WO2018104880A1 - A system and method of tracking and monitoring of valuable articles - Google Patents

A system and method of tracking and monitoring of valuable articles Download PDF

Info

Publication number
WO2018104880A1
WO2018104880A1 PCT/IB2017/057686 IB2017057686W WO2018104880A1 WO 2018104880 A1 WO2018104880 A1 WO 2018104880A1 IB 2017057686 W IB2017057686 W IB 2017057686W WO 2018104880 A1 WO2018104880 A1 WO 2018104880A1
Authority
WO
WIPO (PCT)
Prior art keywords
tag
person
article
alert
database
Prior art date
Application number
PCT/IB2017/057686
Other languages
French (fr)
Inventor
Hermanus Johannes ESPACH
Mario NEL
Original Assignee
Espach Hermanus Johannes
Nel Mario
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Espach Hermanus Johannes, Nel Mario filed Critical Espach Hermanus Johannes
Publication of WO2018104880A1 publication Critical patent/WO2018104880A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1445Mechanical actuation by lifting or attempted removal of hand-portable articles with detection of interference with a cable tethering an article, e.g. alarm activated by detecting detachment of article, breaking or stretching of cable
    • G08B13/1463Physical arrangements, e.g. housings
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons

Definitions

  • This invention relates to tracking and monitoring of valuable articles (cargo) relative to a person, and it relates more specifically to a system and method, using wireless tags, of associating articles with a person and then tracking the articles relative to the person (e.g., at airports, harbours, stations or destinations).
  • many of the aspects of this system may find application in other fields and not just air travel, e.g., couriers of goods, freight - by land and sea, transport of valuables, etc. It is an aim of the invention to create an association between a person and articles belonging to that person, and to track this association along the journey, especially when a portion of the journey requires that the person and the articles are separated.
  • the invention provides a system for tracking and monitoring of valuable articles, the system including: a plurality of wireless electronic tags, each electronic tag having a unique identifier, the plurality of electronic tags including:
  • At least one person tag which is configured to be worn on or carried by a person and which is configured to identify the person
  • At least one article tag which is configured to be attached to an article and which is configured to identify the article
  • the wireless tag reader configured to read the identifier of the person tag and/or the article tag when they are within range of the wireless tag reader;
  • a tag database configured to store details of the person tag and the article tag, the details at least including the unique identifier of each tag;
  • an association module communicatively coupled to the tag database and being configured to create and store in the tag database an association or relationship status between the person tag and the article tag;
  • a monitoring module communicatively coupled to the wireless tag reader, configured to receive tag readings from the wireless tag reader and to track and store details of the readings in the tag database;
  • an alert module including alert criteria with at least one alert criterion being that a person tag and its associated article tag are not proximate each other, the alert module being configured to query the tag database to obtain details of the person tag and the article tag and to compare them to the tag readings from the tag reader, and to raise an alert in response to one of the alert criteria being violated.
  • the person tag and/or the article tag may include RFID tags (e.g., passive RFID tags).
  • the tag reader may be an RFID reader or interrogator.
  • the person tag may be configured to be worn by the person.
  • the person tag may include an attachment arrangement configured to be attached to a body part of the person.
  • the attachment arrangement may be in the form of a wristband or bracelet.
  • the attachment arrangement may include a clasp.
  • the clasp may include a magnetic lock and may be openable only with a special tool, e.g., a magnetic key with a unique code.
  • the details may include descriptors of the person and/or of the article.
  • a descriptor of the person may include a name, details of a journey (e.g., source, destination) of the person, etc.
  • a descriptor of the article may include a weight, a nature of the article (e.g., fragile, over-size, etc.).
  • the article tag may include a lockable loop which can be secured around part of an article.
  • the article may be a valuable article or the article may be a container or case (e.g., a suitcase) containing valuables.
  • the article tag may be attachable to a handle of the container, e.g., like airline tags are currently looped around suitcase handles.
  • the lockable loop of the article tag may include a magnetic lock which is openable only with a special tool, e.g., a magnetic key.
  • Some or all of the wireless tag readers may be provided by a Threshold Antenna by Impinj (htlp ⁇ www.impinj.com/products/readers/speedwav-antennas/, accessed 21 September 2016).
  • the tag database may be remote from the wireless tag readers.
  • the tag database may be hosted by a computer server and communicatively coupled to the wireless tag readers by a telecommunications network which may include the internet.
  • the alert criteria may additionally include one or more of: the person tag being proximate to an article tag not associated with the person tag;
  • the person tag being worn or carried by a person which does not match the descriptor of the person as stored in the tag database;
  • the article tag being proximate to a person tag not associated with the article tag; the article tag being attached to an article which does not match the descriptor of the article as stored in the tag database;
  • the person tag and/or the article tag being flagged as suspicious; and/or a person tag and/or an article tag being at a location where they are not supposed to be.
  • the association module may provide a user interface to an operator via which the operator may input details of at least one person tag and at least one article tag to be associated with each other.
  • the association module may be operable to receive an input from a scanner operated by the operator in order to identify each of the tags. For example, the operator may wield a handheld RFID or barcode scanner to scan each of the tags and then enter a user input via the user interface to link or associate the tags. The association module may then communicate the operator input indicative of the tag association to the tag database.
  • the alert module may be able to trigger an alert device.
  • the alert module may be operable to raise the alert in one or more of the following ways:
  • an audible alert e.g., a siren
  • a visual alert e.g., a red light
  • a message alert (e.g., a message sent to security personnel).
  • the alert module may be configured to provide an input arrangement or a user interface, via which at least one descriptor of the person tag and/or the article tag may be inputted.
  • the alert module may be operable to receive the descriptor input and to compare it against the descriptor in the tag database and, if there is a mismatch, raise an alert. For example, if the article was described as weighting 10 kg when beginning a journey, and only 6 kg upon arriving at its destination, it may indicate tampering/theft and warrant further investigation.
  • the invention extends to a method for tracking and security of valuable articles, the method including:
  • each electronic tag having a unique identifier, the plurality of electronic tags including:
  • At least one person tag which is configured to be worn on or carried by a person and which is configured to identify the person
  • At least one article tag which is configured to be attached to an article and which is configured to identify the article
  • each wireless tag reader configured to read the identifier of the person tag and/or the article tag when they are within range of one of the wireless tag readers;
  • raising an alert by an alert module including alert criteria with at least one alert criterion being that a person tag and its associated article tag are not proximate each other, wherein raising the alert comprises:
  • the invention extends to a non-transitory computer-readable medium having stored thereon a computer program which, when executed on a computer, causes the computer to perform the method defined above.
  • FIG. 1 shows a schematic view of a series of wireless tags
  • FIG. 2 shows a schematic view of a network topology of a system for tracking and monitoring of valuable articles, in accordance with the invention, using the tags of FIG. 1 ;
  • FIG. 3 shows a schematic view of a tag server forming part of the system of FIG. 2;
  • FIG. 4 shows a flow diagram of a setup portion of a method for tracking and monitoring of valuable articles, in accordance with the invention
  • FIG. 5 shows a flow diagram of a check-in portion of the method of FIG. 4
  • FIG. 6 shows a flow diagram of a check-out portion of the method of FIG. 4.
  • FIG. 7 shows a schematic view of a computer within which a set of instructions, for causing the computer to perform any one or more of the methodologies described herein, may be executed.
