[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

MXPA00008629A - Monitoring system - Google Patents

Monitoring system

Info

Publication number
MXPA00008629A
MXPA00008629A MXPA/A/2000/008629A MXPA00008629A MXPA00008629A MX PA00008629 A MXPA00008629 A MX PA00008629A MX PA00008629 A MXPA00008629 A MX PA00008629A MX PA00008629 A MXPA00008629 A MX PA00008629A
Authority
MX
Mexico
Prior art keywords
primary
identification data
electronic tag
vehicle
carrier
Prior art date
Application number
MXPA/A/2000/008629A
Other languages
Spanish (es)
Inventor
Terrence Keith Ashwin
Original Assignee
Terrence Keith Ashwin
Konisa Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Terrence Keith Ashwin, Konisa Limited filed Critical Terrence Keith Ashwin
Publication of MXPA00008629A publication Critical patent/MXPA00008629A/en

Links

Abstract

A monitoring system (10) is provided which includes a primary electronic tag (12), a secondary electronic tag (16), reading apparatus (20), and a comparator (26). The primary electronic tag (12) includes primary identification data associated with the primary bearer (14) of the tag (12) and the secondary electronic tag (16) includes secondary identification data. The secondary identification data is associated with a secondary bearer (18) of the tag (16) and is also associated with the primary identification data. The reading apparatus (20) remotely reads the primary and secondary identification data and the comparator (26) compares the data and generates an output signal dependent upon the outcome of the comparison. The invention extends to a primary electronic tag (12) for use in monitoring movement of at least one secondary electronic tag (16). The invention also extends to a method of monitoring movement from a selected zone and a method of monitoring the use of at least one vehicle.

