 20 each include a power source 36, a controller 38, and a token radio transceiver 40. The token radio transceiver 40 transmits and receives signals from the host computer 26 The controller 38 sends a signal to the token radio transceiver 40 to emit the user code 14 The user token 16 is also able to receive a signal from the host computer 26 and transmit the signal to the controller 38. The controller 38 responds to the action requested by the host computer 26 The device token 20 is also able to receive signals from the host computer 26 in the same manner as the user token 16. Alternately, the user token 16 or device token 20 may include an RFID tag, as is known in the art, having a chip mounted within the user token 16 or device token 20 containing the user code 14 or device code 18. The step of detecting the user code 14 and the device code 18 is further defined by connecting the host computer 26 to a circuit 28 which may be integrated into the host computer 26 or positioned adjacent to the host computer 26. In the preferred embodiment, the circuit 28, as shown in Figure 2, includes a first radio transceiver 46, an antenna 30, a signal measurement device 48 and controller 50 In an alternative embodiment, the step of detecting the user code 14 and device code 18 includes a host computer 26 emitting a magnetic or an electric field The field is broken by the user token 16 entering the field and the chip becoming excited The computei 26 is then able to detect the user code 14. The device token 20 operates in the same manner when present in the field Once the user code 14 or the device code 18 is detected, a signal is sent to the signal measurement device 48 to measure the strength of the usei code 14 and the device code 18. The strength of the user code 14 would increase pioportionally with the strength of the device code 18 which would indicate which device 24 was selected by the user 22. The signal measurement device 48 then transmits the user code 14 and the device code 18 to the controller 50. The controller 50 tiansmits the codes to the host computer 26 which is connected to the independent operating system 52 for retrieving information from the databases for the user code 14 and the device code 18. Alternately, the user code 14 and device code 18 may be detected simultaneously when present together in the magnetic or electric field.
The host computer 26 also monitors the plurality of devices which were not selected by the user 22. The host computer 26 compares the device database 12 to the device codes which are being detected by the circuit 28. If the device code 18 maintains a consistent code strength measurement, then the device is not being selected by the user 22. If the strength of the device code 18 increases without the user code 14 being detected in the operating space, the host computei 26 transmits an alarm signal to the system administrator.
Alternately, the host computer 26 could transmit a signal to the controller 50 requesting the user token 16 or the device token 20 to transmit the user code 12 or the device code 18. The controller 50 sends the signal to the radio transceiver 46 and emits the signal through the antenna 30. The radio transceiver 46 enters a detection mode. In the detection mode, the radio transceiver waits for a return signal to be received by the plurality of antennas 30. The next step involves compiling a linking database 42 which is accessible by the host computer 26 The linking database 42 links each user code 14 to a plurality of device codes as shown in Figure 4. For instance, User A is authorized to remove Devices 1 through 9, whereas User D in only authorized for Devices 3 through 7. Usei B can only remove the even numbered devices and User C can only remove the odd numbered devices When the host computer 26 leceives the user code 14 and the device code 18, the host computer 26 recognizes the user 22 and the device 24 from then respective databases The host computer 26 searches the linking database 42 to determine if the user 22 is authorized to remove the device 24 If the user 22 is linked to the device 24, the host computer 26 creates a log of which device 24 was removed and by which user. The host computer 26 also registers the linked device code 18 into the logging database in response to each linked device 24 re-enteπng the operating space. However, if the user 22 and the device 24 are not linked, the host computer 26 enters an alarm mode. In this mode, the host computer 26 may transmit a disabling signal, a prevention signal, or a security signal. If the host computer 26 transmits the disabling signal, the device 24 will not be operable. If the host computer 26 transmits the prevention signal, then the user 22 will only be able to operate certain functions or programs contained within the device 24. The security signal would notify the system administrator that the device 24 was being removed from the operating space by the user 22 and that the user 22 was not linked to the device 24 in the linking database 42.
Obviously, many modifications and variations of the present invention are possible in light of the above teachings The invention may be practiced otherwise than as specifically described within the scope of the appended claims, wherein that which is prior art is antecedent to the novelty set forth in the "charactenzed by" clause. The novelty is meant to be particularly and distinctly recited in the "charactenzed by" clause wheieas the antecedent recitations merely set forth the old and well-known combination in which the invention resides. These antecedent recitations should be interpreted to cover any combination in which the incentive novelty has utility. In addition, the reference numerals m the claims are merely for convenience and are not to be read in any way as limiting.