  • a person 100 is an airline passenger who will be travelling by aeroplane from one place (a journey source) to another place (a journey destination). During his journey, he will be travelling with a plurality of articles 1 1 0.1 -1 1 0.3 (collectively referenced by numeral 1 10) in the form of items of luggage. As is typical in air travel, most luggage, and certainly the larger items, is checked into the cargo hold and thus separated from the person 1 00 for most of the journey. The luggage 1 10 is usually reclaimed by the person 100 at the end of the journey at the destination.
  • the person 100 has a person tag 102 associated with him (or her).
  • the person tag 102 is a wireless electronic tag and is worn by the person 100.
  • the person tag 102 embodies a wristband with a magnetic clasp which is only openable with a special magnetic key. Accordingly, once the person tag 102 has been placed around the person's wrist, it cannot readily be removed with the key.
  • the person tag 1 02 is intended to be reusable.
  • Each luggage item 1 10 has an article tag 1 1 2.1 -1 1 2.3 (collectively referenced by numeral 1 12 and further referred to in this example as luggage tags 1 12) associated therewith.
  • the luggage tags 1 1 2 are also wireless electronic tags (e.g., RFID tags) and are configured to be attached to the luggage 1 1 2 around a handle or like structure using a loop of the tag 1 12 which also has a magnetic lock which cannot easily be opened without the magnetic key.
  • Each tag 102, 1 12 has a unique identifier (e.g., a serial number or code) non-removably embedded therein or programmed thereon. Accordingly, each tag 102, 1 12 serves to identify the person 100 or luggage 1 10 to which it is attached (more on this below).
  • a unique identifier e.g., a serial number or code
  • the tags 1 02, 1 1 2 are configured for use in a system 200 for tracking and security of valuable articles (that is, the luggage items 1 10, in this example).
  • FIG. 2 illustrates a network topology of the system 200.
  • the system 200 (in this example) comprises three main nodes: a tag server 202, a check-in counter 220, and a check-out area 230.
  • the tag server 202 is a computer server which is hosted in a virtual or cloud environment. It is coupled to a tag database 204.
  • the tag server 202 is linked to a telecommunications network 21 0 (e.g., the internet) via which it can communicate with the other nodes, i.e., the check-in counter 220 and check-out area 230.
  • the tag server 202 is responsible for much of the functionality and intelligence of the system 200 (refer to FIG. 3 for more detail) and for the operation of a method in accordance with the invention (see FIG. 4).
  • the tag server 202 and tag database 204 are hosted remotely from the airport, typically at a datacentre. The geographical location of the server 202 is not material to the functionality of the system 200 due to the connectivity provided by the telecommunications network 210.
  • the check-in counter 120 is a client node of the tag server 202 and comprises a computer terminal 222 and a tag reader 224.
  • the function of the check-in counter is to form an association or link between the person tag 102 and the luggage tags 1 12 and optionally also to capture further details like descriptors of the person 1 00 and the luggage 1 10.
  • the computer terminal 222 merely serves as a user interface, providing a display and an input arrangement for entering or viewing information, but the association functionality is actually provided by the tag server 202.
  • the check-out area 230 is also a client node of the tag server 202 and comprises a wide-area tag reader in the form of a threshold antenna 232. Adjacent the tag reader is an alert device 234, e.g., a red light and a siren, operable to raise an alert in the event that any alert conditions are triggered.
  • an input arrangement 238 for use by an operator can be provided. The operator will usually also have a magnetic key 240, to release the tags 102, 1 1 2 from the person 1 00 and his luggage 1 1 0.
  • the tag reader (comprising the threshold antenna 232), the alert device 234 and the input arrangement 238 are all networked to, and controlled by, the tag server 202.
  • check-in counter 220 and check-out area 230 are illustrated, it is to be appreciated that there may be a multitude of each of these at any given airport. Further, such check-in counters 220 and check-out areas 230 are preferably installed at various airports, and each check-in counter 220 and check-out area 230 at each airport is networked to the tag server 202. In this setup, a travel path of the tags 1 02, 1 1 2 and accordingly of the person 100 and his belongings 1 10 can be tracked and monitored.
  • FIG. 3 shows a schematic view of the tag server 202 and illustrates much of the functionality which it provides.
  • the tag server 202 has a computer processor 302 and a computer-readable medium 304 which has stored thereon a computer program 310 to direct the operation of the processor 302.
  • the processor 302 comprises three modules, namely an association module 312, a monitoring module 314, and an alert module 316.
  • the modules 312-316 are conceptual modules corresponding to functional tasks performed by the processor 302. It is to be understood that the processor 302 and/or the modules 312-316 may be one or more microprocessors, controllers, Digital Signal Processors (DSPs), or any other suitable computing device, resource, hardware, software, or embedded logic. Further, the modules 312-316 may be consolidated at a single node (as illustrated) or distributed or network across various nodes (not illustrated).
  • the association module 312 is linked to the check-in counter 220 and is configured to direct the operation of the computer terminal 222 in order to create a link or association between the tags 1 02, 1 1 2.
  • the association module 31 2 receives readings of the tags 102, 1 12 to be linked from the tag reader 224, and optionally descriptors of the person 100 and/or luggage 1 10, together with an inputted command from the check-in operator to associates the tags 1 02, 1 1 2. Details of this are stored in the tag database 204.
  • the monitoring module 314 is configured to receive and log readings from all tag readers along the path of the tags 102, 1 12, and particularly from the threshold antenna 232 provided at the check-out area.
  • the monitoring module 314 logs the time and date of the reading, as well as the location of the reader 232, in order to generate a journey trail for each tag 102, 1 12 which passes within reading distance of any tag reader 232.
  • the monitoring module 314 is communicatively coupled to all of the tag readers 232 via the telecommunications network 210.
  • the alert module 316 is configured to compare details of the readings of the tags 1 02, 1 1 2 as stored in the tag database 204 against tag alert criteria 318 and, in response to an alert criterion being violated, raise an alert or alarm.
  • the alert criteria 318 are carefully defined and relate to the presence of absence of associated tags 1 02, 1 12 relative to each other.
  • the alert module 31 6 is communicatively coupled, via the telecommunications network 21 0, to the alert device 234 which it triggers in response to the alert criteria 318 being violated.
  • FIG. 4 illustrates a setup portion 400 of the method.
  • Each location that is, each airport, is outfitted with the requisite equipment.
  • Each check-in counter 220 is provided with a computer terminal 222 and a tag reader 224 for the purposes of checking in the person 1 00 and initiating the associations between the provided tags 102, 1 12.
  • An operator e.g., an airline employee, operates the computer terminal 222 and is provided (at block 402) with a cache or supply of suitable tags 102, 1 12.
  • the tag reader comprising the threshold antenna 232 is outfitted (at block 404) at each exit or checkout area 230.
  • the alert criteria 318 are predefined (at block 406) by a system administrator.
  • the system 200 may be used to track and monitor the articles 1 1 0.
  • the person 100 is an airline passenger with a booked flight from a source to a destination. He arrives at the check-in counter 220 to check in himself and his three pieces of luggage 1 10.
  • the check-in operator retrieves four tags from his cache: one person tag 102 and three luggage tags 1 12.
  • the association module 312 of the tag server 202 causes the computer terminal 222 to display a user interface via which the operator enters information.
  • the operator uses the computer terminal 222 to input that the person 1 00 is checking in and a new tag association should be created.
  • the operator reads (at block 502) each of the four tags 102, 1 12 with the tag reader 224. More specifically, the tag reader 224 interrogates the tag 102, 1 12 and obtains each of their unique identifiers (referred to as IDs). The operator assists the person 100 in attaching the person tag 102 around his wrist and attaches the luggage tags 1 1 2 to the luggage 1 10. The operator also records the weight of each item of luggage 1 1 0 and enters it into the computer terminal 222. A flight itinerary of the person 100 may also be captured. The operator confirms the details by inputting a confirmation (at block 504).
  • the computer terminal 222 sends (at block 506) the received information, including the tag IDs, via the association module 31 2 which stores (at block 508) the association on the tag database 204, together with the other descriptors including luggage weight, in the form of a tag record 330.1 .