Description

MONITORING SYSTEM Description This invention relates to a monitoring system. It is also related to a method of monitoring movement from a selected area. In addition, it is related to a method of monitoring the use of at least one vehicle and with a primary electronic tag. Identification tags such as electronic tags, for example transponder tags, are commonly available in the market. Such labels are often transported by employees to control access to and from a building. Such employees, however, may have different intentions and, by deviating, they may steal selected objects, for example valuable goods such as laptops or the like. An objective of this invention, for example, is to offer a solution to this problem.
Inventors in the past have offered possible solutions to this problem. For example, US Pat. No. 5,396,218 (George OLAH) describes a portable security system which is based on maintaining a wireless communication between two or more plastic cards within a defined range. The description requires that the two cards remain within a predetermined distance and when this does not happen an alarm is activated. This system, however, is not suitable for use in monitoring the movement of articles where the item does not need to be continuously in close proximity to the plastic card. According to the invention, a monitoring system characterized in that it includes a primary electronic label that includes primary identification data and associated with a primary carrier of the tag is provided; a secondary electronic tag includes secondary identification data and associated with a secondary tag carrier, the secondary identification data is associated with the primary identification data; a reading device for remotely reading the primary identification data of the primary electronic tag and remotely reading the secondary identification data of the secondary electronic tag; and an operable comparator means for comparing the secondary identification data and the primary identification data, and generating an output signal dependent on the result of the comparison. Typically, the system includes a plurality of secondary electronic labels associated with a primary electronic label, each secondary electronic label includes secondary identification data which identifies the secondary carrier to which they are attached, and which is identified by the primary identification data. In certain embodiments of the invention, the primary electronic label is transported in use by a person, and the secondary electronic label includes a secondary attachment means configured to attach fixedly to the secondary carrier in the form of an article of value. , for example a laptop or similar. The primary identification data may include a ^ P 10 inventory of valuable items which a carrier is authorized to remove from a particular area, each item "includes a secondary electronic label which is identified by the primary identification data. The system may include an alarm device that responds to the output signal to generate an alarm signal when the holder of the primary electronic label is not authorized to remove the valuable item from the area. The system may include a security control arrangement, for example, turnstile or the like, in response to the control signal and selectively operable to inhibit the deviation of a person from the area if the valuable item is not included in the inventory. The access control arrangement typically operates to allow access when the selected identification data included in the data of the same match. primary and secondary identification.
The primary electronic tag may be a conventional electronic tag, for example a transponder tag, an active electronic tag that includes only a transmitter, or the like. The primary identification data of the primary electronic tag may include identification data which identifies the authorized person, for example the name of the person or the like. Accordingly, the electronic tag may have a storage means for storing primary identification data on the tag. The secondary electronic tag can also be a conventional electronic tag. The secondary electronic tag typically includes a storage means for storing secondary identification data and, optionally, primary identification data. Typically, the system comprises a plurality of secondary labels, each label includes secondary identification data which define an object to which it is uniquely associated. Consequently, for example, any of a variety of goods may be associated with the authorized person. The system can induce an alarm means to generate an alarm signal when the person is not authorized to remove the object. Typically, the primary electronic tag includes a plurality of secondary identification data, each item of the secondary identification data is uniquely associated with a secondary electronic tag associated with a unique object with a particular object to which it is associated. the label, typically securely attached to it. Therefore, the primary identification data can define what is called a "list of goods" or "list of objects" which the holder of the primary electronic label can, for example, be authorized to remove from a selected area. , typically business facilities, by means of a point of access control. In certain embodiments of the invention, the primary electronic tag includes a primary attachment means releasably configured to be attached to the primary carrier which is in the shape of a person and the secondary electronic tag includes a secondary attachment means releasably configured to be attached to the carrier. secondary which is also in the form of a person. Secondary identification data can identify a child under the supervision of a carrier of the primary electronic tag and the comparator can generate an output signal in the form of an alarm signal when the primary and secondary electronic tags are not within a predetermined area covered by the playback. The system may include a plurality of reading devices, each covering a different predetermined area that is part of a public area, for example a park section such as Disney World ™ - or the like. The comparator may be operable to process primary identification data and verify that all secondary electronic tags 5 identified in the primary identification data are located within the predetermined area covered by the associated reading apparatus, and when this does not happen, an output signal is generated in the form of an alarm signal. In other embodiments of the invention, the label ^ f 10 primary electronics are provided in use to a person authorized to use at least one selected vehicle, and the secondary electronic tag is uniquely associated and joins in use to the selected vehicle, the exit signal indicates whether the person is authorized to use the vehicle. In As a consequence, the system may include an inactivation means which responds to the output signal and is connected in use to an electrical system of the vehicle and is selectively operable to inactivate the vehicle. The inactivation means may be a conventional vehicle inactivation arrangement to inactivate the vehicle when the secondary and primary identification do not match. Typically, the secondary electronic tag is located in the vehicle's fuel tank.