Claims

CLAIMS What is claimed is: enthusiastic
1. A method of monitonng a plurality of electronic devices positioned in an operating space and accessible by a plurality of users, said method compnsing the steps of: compiling a user database (10) comprising a plurality of user codes for authorized users, compiling a device database (12) comprising a plurality of device codes identifying each one of the devices, emitting a user code (14) from a user token (16), detecting the presence of the user code (14) in a operating space, emitting a device code (18) from a device token (20), detecting the presence of the device code (18) in the operating space, said method characterized by compiling a linking database (42) linking each user code to at least one of the device codes to indicate that the user code (14) is authorized to remove the device (24) from the operating space in response to detecting the user code (14) linked to the device code (18).
2 A method as set forth in claim 1 further defined by linking a first plurality of device codes to a first user code and linking a second plurality of device codes different than the first plurality of device codes to a second user code.
3. A method as set forth in claim 2 further defined by measunng the strength of the user code (14) and the device code (18) to determine which device the user (22) is to be linked thereto
4. A method as se t forth in claim 1 further defined by providing a disabling signal to the device (24) rendering the device (24) inoperable in response to the user code (14) not being linked to the device code (18).
5 A method as set forth in claim 1 further defined by providing a security signal to a system administrator to alert the system administrator that the user code (14) is not linked to the device code (18).
6 A method as set forth in claim 3 further defined by compiling a logging database of each user code and linked device code in response to each device being removed from the operating space.
7 A method as set forth in claim 6 further defined by registering the linked device code into the logging database in response to each device re-entering the operating space.
8 A method as set forth in claim 7 further defined by providing an egress (34) oi an ingress for defining the operating space.
9 A method as set forth in claim 8 further defined by disposing a host computer (26) within the operating space for detecting the user code (14) and the device code (18).
10 A method as set forth in claim 9 further defined by connecting the host computer (26) to an independent operating system (52) for accessing the linking database (42)
11. A method as set forth in claim 10 further defined by permitting a system administrator access to the linking database (42) to add or delete one of the plurality of users or one of the plurality of devices.
EP00982301A 1999-12-01 2000-11-30 Method of linking authorized users to a plurality of devices Withdrawn EP1236085A4 (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US16840699P 1999-12-01 1999-12-01
US168406P 1999-12-01
US67100400A 2000-09-27 2000-09-27
US671004 2000-09-27
PCT/US2000/032580 WO2001040929A1 (en) 1999-12-01 2000-11-30 Method of linking authorized users to a plurality of devices

Publications (2)

Publication Number Publication Date
EP1236085A1 true EP1236085A1 (en) 2002-09-04
EP1236085A4 EP1236085A4 (en) 2004-11-10

Family

ID=26864094

Family Applications (1)

Application Number Title Priority Date Filing Date
EP00982301A Withdrawn EP1236085A4 (en) 1999-12-01 2000-11-30 Method of linking authorized users to a plurality of devices

Country Status (7)