  • a separate tag record 330. m is created for each set of tag associations (e.g., each person and their linked luggage). The details and association of the tags 1 02, 1 1 2 are then securely stored and remotely accessible on the tag database 204 by any authorised terminal, even at another airport in another country.
  • the person 1 00 is then free to continue his journey. He may be separated from his luggage 1 10 if it is being checked-in to the cargo hold of the aeroplane. This is common practice. When his plane arrives at his destination and he disembarks, he proceeds to a conventional baggage carousel to collect his suitcases 1 10. He collects his suitcases 1 10 and carries or wheels them to the check-out area 230.
  • the threshold antenna 232 continuously scans for proximate electronic tags. When the person 100 and the luggage 1 10 are proximate (that is, within scan range), the threshold antenna 232 automatically reads (at block 602) the tag ID of each of the person tag 102 and the luggage tags 1 12.
  • the tag reader (including the threshold antenna 232), under the control of the monitoring module 314, sends the readings, including the tag IDs, to the tag server 202 which correspondingly receives (at block 604) the readings and stores (at block 606) them in the tag database 204.
  • the alert module 31 6 periodically or constantly monitors (at block 608) the tag readings against the initial tag record 330.1 and the alert criteria 31 8 to check that the person tag 102 is still proximate the linked luggage tags 1 12, which is indicative that the person 100 still has all of his items of luggage 1 10. If all is well and the alert criteria 318 are not violated, no alert is raised.
  • a check-out operator can release the tags 1 02, 1 12 using his magnetic key 240.
  • tags 102, 1 12 are re-usable, he collects them and places them in a container for re-use later. He may flag the tags, using his input arrangement 238, as "journey competed" so that tag record 330.1 can be updated and closed. Data on the tags 102, 1 12 themselves is usually not edited, but their unique identifiers are merely made available for reuse. In a different embodiment, the tags may be disposable and are then merely discarded.
  • the person 100 can weigh his bags 1 10 and an operator can enter the weight using the input arrangement 238 which sends it to the tag server 202.
  • the alert module 316 can compare this later measured weight against the earlier measured weight at the check- in counter 220 to ensure that they match. If the weights do not match, this may be evident of theft or tampering and the alert module 316 sends an alert message to the alert device 234 to trigger a minor alert.
  • the operator at the check-out area could also have a communication device (e.g., coupled to the input arrangement 238) configured to receive alert messages, e.g., "Bag 1 1 0.2 weighed 1 1 .8 kg at check in but only 8.0 kg at check out. Possible tampering.” The operator can then converse with the person 100 to resolve the issue.
  • a communication device e.g., coupled to the input arrangement 238, configured to receive alert messages, e.g., "Bag 1 1 0.2 weighed 1 1 .8 kg at check in but only 8.0 kg at check out. Possible tampering.”
  • the operator can then converse with the person 100 to resolve the issue.
  • the alert module 316 sends (at block 61 0) an alert message to trigger the alert device 234 to raise the alarm (and the alert message may also be sent to the communication device of the check-out operator).
  • the first scenario is that the person 100 is missing some of his luggage 1 10.
  • the person 1 00 identified by the person tag 102 only had two of his suitcases 1 1 0.1 , 1 1 0.2 (as identified by the luggage tags 1 12.1 , 1 12.2), then this indicates that the bag 1 10.3 (with luggage tag 1 1 2.3) is missing. He may have forgotten about this bag 1 10.3 or may have taken somebody else's bag having a similar appearance.
  • the alert device 234 will automatically alert the person 100 and the check-out operator to this fact. This would remind the person in case he merely forgot his bag 1 10.3. However, if there was a more nefarious reason, e.g., sabotage or terrorism, and the person 100 had no explanation for his missing bag, the check-out operator could alert airport security. There could well be an innocent explanation for the missing bag, e.g., the person 100 gave it to his wife and they have become separated. He may be requested to remain while his wife arrives so that he can leave with all his bags.
  • the second scenario is that one of the items of luggage 1 10.3 is at the check-out area 230 without its owner 1 00. This may indicate that someone is trying to steal the bag 1 1 0.3, or perhaps has taken it accidentally.
  • the alert device 234 sounds an alarm (e.g., red flashing light and siren) to alert the check-out operator to this bag 1 1 0.3 without its owner 1 00.
  • an alarm e.g., red flashing light and siren
  • the check-out operator may alert airport security to investigate further.
  • threshold antennas 232 need not be installed only at check-out areas, but could be installed at intermediate areas, e.g., walkways and cargo holds, to monitor the wireless tags 1 02, 1 1 2 separately along their journey prior to exit.
  • FIG. 7 shows a diagrammatic representation of a computer 700 within which a set of instructions, for causing the computer 700 to perform any one or more of the methodologies described herein, may be executed.
  • the computer 700 may operate in the capacity of a server or a client machine in server- client network environment, or as a peer machine in a peer-to-peer (or distributed) network environment.
  • the computer 700 may be a personal computer (PC), a tablet PC, a set-top box (STB), a personal digital assistant (PDA), a cellular telephone, a web appliance, a network router, switch or bridge, or any computer 700 capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that computer 700.
  • PC personal computer
  • PDA personal digital assistant
  • STB set-top box
  • FIG. 7 shows a diagrammatic representation of a computer 700 within which a set of instructions, for causing the computer 700 to perform any one or more of the methodologies described herein, may be executed.
  • the example computer 700 includes a processor 702 (e.g., a central processing unit (CPU), a graphics processing unit (GPU) or both, a main memory 704 and a static memory 706, which communicate with each other via a bus 708.
  • the computer 700 may further include a video display unit 710 (e.g., a display screen)).
  • the computer 700 also includes an alphanumeric input device 71 2 (e.g., a keyboard), a graphical user interface (GUI) navigation device 714 (e.g., a mouse), a tactile input device (e.g., a touchscreen), a disk drive unit 71 6, a signal generation device 718 (e.g., a speaker) and a network interface device 720.
  • GUI graphical user interface
  • the disk drive unit 71 6 includes a computer-readable medium 722 on which is stored one or more sets of instructions and data structures (e.g., software 724) embodying or utilised by any one or more of the methodologies or functions described herein.
  • the software 724 may also reside, completely or at least partially, within the main memory 704 and/or within the processor 702 during execution thereof by the computer system 700 and/or within the static memory 706, the main memory 704, the static memory 706, and the processor 702 also constituting computer-readable media.
  • the software 724 may further be transmitted or received over a network 726 via the network interface device 720 utilising any one of a number of well-known transfer protocols (e.g., HTTP, FTP).
  • HTTP HyperText Transfer Protocol
  • the computer-readable medium 722 is shown in an example embodiment to be a single medium, the term "computer-readable medium" should be taken to include a single medium or multiple media (e.g., a centralised or distributed database, and/or associated caches and servers) that store the one or more sets of instructions.
  • computer-readable medium shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the computer 700 and that cause the computer 700 to perform any one or more of the methodologies of the present embodiments, or that is capable of storing, encoding or carrying data structures utilised by or associated with such a set of instructions.
  • computer-readable medium shall accordingly be taken to include, but not be limited to, solid-state memories and optical and magnetic media.
  • the tag server 202 may include at least some of the components of the computer 700.
  • the system 200 and method 400-600 can assist in ensuring that a traveller is successfully reunited with their luggage - all of their luggage and only their luggage - at the end of the journey. Incidences of theft can be reduced as can incidences of "suspicious" baggage.
  • the invention provides seamless tracking and monitoring of luggage. The application can naturally be extended beyond air travel and could find application whenever a person moves from one point to another with associated articles or items which may become separated from the person during the movement.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Computer Security & Cryptography (AREA)
  • Electromagnetism (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