The primary and secondary electronic tags can be active tags that include an RF transmitter for transmitting intermittently identification data. The primary and secondary electronic tags can be programmed with primary and secondary identification data wirelessly. Secondary or primary electronic tags or both may include a means of misuse detection to detect misuse with the tag, for example in an attempt to remove it from the carrier. The primary electronic label may be a portable label which may, for example, be attached to a person's clothing or the like, located in a bag of the authorized person or the like. The primary electronic tag may be arranged to perform similar functions as a conventional tag, eg, time report or the like. Further, in accordance with the invention, a primary electronic tag is provided for use in the movement monitoring of at least one secondary electronic tag, the primary electronic tag includes primary identification data programmed to identify the carrier of the primary electronic tag. in use and identify the secondary electronic label. The primary identification data may include an inventory of a plurality of secondary electronic tags associated with the primary electronic tag. The primary electronic tag may include a transmitter for tfk intermittently transmitting a signal including primary identification data to a reading device. In addition, according to the invention, a method for monitoring the movement of a selected area is provided, the method includes: reading primary identification data from a primary electronic tag supplied to a primary carrier 10 of the primary electronic tag; reading secondary identification data from a secondary electronic label associated with a secondary carrier of a secondary electronic label, the secondary identification data being associated with the primary identification data which define authorized movements of the secondary carrier; and comparing the secondary identification data and the primary identification data to monitor the movement of the secondary carrier of the selected zone. The method may include the fixed attachment of the electronic label secondary to an article of value so that the unauthorized removal of the valuable item from the selected area can be monitored. The method may include providing the primary electronic tag to a person who supervises at least one child; by providing a secondary electronic label to the child, the secondary electronic label includes unique identification data to identify the child and which are transmitted intermittently; programming the primary electronic tag with the primary identification data and the secondary electronic tag with the secondary identification data; and ^ 10 generate an alarm signal when the child and the supervisor are not in the same area. A plurality of children can each be given a secondary electronic label and the primary identification data includes an inventory of the secondary electronic labels with which it is associated. The method can include controlling the operation of the security control array in response to the JBt comparison selectively to inhibit the deviation of the primary carrier from the zone. In addition, according to the invention, a method for monitoring the use of at least one vehicle is provided, the method includes: supplying a primary electronic tag that includes primary identification data to a person authorized to operate a particular vehicle; providing the vehicle with a secondary electronic tag which includes secondary identification data k associated with the primary identification data; read the primary and secondary identification data in a wireless way when the person occupies the vehicle; and compare the primary and secondary identification data so that the use of the vehicle is monitored. The method may include selectively inactivating the vehicle in comparison responses. For example, a conventional vehicle immobilization system can be activated. The invention is now described, by way of example, with reference to the accompanying diagrammatic drawings. In the drawings, Figure 1 shows a schematic diagram of an access control system according to the invention; Figure 2 shows a schematic diagram of a vehicle control system, also according to the invention, for controlling the use of a vehicle; Figure 3 shows a schematic diagram of the installation of electronic tags for use in the vehicle control system of Figure 2; and Figure 4 shows a schematic block diagram of various optional facilities of the reading apparatus for reading the electronic labels of the control systems of Figure 2. ^ fc With reference to the drawings, reference number 10 generally indicates a system monitoring in form of an access control system according to the invention.
The system 10 includes a primary electronic tag 12 carried by an authorized primary carrier 14 of the tag 12, a secondary electronic tag 16 which is fixedly mounted to a secondary carrier in the form of an object f 10 such as a portable computer 18 , a reading device 20, an optional guest computer 22 and an access control arrangement 24. The reading apparatus 20 includes a comparator 26 which is operable to compare selected data received from electronic labels 12, 16 both primary as secondary and, in response to the comparison, allow or deny access of the carrier 14 to or from a selected area, typically business facilities or the like. The primary electronic label 14 is an active label that includes its own power supply unit the which typically includes a long-life lithium battery. The primary electronic tag 12 has a storage medium in which primary identification data are programmed. The data can be programmed remotely in a conventional wireless manner within the label 12 primary electronics or via wired connections. The primary identification data is uniquely associated with the authorized bearer 14 and includes details such as the name fc and other identification details of the authorized bearer 14. Primary electronic label 12 transmits intermittently primary identification data via an RF signal which is received by the reading device 20 when the carrier 14 passes the access control point. In other embodiments of the invention, the primary electronic tag 12 is a transponder tag or the like which is interrogated conventionally. The secondary electronic label 16 is substantially similar to the primary electronic label 12 and includes unique secondary identification data which identifies the portable computer 18 to which it is attached.
Preferably, the secondary electronic tag 16 is attached to a portable computer 18 in such a manner that it is concealed and can not be easily removed from the portable computer 18. Preferably, the secondary electronic tag 16 includes a sensor of misuse to similar to detect when a person with dishonest intentions attempts to remove the electronic secondary label 16 from the portable computer 18, secondary electronic label 16 is also an active label. It includes a long-life lithium battery and intermittently transmits secondary identification data so that when it passes the access control point, the reading device 20 can receive secondary identification data. á ^ As mentioned before, secondary identification data are uniquely associated with a particular object, specifically a portable computer 18, to which it joins.
However, the primary identification data of the label 12 primary electronics include data associated with different 16 different secondary electronic labels. Therefore, the storage medium of the primary electronic label 12 BP 10 may include a plurality of secondary identification data which define what is called a "list of goods" or an inventory that defines the different goods to which the various secondary electronic tags 16 are attached. Each object or item which the carrier 14 authorized is authorized to remove or transport past the access control arrangement 24, are included in the list of goods. When the carrier 14 approaches the access control point, the reading apparatus 20 receives signals from both the primary and secondary electronic tags 12, 16 as well as primary and secondary identification data included respectively in the signals which are fed to the comparator 26. If the secondary identification data coincide with the primary identification data that is , the comparator is operable to generate a control signal which is fed into the access control arrangement 24 to allow access of the carrier 14 to or from the selected zone as the case may be. However, if the carrier 14 is not authorized to remove the portable computer 18 (or any other item that the person can transport with its associated secondary electronic tag) from the selected area, the comparator 26 will determine this when comparing the identification data. selected primary and secondary and, optionally, may prevent access to or from the selected zone 10 by means of the access control arrangement 24. Therefore, the primary electronic tag 12 defines a list of goods, each of which is affixed with a secondary electronic tag 16 which the bearer 14 is authorized to remove from various persons, for example, business In certain embodiments of the invention, the reading apparatus 20 is connected to the host computer 22 which is operable to store selected information transmitted from the electronic tags 12, 16, primary and secondary.