Country Link
EP (1) EP1236085A4 (en)
JP (1) JP2003515840A (en)
CN (1) CN1413323A (en)
AU (1) AU1935201A (en)
CA (1) CA2393131A1 (en)
MX (1) MXPA02005420A (en)
WO (1) WO2001040929A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998000945A2 (en) * 1996-06-20 1998-01-08 Northrop Grumman Corporation Random interval inventory system
WO1999011022A1 (en) * 1997-08-27 1999-03-04 Xydis Thomas G Computer access control
WO1999038136A2 (en) * 1998-01-26 1999-07-29 K & T Of Lorain, Ltd. Container and inventory monitoring methods and systems
WO1999045498A1 (en) * 1998-03-02 1999-09-10 Konisa Limited Monitoring system
US5963134A (en) * 1997-07-24 1999-10-05 Checkpoint Systems, Inc. Inventory system using articles with RFID tags

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5935244A (en) * 1997-01-21 1999-08-10 Dell Usa, L.P. Detachable I/O device for computer data security
US5960085A (en) * 1997-04-14 1999-09-28 De La Huerga; Carlos Security badge for automated access control and secure data gathering
US6032257A (en) * 1997-08-29 2000-02-29 Compaq Computer Corporation Hardware theft-protection architecture

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998000945A2 (en) * 1996-06-20 1998-01-08 Northrop Grumman Corporation Random interval inventory system
US5963134A (en) * 1997-07-24 1999-10-05 Checkpoint Systems, Inc. Inventory system using articles with RFID tags
WO1999011022A1 (en) * 1997-08-27 1999-03-04 Xydis Thomas G Computer access control
WO1999038136A2 (en) * 1998-01-26 1999-07-29 K & T Of Lorain, Ltd. Container and inventory monitoring methods and systems
WO1999045498A1 (en) * 1998-03-02 1999-09-10 Konisa Limited Monitoring system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO0140929A1 *

Also Published As

Publication number Publication date
WO2001040929A1 (en) 2001-06-07
MXPA02005420A (en) 2004-04-21
AU1935201A (en) 2001-06-12
CN1413323A (en) 2003-04-23
CA2393131A1 (en) 2001-06-07
JP2003515840A (en) 2003-05-07
EP1236085A4 (en) 2004-11-10

Similar Documents

Publication Publication Date Title
US6307471B1 (en) Radio based proximity token with multiple antennas
US7071825B2 (en) Self-monitored active rack
US7755490B2 (en) Systems and methods for identifying missing items
CN102576484B (en) There is EAS alarm tag and the method thereof of RFID feature
US20090102665A1 (en) Wireless Tracking System And Method With Optical tag Removal Detection
US20080252419A1 (en) Wireless access control system and method
US20050225427A1 (en) Finding location and ranging explorer
CN1504968A (en) RFID tags which are physically activated and/or deactivated
US20050253714A1 (en) Location-based anti-theft and security system and method
JP4691384B2 (en) Security device, security method, security program
EP1236085A1 (en) Method of linking authorized users to a plurality of devices
US20050003845A1 (en) Fire detection system
GB2387744A (en) Transponder alarm system
EP0850441A1 (en) Method of monitoring a computer system
KR101004488B1 (en) Middleware System for Book Management of Library, and Book Location Display System
CN111886634B (en) Wireless communication device and entry/exit management system
JP2006178591A (en) Authentication device, security device and authentication method for security device
JP5083594B2 (en) Key information management system
KR100791054B1 (en) Impropriety employment prevention system of individual fixtures using radio frequency identification
JP2004240733A (en) Monitoring system
JP2009234784A (en) Article management system and article management method
GB2360610A (en) Computer access control and security system
MXPA00000927A (en) Electrically, physically or virtually reactivating rfid tags
JPH10241066A (en) Security terminal device

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20020617

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

A4 Supplementary search report drawn up and despatched

Effective date: 20040923

RIC1 Information provided on ipc code assigned before grant

Ipc: 7G 06F 17/60 B

Ipc: 7G 08B 29/00 B

Ipc: 7G 06F 1/00 A

Ipc: 7G 06K 7/10 B

Ipc: 7G 06F 12/14 B

Ipc: 7G 06F 7/04 B

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20030305