A system for tracking and monitoring of valuable articles includes a plurality of wireless electronic tags having unique identifiers, including at least one person tag (102) which is configured to be worn on or carried by a person (100) and at least one article tag (112.1, 112.2, 112.3) which is configured to be attached to an article (110.1, 110.2, 110.3). The system includes at least one wireless tag reader (224) at a location or travel path where the person (100) and the article (1 1 0.1, 110.2, 110.3) are to be tracked to read the identifier of the tags (1121, 112.2, 112.3), and a tag database (204) configured to store details of the tags (112.1, 112.2, 112.3) including the unique identifier of each tag. The system includes an association module (312) to create and store in the tag database (204) an association between tags (1121, 112.2, 112.3), a monitoring module (314) configured to receive tag readings and store them in the tag database (204) and an alert module (316) including to raise an alert if a person tag and its associated article tag are not proximate each other.

Description

A system and method of tracking and monitoring of valuable articles
FIELD OF INVENTION This invention relates to tracking and monitoring of valuable articles (cargo) relative to a person, and it relates more specifically to a system and method, using wireless tags, of associating articles with a person and then tracking the articles relative to the person (e.g., at airports, harbours, stations or destinations).
BACKGROUND OF INVENTION The Applicants have noted that lost or stolen baggage and cargo at airports and harbours is problematic. This may occur accidentally, through mismanagement or careless staff, or intentionally if a thief obtains access to luggage or cargo. Also, in the present age of terrorist activities, every effort should be made to unite an owner with their luggage/cargo so that suspicious bags/cargo are not left unattended.
The Applicants desire a system and method of tracking and monitoring luggage and Cargo. However, many of the aspects of this system may find application in other fields and not just air travel, e.g., couriers of goods, freight - by land and sea, transport of valuables, etc. It is an aim of the invention to create an association between a person and articles belonging to that person, and to track this association along the journey, especially when a portion of the journey requires that the person and the articles are separated.
SUMMARY OF INVENTION
The invention provides a system for tracking and monitoring of valuable articles, the system including: a plurality of wireless electronic tags, each electronic tag having a unique identifier, the plurality of electronic tags including:
at least one person tag which is configured to be worn on or carried by a person and which is configured to identify the person; and
at least one article tag which is configured to be attached to an article and which is configured to identify the article;
at least one wireless tag reader at a location or travel path where the person and the article are to be tracked, the wireless tag reader configured to read the identifier of the person tag and/or the article tag when they are within range of the wireless tag reader;
a tag database configured to store details of the person tag and the article tag, the details at least including the unique identifier of each tag;
an association module communicatively coupled to the tag database and being configured to create and store in the tag database an association or relationship status between the person tag and the article tag;
a monitoring module, communicatively coupled to the wireless tag reader, configured to receive tag readings from the wireless tag reader and to track and store details of the readings in the tag database; and
an alert module including alert criteria with at least one alert criterion being that a person tag and its associated article tag are not proximate each other, the alert module being configured to query the tag database to obtain details of the person tag and the article tag and to compare them to the tag readings from the tag reader, and to raise an alert in response to one of the alert criteria being violated.
The person tag and/or the article tag (collectively referred to as the tags) may include RFID tags (e.g., passive RFID tags). In such case, the tag reader may be an RFID reader or interrogator.
There may be a plurality of wireless tag readers spaced along a travel path of the person or at check-out or destination points. The person tag may be configured to be worn by the person. The person tag may include an attachment arrangement configured to be attached to a body part of the person. The attachment arrangement may be in the form of a wristband or bracelet. The attachment arrangement may include a clasp. The clasp may include a magnetic lock and may be openable only with a special tool, e.g., a magnetic key with a unique code.
In addition to the unique identifier of the tags, the details may include descriptors of the person and/or of the article. A descriptor of the person may include a name, details of a journey (e.g., source, destination) of the person, etc. A descriptor of the article may include a weight, a nature of the article (e.g., fragile, over-size, etc.).
The article tag may include a lockable loop which can be secured around part of an article. The article may be a valuable article or the article may be a container or case (e.g., a suitcase) containing valuables. The article tag may be attachable to a handle of the container, e.g., like airline tags are currently looped around suitcase handles. Again, the lockable loop of the article tag may include a magnetic lock which is openable only with a special tool, e.g., a magnetic key.
Some or all of the wireless tag readers may be provided by a Threshold Antenna by Impinj (htlp^www.impinj.com/products/readers/speedwav-antennas/, accessed 21 September 2016).
The tag database may be remote from the wireless tag readers. The tag database may be hosted by a computer server and communicatively coupled to the wireless tag readers by a telecommunications network which may include the internet.
The alert criteria may additionally include one or more of: the person tag being proximate to an article tag not associated with the person tag;
the person tag being worn or carried by a person which does not match the descriptor of the person as stored in the tag database;
the article tag being proximate to a person tag not associated with the article tag; the article tag being attached to an article which does not match the descriptor of the article as stored in the tag database;
the person tag and/or the article tag being flagged as suspicious; and/or a person tag and/or an article tag being at a location where they are not supposed to be.
The association module may provide a user interface to an operator via which the operator may input details of at least one person tag and at least one article tag to be associated with each other. The association module may be operable to receive an input from a scanner operated by the operator in order to identify each of the tags. For example, the operator may wield a handheld RFID or barcode scanner to scan each of the tags and then enter a user input via the user interface to link or associate the tags. The association module may then communicate the operator input indicative of the tag association to the tag database.
There may be plural or various person tag to article tag associations or relationships. For example, one person tag may be associated with only one article tag. One person tag may be associated with plural article tags (e.g., when a traveller is travelling with plural luggage articles). A person tag may be associated with another person tag (e.g., when a parent is travelling with a child). Plural person tags may be associated with plural article tags (e.g., when a group with common luggage is travelling together). There may be various other tag relationships, as may suit the circumstances of use of the tags. The alert module may be able to trigger an alert device. The alert module may be operable to raise the alert in one or more of the following ways:
an audible alert (e.g., a siren);
a visual alert (e.g., a red light);
a message alert (e.g., a message sent to security personnel).
The alert module may be configured to provide an input arrangement or a user interface, via which at least one descriptor of the person tag and/or the article tag may be inputted. The alert module may be operable to receive the descriptor input and to compare it against the descriptor in the tag database and, if there is a mismatch, raise an alert. For example, if the article was described as weighting 10 kg when beginning a journey, and only 6 kg upon arriving at its destination, it may indicate tampering/theft and warrant further investigation.
The invention extends to a method for tracking and security of valuable articles, the method including:
providing a plurality of wireless electronic tags, each electronic tag having a unique identifier, the plurality of electronic tags including:
at least one person tag which is configured to be worn on or carried by a person and which is configured to identify the person; and
at least one article tag which is configured to be attached to an article and which is configured to identify the article;
providing a plurality of wireless tag readers spaced around a location or travel path where the person and the article are to be tracked, each wireless tag reader configured to read the identifier of the person tag and/or the article tag when they are within range of one of the wireless tag readers;
storing, in a tag database, details of the person tag and the article tag, the details at least including the unique identifier of each tag; creating, by an association module communicatively coupled to the tag database, an association between the person tag and the article tag and storing the association in the tag database;
receiving, by a monitoring module communicatively coupled to the wireless tag readers, tag readings from the wireless tag readers;
storing details of the readings in the tag database; and
raising an alert, by an alert module including alert criteria with at least one alert criterion being that a person tag and its associated article tag are not proximate each other, wherein raising the alert comprises:
querying the tag database to obtain details of the person tag and the article tag;
comparing the details of the person tag and the article tag to the tag readings from the tag reader and raising the alert in response to one of the alert criteria being violated.