For example, the host computer 22 can store information from the primary electronic tag 12, so that the person to whom the primary electronic tag is granted, and thereby monitor which goods have been removed from the selected area or business facilities by the carrier 14.
With reference in particular to Figures 2 to 4 of the drawings, the reference number 30 generally indicates a vehicle control system, also according to the invention, for controlling the use of a vehicle 32. The system 30 includes a secondary electronic tag 16, a primary electronic tag 12, a vehicle immobilizer apparatus 34. The immobilizer apparatus 34 includes a reading apparatus 20 which is operable to read primary identification data and secondary identification data from the primary electronic tag 12 and the secondary electronic tag 16, respectively. The reading apparatus 20 includes a comparator which is operable to compare selected primary and secondary identification data and, in response to these, activate or deactivate the apparatus 34. immobilizer. The immobilizer apparatus 34 typically connects to the vehicle's power supply and may include its own rechargeable battery. In a manner similar to that described above, the primary electronic tag 12 has a storage medium which includes primary identification data which is related to, and associated with, various secondary electronic tags 16 to thereby define which vehicles are authorized to handle the carrier of the primary electronic 12 tag. A) Yes, in a manner similar to that described above, the data of the primary electronic tag 12 and the secondary electronic tag 16 are compared and, depending on the result of the comparison, the vehicle is immobilized or activated. The secondary electronic tag 16 is typically inserted into a vehicle fuel tank either during manufacture of the vehicle or subsequently, as shown in Fig. 3. With particular reference to Fig. 4 of the drawings, the apparatus 20 can include a plurality of readers which are located in selected positions, for example in various positions along roads 36 of pay, on poles 38 in borders, in stations 40 of police, in posts 42 of recovery of vehicles, in access points to parking 44 in a house or office, in garages 46 of service, in stations 48 for the sale of fuel and in the police and traffic 50 vehicles. Typically, readers 36 through 50 are connected via communication networks 52 to a central authority 54 which can then process the data and report the position of, for example, stolen vehicles in a recent list which are identified by the tags. 16 unique secondary electronics. Additional readers can be provided at points 54 for separating automobile clubs and can be related to various other points via communication links 56, for example with a central office of an automobile club 55. Readers 36 to 50 in Certain embodiments of the invention are fixed units which are placed at various points and, in other embodiments of the invention, are portable readers. The immobilizing apparatus 34, depending on the comparison between the selected primary identification data and the secondary identification data, can immediately immobilize the vehicle, immobilize the vehicle after a predetermined time delay, activate the flashing lights, activate a siren of the vehicle. vehicle, interrupting the lines of fuel or ignition of vehicles. Typically, the immobilizing apparatus 34 includes a microprocessor-based controller which can store data such as the service history of the vehicle, its owner, its insurer, its financier or the like. Therefore, the immobilizer apparatus 34 with its internal storage means can have the complete vehicle background including driving parameters, odometer readings or the like. The primary identification data of the primary electronic tag 12 may typically include driver identification details, medical details, after the kin details, AA number, insurance details or the like. Similarly, the secondary identification data of the secondary electronic tag 16 may include comprehensive details of the vehicle 32. In certain embodiments of the invention, the vehicle 32 will automatically be immobilized or deactivated when a driver having the primary electronic tag 12 ascends or descend from the vehicle 12. A In other embodiments of the invention, the primary electronic tag 12 may include details of a financial nature. Accordingly, the primary and secondary electronic tags 12, 16 can be used, for example, to verify credit transactions in which the event of the secondary electronic tag 16 can be included in a credit card or the like. In other modalities, the financed transactions can be extended for the billing of purchased goods. In other embodiments, the primary or secondary electronic tags 12, 16 can activate fuel supply pumps. In additional embodiments of the invention, the label 12 primary electronics can be supplied to a supervisor or a parent who supervises several children. Each child is then supplied with secondary electronic labels 16 which have a means of attachment to fix them releasably to the child. The primary identification data afterwards includes a "inventory" or list of secondary identification data which identifies each child. For example, a plurality of reading devices can be located in a park, each reading device monitors a particular area within the park. The playback then receives intermittently primary and secondary identification data and monitors whether all secondary electronic labels 16 (and therefore all children) included or identified in the primary identification data are within the same area. If not, an alarm signal can be generated. In a manner similar to the access control system 10, a secondary electronic tag 16 can be attached to a child to prevent unauthorized removal of the child from a particular area or area. It should be appreciated that the monitoring system includes the primary electronic tags with data on a ^ P 10 plurality of secondary electronic tags that can be used in a wide variety of different applications in which one or more supervisors monitor a plurality of people. For example, a tourist travel guide may grant a primary electronic label 12 which has data on a plurality of secondary electronic tags 16 that are provided to the members of the tour group. The tags 12, 16 primary and secondary electronic can, for example, ^ be monitored to ensure that all members have boarded the bus after visiting a particular tourist attraction.
The inventor considers that the invention, as illustrated, provides a relatively simple and cost-effective electronic tag array with improved operating characteristics so that it can be used in a variety of different applications.
In the systems of the prior art, an identification device can be placed on an article of value so that the unauthorized removal of the valuable article can be monitored. Such systems may require that the reading apparatus be in close proximity to the article and, when the distance between the reading apparatus exceeds a particular distance, an alarm may sound as described in US 5,396,218 (George OLAH). These types of systems have several disadvantages, for example, they are not suitable when an article is removed from a selected area monitored by the reading device, by an authorized person. In addition, they simply trigger an alarm and no data logging or similar takes place. The system 10, according to the invention, with the reading apparatus and the primary electronic tag 12, which may allow a plurality of secondary electronic tags 16 to record or monitor the removal of an item and identify (for example, in a host computer system) to the particular person who is removing the item from the selected area, can be read from the primary electronic tag. Depending on the privilege granted to the bearer of the primary electronic tag, the event can simply be recorded, or an alarm can be triggered, and so on.

