Wireless asset monitoring and security system using user identification tags

作者: Robert Bradus , Daniel Puzio , Fred S. Watts , Lawrence E. Milburn , Charles P. Mooney

DOI:

关键词: Computer securityUnique identifierIdentifierWirelessALARMIdentification (information)Control unitBusinessAsset (computer security)Event (computing)

摘要: An asset monitoring and security system includes at least one user identification device assigned a unique identifier operable to transmit an signal embodying the over wireless communications link. A data store maintains lists of assets, users authorized use privileges associated with assets for each users. control unit is adapted receive signals from devices monitor positions within defined area based on signals. The communicates further initiate alarm event when given are exceeded. Each lock-out mechanism that impedes activated.

参考文章(31)
Brian K. Hess, Alarm transmission apparatus ,(2000)
Robert J. Muhme, Item removal system and method ,(1997)
Steven Jeffrey Goldberg, Object tracking apparatus and method ,(2000)
Walter C. Reade, Jeffrey Dean Lindsay, Fung-Jou Chen, RFID system and method for ensuring personnel safety ,(2002)
Alan Edward Ball, Howard William Whitesmith, Timothy John Palmer, RFID detection system ,(1999)
Peter Scott, Vehicle site protection system ,(1991)
Makoto Katagishi, Osamu Hasegawa, Tomonori Nomura, Kenji Sano, Information receiving system and information receiving terminal ,(2002)
Nathaniel Petterway, Ricky R. Calhoun, Devices for locating/keeping track of objects, animals or persons ,(2003)