The invention extends to a non-transitory computer-readable medium having stored thereon a computer program which, when executed on a computer, causes the computer to perform the method defined above.
BRIEF DESCRIPTION OF DRAWINGS The invention will now be further described, by way of example, with reference to the accompanying diagrammatic drawings.
In the drawings:
FIG. 1 shows a schematic view of a series of wireless tags;
FIG. 2 shows a schematic view of a network topology of a system for tracking and monitoring of valuable articles, in accordance with the invention, using the tags of FIG. 1 ; FIG. 3 shows a schematic view of a tag server forming part of the system of FIG. 2;
FIG. 4 shows a flow diagram of a setup portion of a method for tracking and monitoring of valuable articles, in accordance with the invention;
FIG. 5 shows a flow diagram of a check-in portion of the method of FIG. 4;
FIG. 6 shows a flow diagram of a check-out portion of the method of FIG. 4; and
FIG. 7 shows a schematic view of a computer within which a set of instructions, for causing the computer to perform any one or more of the methodologies described herein, may be executed.
DETAILED DESCRIPTION OF EXAMPLE EMBODIMENT
The following description of the invention is provided as an enabling teaching of the invention. Those skilled in the relevant art will recognise that many changes can be made to the embodiment described, while still attaining the beneficial results of the present invention. It will also be apparent that some of the desired benefits of the present invention can be attained by selecting some of the features of the present invention without utilising other features. Accordingly, those skilled in the art will recognise that modifications and adaptations to the present invention are possible and can even be desirable in certain circumstances, and are a part of the present invention. Thus, the following description is provided as illustrative of the principles of the present invention and not a limitation thereof.
This example is described with reference to air travel. It will be appreciated by one skilled in the art that this is not the only use of the invention, and there may be many other uses, e.g., courier services, events or functions, general logistics, etc.
In this example, and with reference to FIG. 1 , a person 100 is an airline passenger who will be travelling by aeroplane from one place (a journey source) to another place (a journey destination). During his journey, he will be travelling with a plurality of articles 1 1 0.1 -1 1 0.3 (collectively referenced by numeral 1 10) in the form of items of luggage. As is typical in air travel, most luggage, and certainly the larger items, is checked into the cargo hold and thus separated from the person 1 00 for most of the journey. The luggage 1 10 is usually reclaimed by the person 100 at the end of the journey at the destination.
In accordance with the invention, the person 100 has a person tag 102 associated with him (or her). The person tag 102 is a wireless electronic tag and is worn by the person 100. In this example, the person tag 102 embodies a wristband with a magnetic clasp which is only openable with a special magnetic key. Accordingly, once the person tag 102 has been placed around the person's wrist, it cannot readily be removed with the key. The person tag 1 02 is intended to be reusable.
Each luggage item 1 10 has an article tag 1 1 2.1 -1 1 2.3 (collectively referenced by numeral 1 12 and further referred to in this example as luggage tags 1 12) associated therewith. The luggage tags 1 1 2 are also wireless electronic tags (e.g., RFID tags) and are configured to be attached to the luggage 1 1 2 around a handle or like structure using a loop of the tag 1 12 which also has a magnetic lock which cannot easily be opened without the magnetic key.
Each tag 102, 1 12 has a unique identifier (e.g., a serial number or code) non-removably embedded therein or programmed thereon. Accordingly, each tag 102, 1 12 serves to identify the person 100 or luggage 1 10 to which it is attached (more on this below).
The tags 1 02, 1 1 2 are configured for use in a system 200 for tracking and security of valuable articles (that is, the luggage items 1 10, in this example). FIG. 2 illustrates a network topology of the system 200. The system 200 (in this example) comprises three main nodes: a tag server 202, a check-in counter 220, and a check-out area 230.
The tag server 202 is a computer server which is hosted in a virtual or cloud environment. It is coupled to a tag database 204. The tag server 202 is linked to a telecommunications network 21 0 (e.g., the internet) via which it can communicate with the other nodes, i.e., the check-in counter 220 and check-out area 230. The tag server 202 is responsible for much of the functionality and intelligence of the system 200 (refer to FIG. 3 for more detail) and for the operation of a method in accordance with the invention (see FIG. 4). The tag server 202 and tag database 204 are hosted remotely from the airport, typically at a datacentre. The geographical location of the server 202 is not material to the functionality of the system 200 due to the connectivity provided by the telecommunications network 210.
The check-in counter 120 is a client node of the tag server 202 and comprises a computer terminal 222 and a tag reader 224. The function of the check-in counter is to form an association or link between the person tag 102 and the luggage tags 1 12 and optionally also to capture further details like descriptors of the person 1 00 and the luggage 1 10. The computer terminal 222 merely serves as a user interface, providing a display and an input arrangement for entering or viewing information, but the association functionality is actually provided by the tag server 202.
Similarly, the check-out area 230 is also a client node of the tag server 202 and comprises a wide-area tag reader in the form of a threshold antenna 232. Adjacent the tag reader is an alert device 234, e.g., a red light and a siren, operable to raise an alert in the event that any alert conditions are triggered. Optionally, an input arrangement 238 for use by an operator can be provided. The operator will usually also have a magnetic key 240, to release the tags 102, 1 1 2 from the person 1 00 and his luggage 1 1 0. The tag reader (comprising the threshold antenna 232), the alert device 234 and the input arrangement 238 are all networked to, and controlled by, the tag server 202.
Although only one check-in counter 220 and check-out area 230 are illustrated, it is to be appreciated that there may be a multitude of each of these at any given airport. Further, such check-in counters 220 and check-out areas 230 are preferably installed at various airports, and each check-in counter 220 and check-out area 230 at each airport is networked to the tag server 202. In this setup, a travel path of the tags 1 02, 1 1 2 and accordingly of the person 100 and his belongings 1 10 can be tracked and monitored.
FIG. 3 shows a schematic view of the tag server 202 and illustrates much of the functionality which it provides. The tag server 202 has a computer processor 302 and a computer-readable medium 304 which has stored thereon a computer program 310 to direct the operation of the processor 302. The processor 302 comprises three modules, namely an association module 312, a monitoring module 314, and an alert module 316. The modules 312-316 are conceptual modules corresponding to functional tasks performed by the processor 302. It is to be understood that the processor 302 and/or the modules 312-316 may be one or more microprocessors, controllers, Digital Signal Processors (DSPs), or any other suitable computing device, resource, hardware, software, or embedded logic. Further, the modules 312-316 may be consolidated at a single node (as illustrated) or distributed or network across various nodes (not illustrated).
The association module 312 is linked to the check-in counter 220 and is configured to direct the operation of the computer terminal 222 in order to create a link or association between the tags 1 02, 1 1 2. The association module 31 2 receives readings of the tags 102, 1 12 to be linked from the tag reader 224, and optionally descriptors of the person 100 and/or luggage 1 10, together with an inputted command from the check-in operator to associates the tags 1 02, 1 1 2. Details of this are stored in the tag database 204.
The monitoring module 314 is configured to receive and log readings from all tag readers along the path of the tags 102, 1 12, and particularly from the threshold antenna 232 provided at the check-out area. The monitoring module 314 logs the time and date of the reading, as well as the location of the reader 232, in order to generate a journey trail for each tag 102, 1 12 which passes within reading distance of any tag reader 232. The monitoring module 314 is communicatively coupled to all of the tag readers 232 via the telecommunications network 210. The alert module 316 is configured to compare details of the readings of the tags 1 02, 1 1 2 as stored in the tag database 204 against tag alert criteria 318 and, in response to an alert criterion being violated, raise an alert or alarm. The alert criteria 318 are carefully defined and relate to the presence of absence of associated tags 1 02, 1 12 relative to each other. The alert module 31 6 is communicatively coupled, via the telecommunications network 21 0, to the alert device 234 which it triggers in response to the alert criteria 318 being violated.
The invention will now be described in use with reference to method 400-600 of FIGS 4-6. FIG. 4 illustrates a setup portion 400 of the method. Each location, that is, each airport, is outfitted with the requisite equipment. Each check-in counter 220 is provided with a computer terminal 222 and a tag reader 224 for the purposes of checking in the person 1 00 and initiating the associations between the provided tags 102, 1 12. An operator, e.g., an airline employee, operates the computer terminal 222 and is provided (at block 402) with a cache or supply of suitable tags 102, 1 12. Similarly, the tag reader comprising the threshold antenna 232 is outfitted (at block 404) at each exit or checkout area 230.
Importantly, the alert criteria 318 are predefined (at block 406) by a system administrator. In this example, there is a primary single alert criterion 318: the person tag 102 must check-out with each and every one of its associated luggage tags 1 12 at the check-out area 230. There is also a secondary alert criterion in this example: a measured weight of each luggage item 1 1 0 must match both at check-in and at checkout.