Claims (21)

  1. CLAIMS 1. A monitoring system characterized because • includes a primary electronic label that includes data from 5 primary identification and associated with a primary carrier of the label; a secondary electronic label that includes secondary identification data and associated with a secondary label carrier, the secondary identification data is associated with the primary identification data; a reading device for remotely reading the primary identification data of the primary electronic label and remotely reading the secondary identification data of the secondary electronic label; and an operable comparator means for comparing the secondary identification data and the primary identification data 15, and generating an output signal depending on the result of the comparison.
  2. 2. A system as described in claim 1, characterized in that it includes a plurality of secondary electronic tags associated with the electronic tag As a primary, each secondary electronic tag includes secondary identification data which identifies the bearer to which it is attached, and which are identified by the primary identification data. A system as described in claim 1 or claim 2, characterized in that the primary electronic tag is transported in use by a person and the secondary electronic tag includes a secondary attachment means configured in a fixed manner to attach it to the secondary carrier in the form of an article of value. 4. A system as described in the claim 3, characterized in that the primary identification data includes an inventory of valuable items which the bearer is authorized to remove from a particular area monitored by the reading apparatus, each article includes a secondary electronic label which is identified by the data of primary identification. 5. A system as described in the claim 4, characterized in that it includes an alarm apparatus that responds to the output signal to generate an alarm signal when the carrier of the primary electronic label is not authorized to remove the valuable article from the area. A system as described in claim 4 or claim 5, characterized in that it includes an access control arrangement that responds to the control signal and that is selectively operable to inhibit the deviation of a person from the area, if the Valuable item is not included in the inventory. A system as described in claim 2, characterized in that the primary electronic tag includes a primary attachment means releasably configured to attach it to the primary carrier which is in the shape of a person, and the secondary electronic tag includes a means of attachment • secondary configured releasably to attach it to the secondary bearer, which is also in the form of a person. 5 8. A system as described in the claim 7, characterized in that the secondary identification data identifies a child ba or the monitoring of the carrier of the primary electronic label and the comparator compares the output signal in the form of an alarm signal when the labels < K 10 primary and secondary electronics are not within a predetermined area covered by the reading device. 9. A system as described in the claim 8, characterized in that it includes a plurality of reading devices each covering a different predetermined area than As part of a public area, the comparator means is operable to process the primary identification data and verify that all secondary electronic tags identified by the primary identification data are located within the predetermined area covered by the reading device. 20 associated, and when this does not happen, an output signal is generated in the form of an alarm signal. A system as described in claim 1 or claim 2, characterized in that the primary electronic tag is supplied in use for a person 25 authorized to use at least one selected vehicle, and the secondary electronic tag is uniquely associated with, and joins in use to the selected vehicle, the output signal indicates whether the person is authorized to use the vehicle. 11. A system as described in claim 5, characterized in that it includes an inactivation means that responds to the output signal and connected in use to an electrical system of the vehicle and selectively operable to activate the vehicle. A system as described in any of the B 10 preceding claims, characterized in that the primary and secondary electronic tags are active tags that include an RF transmitter for intermittently transmitting the identification data. A system as described in any of the preceding claims, characterized in that the primary and secondary electronic tags are programmed with the primary and secondary identification data in a wireless manner. 14. A system as described in any of the preceding claims, characterized in that at least The secondary electronic tag includes a misuse detection means for detecting misuse with the tag. 15. A method for monitoring movement from a selected area which is monitored by a reading device, the method is characterized in that it includes: Primary identification of reading from a primary electronic tag supplied to a primary carrier of the primary electronic tag; ~ identification data • Secondary readings from a secondary electronic tag associated with a secondary carrier of the secondary electronic tag 5, the secondary identification data are associated with the primary identification data which define the unauthorized movement of the secondary bearer; and comparing the secondary identification data and the primary identification data to monitor the jáfc movement 10 of the secondary carrier of the selected area. 16. A method as described in claim 15, characterized in that it includes a fixed connection of the electronic tag secondary to an article of value, whereby the unauthorized removal of the article of article is monitored. 15. A method as set forth in claim 15, characterized in that it includes: providing the primary electronic tag to a person supervising at least one child; granting a secondary electronic tag to the child; 20 child, the secondary electronic label includes unique identification data to identify the child and which are transmitted intermittently; programming the primary electronic tag with the primary identification data and the secondary electronic tag with the secondary identification data; and generate an alarm signal when the child and the supervisor are not in the same area. ^ 18. A method as described in claim 17, characterized in that a plurality of children 5 are provided to each with a secondary electronic tag and the primary identification data includes an inventory of the secondary electronic tags with which it is associated. . A method as described in any of the preceding claims 15 to 18, inclusive, characterized in that it includes controlling the operation of an access control array in response to the comparison selectively to inhibit the deflection of the primary or secondary carrier of the zone. 20. A method for monitoring the use of at least one vehicle, characterized in that the method includes: supplying a primary electronic tag that includes primary identification data to a person authorized to drive a particular vehicle; provide the vehicle with a reading device and a secondary electronic tag which includes 20 secondary identification data associated with the primary identification data; reading the primary and secondary identification data in a wireless manner when a person occupies the vehicle by means of the reading apparatus; and compare the primary and secondary identification data for 25 in this way to monitor the use of the vehicle. 21. A method as described in claim 20, characterized in that it includes selectively inactivating the vehicle in response to the comparison. # 10
MXPA/A/2000/008629A 1998-03-02 2000-09-04 Monitoring system MXPA00008629A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
ZA98/1722 1998-03-02