Once the system 200 has been setup, it may be used to track and monitor the articles 1 1 0. The person 100 is an airline passenger with a booked flight from a source to a destination. He arrives at the check-in counter 220 to check in himself and his three pieces of luggage 1 10. The check-in operator retrieves four tags from his cache: one person tag 102 and three luggage tags 1 12. The association module 312 of the tag server 202 causes the computer terminal 222 to display a user interface via which the operator enters information. The operator uses the computer terminal 222 to input that the person 1 00 is checking in and a new tag association should be created.
The operator reads (at block 502) each of the four tags 102, 1 12 with the tag reader 224. More specifically, the tag reader 224 interrogates the tag 102, 1 12 and obtains each of their unique identifiers (referred to as IDs). The operator assists the person 100 in attaching the person tag 102 around his wrist and attaches the luggage tags 1 1 2 to the luggage 1 10. The operator also records the weight of each item of luggage 1 1 0 and enters it into the computer terminal 222. A flight itinerary of the person 100 may also be captured. The operator confirms the details by inputting a confirmation (at block 504). The computer terminal 222 sends (at block 506) the received information, including the tag IDs, via the association module 31 2 which stores (at block 508) the association on the tag database 204, together with the other descriptors including luggage weight, in the form of a tag record 330.1 . A separate tag record 330. m is created for each set of tag associations (e.g., each person and their linked luggage). The details and association of the tags 1 02, 1 1 2 are then securely stored and remotely accessible on the tag database 204 by any authorised terminal, even at another airport in another country.
The person 1 00 is then free to continue his journey. He may be separated from his luggage 1 10 if it is being checked-in to the cargo hold of the aeroplane. This is common practice. When his plane arrives at his destination and he disembarks, he proceeds to a conventional baggage carousel to collect his suitcases 1 10. He collects his suitcases 1 10 and carries or wheels them to the check-out area 230. The threshold antenna 232 continuously scans for proximate electronic tags. When the person 100 and the luggage 1 10 are proximate (that is, within scan range), the threshold antenna 232 automatically reads (at block 602) the tag ID of each of the person tag 102 and the luggage tags 1 12. The tag reader (including the threshold antenna 232), under the control of the monitoring module 314, sends the readings, including the tag IDs, to the tag server 202 which correspondingly receives (at block 604) the readings and stores (at block 606) them in the tag database 204. The alert module 31 6 periodically or constantly monitors (at block 608) the tag readings against the initial tag record 330.1 and the alert criteria 31 8 to check that the person tag 102 is still proximate the linked luggage tags 1 12, which is indicative that the person 100 still has all of his items of luggage 1 10. If all is well and the alert criteria 318 are not violated, no alert is raised. A check-out operator can release the tags 1 02, 1 12 using his magnetic key 240. As the tags 102, 1 12 are re-usable, he collects them and places them in a container for re-use later. He may flag the tags, using his input arrangement 238, as "journey competed" so that tag record 330.1 can be updated and closed. Data on the tags 102, 1 12 themselves is usually not edited, but their unique identifiers are merely made available for reuse. In a different embodiment, the tags may be disposable and are then merely discarded.
As an optional extra feature, there may be a weigh-station at the check-out area where the person 100 can weigh his bags 1 10 and an operator can enter the weight using the input arrangement 238 which sends it to the tag server 202. The alert module 316 can compare this later measured weight against the earlier measured weight at the check- in counter 220 to ensure that they match. If the weights do not match, this may be evident of theft or tampering and the alert module 316 sends an alert message to the alert device 234 to trigger a minor alert. The operator at the check-out area could also have a communication device (e.g., coupled to the input arrangement 238) configured to receive alert messages, e.g., "Bag 1 1 0.2 weighed 1 1 .8 kg at check in but only 8.0 kg at check out. Possible tampering." The operator can then converse with the person 100 to resolve the issue.
If, however, the person tag 102 and the luggage tags 1 12 do not match, the alert module 316 sends (at block 61 0) an alert message to trigger the alert device 234 to raise the alarm (and the alert message may also be sent to the communication device of the check-out operator). Given the example alert criteria 318, there are two primary scenarios which would cause an alert to be raised. The first scenario is that the person 100 is missing some of his luggage 1 10. For example, if the person 1 00 (identified by the person tag 102) only had two of his suitcases 1 1 0.1 , 1 1 0.2 (as identified by the luggage tags 1 12.1 , 1 12.2), then this indicates that the bag 1 10.3 (with luggage tag 1 1 2.3) is missing. He may have forgotten about this bag 1 10.3 or may have taken somebody else's bag having a similar appearance.
The alert device 234 will automatically alert the person 100 and the check-out operator to this fact. This would remind the person in case he merely forgot his bag 1 10.3. However, if there was a more nefarious reason, e.g., sabotage or terrorism, and the person 100 had no explanation for his missing bag, the check-out operator could alert airport security. There could well be an innocent explanation for the missing bag, e.g., the person 100 gave it to his wife and they have become separated. He may be requested to remain while his wife arrives so that he can leave with all his bags.
The second scenario is that one of the items of luggage 1 10.3 is at the check-out area 230 without its owner 1 00. This may indicate that someone is trying to steal the bag 1 1 0.3, or perhaps has taken it accidentally. The alert device 234 sounds an alarm (e.g., red flashing light and siren) to alert the check-out operator to this bag 1 1 0.3 without its owner 1 00. There could be a reasonable explanation for this, e.g., the person's wife is wheeling the bag 1 10.3 out and she is some distance ahead of the person 100 so the person tag 102 and the luggage tag 1 12.3 are separate. However, if there is not a reasonable explanation, the check-out operator may alert airport security to investigate further.
There are naturally various other alert criteria which could be defined, depending on the nature of monitoring and tracking required. Also, threshold antennas 232 need not be installed only at check-out areas, but could be installed at intermediate areas, e.g., walkways and cargo holds, to monitor the wireless tags 1 02, 1 1 2 separately along their journey prior to exit.
FIG. 7 shows a diagrammatic representation of a computer 700 within which a set of instructions, for causing the computer 700 to perform any one or more of the methodologies described herein, may be executed. In a networked deployment, the computer 700 may operate in the capacity of a server or a client machine in server- client network environment, or as a peer machine in a peer-to-peer (or distributed) network environment. The computer 700 may be a personal computer (PC), a tablet PC, a set-top box (STB), a personal digital assistant (PDA), a cellular telephone, a web appliance, a network router, switch or bridge, or any computer 700 capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that computer 700. Further, while only a single computer 700 is illustrated, the term "computer" shall also be taken to include any collection of computers that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.
The example computer 700 includes a processor 702 (e.g., a central processing unit (CPU), a graphics processing unit (GPU) or both, a main memory 704 and a static memory 706, which communicate with each other via a bus 708. The computer 700 may further include a video display unit 710 (e.g., a display screen)). The computer 700 also includes an alphanumeric input device 71 2 (e.g., a keyboard), a graphical user interface (GUI) navigation device 714 (e.g., a mouse), a tactile input device (e.g., a touchscreen), a disk drive unit 71 6, a signal generation device 718 (e.g., a speaker) and a network interface device 720.
The disk drive unit 71 6 includes a computer-readable medium 722 on which is stored one or more sets of instructions and data structures (e.g., software 724) embodying or utilised by any one or more of the methodologies or functions described herein. The software 724 may also reside, completely or at least partially, within the main memory 704 and/or within the processor 702 during execution thereof by the computer system 700 and/or within the static memory 706, the main memory 704, the static memory 706, and the processor 702 also constituting computer-readable media.
The software 724 may further be transmitted or received over a network 726 via the network interface device 720 utilising any one of a number of well-known transfer protocols (e.g., HTTP, FTP). While the computer-readable medium 722 is shown in an example embodiment to be a single medium, the term "computer-readable medium" should be taken to include a single medium or multiple media (e.g., a centralised or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term "computer-readable medium" shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the computer 700 and that cause the computer 700 to perform any one or more of the methodologies of the present embodiments, or that is capable of storing, encoding or carrying data structures utilised by or associated with such a set of instructions. The term "computer-readable medium" shall accordingly be taken to include, but not be limited to, solid-state memories and optical and magnetic media.
The tag server 202 may include at least some of the components of the computer 700.
The Applicants believe that the invention as exemplified has a number of advantages. The system 200 and method 400-600 can assist in ensuring that a traveller is successfully reunited with their luggage - all of their luggage and only their luggage - at the end of the journey. Incidences of theft can be reduced as can incidences of "suspicious" baggage. In an air travel scenario, the invention provides seamless tracking and monitoring of luggage. The application can naturally be extended beyond air travel and could find application whenever a person moves from one point to another with associated articles or items which may become separated from the person during the movement.