Publications (1)

Publication Number Publication Date
MXPA00008629A true MXPA00008629A (en) 2002-03-26

Family

ID=

Similar Documents

Publication Publication Date Title
EP1058910B1 (en) Monitoring system
US10030418B2 (en) Shielded electronic lock box
JP2644164B2 (en) System for automatic identification and detection of vehicles or targets
US5886634A (en) Item removal system and method
CN104937620B (en) System for transmitting baggage item
US7034683B2 (en) Electronic vehicle product and personnel monitoring
CN104778427A (en) Contents inventory tracking system and protocol
US7340400B2 (en) Vehicle activity module
CN107004176A (en) The method for the commodity purchased immediately for dispensing
JP2002506258A5 (en)
CN104778529A (en) Vehicle contents inventory system
RU2671925C2 (en) Vehicle with a passive entry system
CN104183148B (en) A kind of intelligent parking system based on mode identification technology and method
JP4305959B2 (en) Car burglar alarm device
CN102376141A (en) Radio frequency identification device (RFID)-based double card identification bicycle antitheft system
US20080204237A1 (en) RFID tag with security features
CN201765661U (en) Bicycle theft prevention system based on RFID dual-card identification
MXPA00008629A (en) Monitoring system
EP1546824A1 (en) Real time total asset visibility system
WO2005020173A1 (en) Method and apparatus for preventing or deterring theft or loss of shopping trolleys
JPH11180254A (en) Location monitoring system
US11130461B2 (en) Collision activated radio-frequency identification recorder
JP2006085470A (en) On-vehicle article theft tracking system
CZ20003213A3 (en) Monitoring system
CA2579976A1 (en) Rfid tag with security features