Claims

1. A system for tracking and monitoring of valuable articles, the system including: a plurality of wireless electronic tags, each electronic tag having a unique identifier, the plurality of electronic tags including:
at least one person tag which is configured to be worn on or carried by a person and which is configured to identify the person; and at least one article tag which is configured to be attached to an article and which is configured to identify the article;
at least one wireless tag reader at a location or travel path where the person and the article are to be tracked, the wireless tag reader configured to read the identifier of the person tag and/or the article tag when they are within range of the wireless tag reader;
a tag database configured to store details of the person tag and the article tag, the details at least including the unique identifier of each tag; an association module communicatively coupled to the tag database and being configured to create and store in the tag database an association or relationship status between the person tag and the article tag; a monitoring module, communicatively coupled to the wireless tag reader, configured to receive tag readings from the wireless tag reader and to track and store details of the readings in the tag database; and
an alert module including alert criteria with at least one alert criterion being that a person tag and its associated article tag are not proximate each other, the alert module being configured to query the tag database to obtain details of the person tag and the article tag and to compare them to the tag readings from the tag reader, and to raise an alert in response to one of the alert criteria being violated.
2. The system as claimed in claim 1 , in which:
the person tag and/or the article tag include RFID tags; and the tag reader is an RFID reader or interrogator.
3. The system as claimed in any one of claims 1 -2, in which there are a plurality of wireless tag readers spaced along a travel path of the person or at check-out or destination points.
4. The system as claimed in any one of claims 1 -3, in which the person tag is configured to be worn by the person and includes an attachment arrangement configured to be attached to a body part of the person.
5. The system as claimed in claim 4, in which the attachment arrangement is in the form of a wristband or bracelet including a clasp.
6. The system as claimed in claim 5, in which the clasp includes a magnetic lock and is only openable with a magnetic key.
7. The system as claimed in any one of claims 1 -6, in which the person tag and/or the article tag include descriptors of the person and/or of the article.
8. The system as claimed in any one of claims 1 -7, in which the article tag includes a lockable loop which can be secured around part of an article.
9. The system as claimed in claim 8, in which the article is a container or case and the article tag is attachable to a handle of the container.
10. The system as claimed in any one of claims 8-9, in which the lockable loop of the article tag includes a magnetic lock which is openable with a magnetic key.
11. The system as claimed in any one of claims 1 -1 0, in which the tag database is remote from the wireless tag readers.
12. The system as claimed in claim 1 1 , in which the tag database is hosted by a computer server and communicatively coupled to the wireless tag readers by a telecommunications network.
13. The system as claimed in any one of claims 1 -12, in which the alert criteria additionally includes one or more of:
the person tag being proximate to an article tag not associated with the person tag;
the person tag being worn or carried by a person which does not match a descriptor of the person as stored in the tag database;
the article tag being proximate to a person tag not associated with the article tag;
the article tag being attached to an article which does not match the descriptor of the article as stored in the tag database;
the person tag and/or the article tag being flagged as suspicious; and/or a person tag and/or an article tag being at a location where they are not supposed to be.
14. The system as claimed in any one of claims 1 -13, in which the association module provides a user interface to an operator via which the operator may input details of at least one person tag and at least one article tag to be associated with each other.
15. The system as claimed in claim 14, in which the association module is operable to receive an input from a scanner operated by the operator in order to identify each of the tags and is configured to communicate the operator input indicative of the tag association to the tag database.
16. The system as claimed in any one of claims 1 -15, in which there are plural person tag to article tag associations or relationships.
17. The system as claimed in any one of claims 1 -16, in which the alert module is configured to trigger an alert device.
18. The system as claimed in any one of claims 1 -17, in which the alert module is operable to raise the alert in one or more of the following ways:
an audible alert;
a visual alert; and/or
a message alert.
19. The system as claimed in any one of claims 1 -18, in which:
the alert module is configured to provide an input arrangement or a user interface, via which at least one descriptor of the person tag and/or the article tag may be inputted; and
the alert module is operable to receive the descriptor input and to compare it against the descriptor in the tag database and, if there is a mismatch, raise an alert.
20. A method for tracking and security of valuable articles, the method including:
providing a plurality of wireless electronic tags, each electronic tag having a unique identifier, the plurality of electronic tags including:
at least one person tag which is configured to be worn on or carried by a person and which is configured to identify the person; and at least one article tag which is configured to be attached to an article and which is configured to identify the article; providing a plurality of wireless tag readers spaced around a location or travel path where the person and the article are to be tracked, each wireless tag reader configured to read the identifier of the person tag and/or the article tag when they are within range of one of the wireless tag readers; storing, in a tag database, details of the person tag and the article tag, the details at least including the unique identifier of each tag;
creating, by an association module communicatively coupled to the tag database, an association between the person tag and the article tag and storing the association in the tag database;
receiving, by a monitoring module communicatively coupled to the wireless tag readers, tag readings from the wireless tag readers;
storing details of the readings in the tag database; and
raising an alert, by an alert module including alert criteria with at least one alert criterion being that a person tag and its associated article tag are not proximate each other, wherein raising the alert comprises:
querying the tag database to obtain details of the person tag and the article tag;
comparing the details of the person tag and the article tag to the tag readings from the tag reader and raising the alert in response to one of the alert criteria being violated.
A non-transitory computer-readable medium having stored thereon a computer program which, when executed on a computer, causes the computer to perform the method as claimed in claim 20.
PCT/IB2017/057686 2016-12-06 2017-12-06 A system and method of tracking and monitoring of valuable articles WO2018104880A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA2016/08388 2016-12-06
ZA201608388 2016-12-06

Publications (1)

Publication Number Publication Date
WO2018104880A1 true WO2018104880A1 (en) 2018-06-14

Family

ID=62491804

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2017/057686 WO2018104880A1 (en) 2016-12-06 2017-12-06 A system and method of tracking and monitoring of valuable articles

Country Status (1)

Country Link
WO (1) WO2018104880A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4135357A1 (en) * 2021-08-09 2023-02-15 Nokia Technologies Oy Tracking tags

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040124982A1 (en) * 2002-10-17 2004-07-01 Aram Kovach Method for tracking and processing passengers and their transported articles
WO2006014743A2 (en) * 2004-07-20 2006-02-09 Precision Dynamics Corporation Coordinated identification of persons and/or articles via radio frequency identification cross-identification
DE102005012933B3 (en) * 2005-03-15 2006-10-26 Dahlmann, Rainer Computerized luggage locating, tracking and search method, e.g. for use in airports, involves using computer to process data from electronic tag attached to luggage and to indicate if luggage deviates from its predetermined destination
WO2006135134A1 (en) * 2005-06-14 2006-12-21 Electronics And Telecommunications Research Institute Apparatus and method for preventing loss of baggage using rfid
JP2007254129A (en) * 2006-03-24 2007-10-04 Nec Corp Traveler's baggage management system, reader/writer for traveler's baggage management and program and method for traveler's baggage management
JP2008234115A (en) * 2007-03-19 2008-10-02 Secom Co Ltd Portable monitoring device and article monitoring system
DE102008031635A1 (en) * 2008-07-04 2010-01-21 Siemens Aktiengesellschaft Method for checking correct junction of objects assigned to each other, particularly joining of luggage items and passengers, involves assigning object to another single object
US20100039259A1 (en) * 2008-08-13 2010-02-18 Verint Systems Ltd. System and method for boarding area security
US20120242481A1 (en) * 2011-03-22 2012-09-27 Tassilo Gernandt Apparatus and method for locating, tracking, controlling and recognizing tagged objects using active RFID technology.
US20140002239A1 (en) * 2012-06-27 2014-01-02 Treefrog Developments, Inc. Tracking and control of personal effects
JP2014096043A (en) * 2012-11-09 2014-05-22 Fujitsu Frontech Ltd Monitoring device, monitoring method, and monitoring program

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040124982A1 (en) * 2002-10-17 2004-07-01 Aram Kovach Method for tracking and processing passengers and their transported articles
WO2006014743A2 (en) * 2004-07-20 2006-02-09 Precision Dynamics Corporation Coordinated identification of persons and/or articles via radio frequency identification cross-identification
DE102005012933B3 (en) * 2005-03-15 2006-10-26 Dahlmann, Rainer Computerized luggage locating, tracking and search method, e.g. for use in airports, involves using computer to process data from electronic tag attached to luggage and to indicate if luggage deviates from its predetermined destination
WO2006135134A1 (en) * 2005-06-14 2006-12-21 Electronics And Telecommunications Research Institute Apparatus and method for preventing loss of baggage using rfid
JP2007254129A (en) * 2006-03-24 2007-10-04 Nec Corp Traveler's baggage management system, reader/writer for traveler's baggage management and program and method for traveler's baggage management
JP2008234115A (en) * 2007-03-19 2008-10-02 Secom Co Ltd Portable monitoring device and article monitoring system
DE102008031635A1 (en) * 2008-07-04 2010-01-21 Siemens Aktiengesellschaft Method for checking correct junction of objects assigned to each other, particularly joining of luggage items and passengers, involves assigning object to another single object
US20100039259A1 (en) * 2008-08-13 2010-02-18 Verint Systems Ltd. System and method for boarding area security
US20120242481A1 (en) * 2011-03-22 2012-09-27 Tassilo Gernandt Apparatus and method for locating, tracking, controlling and recognizing tagged objects using active RFID technology.
US20140002239A1 (en) * 2012-06-27 2014-01-02 Treefrog Developments, Inc. Tracking and control of personal effects
JP2014096043A (en) * 2012-11-09 2014-05-22 Fujitsu Frontech Ltd Monitoring device, monitoring method, and monitoring program

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4135357A1 (en) * 2021-08-09 2023-02-15 Nokia Technologies Oy Tracking tags

Similar Documents

Publication Publication Date Title
US9784018B2 (en) Luggage tracking device, systems and methods
CN106108312B (en) Luggage locking device and baggage handling methods
US9953291B2 (en) Luggage contents recommendations and tracking
US20130002879A1 (en) Systems and methods for tracking a commodity
CN107408326A (en) Burglary-resisting system for customer service
US11361642B2 (en) Building system with sensor-based automated checkout system
US9907377B2 (en) Security system for tracking movable objects
WO2007096097A1 (en) Method and system for identifiying and handling (tracing/locating/identifying to receive services) an owner and items in a secure/private area
US11450197B2 (en) Apparatus and method of controlling a security system
Darcy et al. The challenges and issues facing the deployment of RFID technology
Muruganantham et al. Smart airline baggage tracking and theft prevention with blockchain technology
US11990014B2 (en) Smart alarm management
Rathinam et al. BLUETOOTH-BASED REAL-TIME LUGGAGE TRACKING AND STATUS UPDATES
US10521869B2 (en) Luggage management system
WO2018104880A1 (en) A system and method of tracking and monitoring of valuable articles
US20210056823A1 (en) Systems and methods for increasing alarm confidence in eas detection systems
Jagadheeswaran et al. Luggage Theft Identification And Smart Lock Using Face Recognition
Varma et al. Multifunctional Bag Monitoring System
CN211882625U (en) Luggage positioning anti-theft system
US11538130B2 (en) System and method for luggage delivery discrepancy detection
US11557191B2 (en) Baggage alert lock
Chaturvedi et al. GPS based Novel Approach for Secure Delivery of Online Purchased Items
Leema et al. Data management issues in RFID applications
Darcy Resolving RFID Anomolies Using Intelligent Analysis and Classification

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17877682

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17877682

Country of ref document: EP

Kind code of ref document: A1