WO2013021158A2 - Vérification de biens - Google Patents
Vérification de biens Download PDFInfo
- Publication number
- WO2013021158A2 WO2013021158A2 PCT/GB2012/000649 GB2012000649W WO2013021158A2 WO 2013021158 A2 WO2013021158 A2 WO 2013021158A2 GB 2012000649 W GB2012000649 W GB 2012000649W WO 2013021158 A2 WO2013021158 A2 WO 2013021158A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- asset
- data
- machine readable
- data input
- input station
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/087—Inventory or stock management, e.g. order filling, procurement or balancing against orders
Definitions
- This disclosure relates to the auditing of assets. In its several aspects a method for auditing assets and apparatus for auditing assets are disclosed. Background
- Asset management is a critical part of any business that has ownership interest in one or more assets, particularly when those assets are high in number, dispersed over a wide geographical area, and capable of being dismantled or moved.
- an “asset” in this context is meant a tangible asset such as plant or equipment.
- owners of assets should like to be able clearly to identify which assets belong to them and also know where assets are located along with their condition and usage data.
- the first component of asset management is for an asset register of sufficient integrity to be maintained that will enable the owner of assets to accurately identify each asset that they own.
- Such data should include an asset's make, model, serial number and details of any options that may be fitted.
- the collation of data of this kind has typically been a manual process, whereby asset identification data is input into an asset management IT system from data contained on the original invoice for particular assets.
- the invoice may contain insufficient or incomplete asset identification detail, such as absence of serial numbers; and the asset owner may not make further enquiries in order to determine the missing information.
- asset identification data is input into an asset management IT system from data contained on the original invoice for particular assets.
- the invoice may contain insufficient or incomplete asset identification detail, such as absence of serial numbers; and the asset owner may not make further enquiries in order to determine the missing information.
- asset identification data other important data for asset management include where an asset is located and its condition and usage. Even where it may not be practicable or cost-
- an audit of the location, condition and usage of an asset will involve sending a person to physically verify an asset's location and condition, or fixing a tracking device to an asset that regularly transmits its location via satellite or mobile phone networks to the asset's owner. Both of these options involve significant costs, and are generally only considered cost-effective for very high value assets.
- Dealerships selling motor vehicles, or other assets need to perform regular checks on their inventory to confirm the existence and location of assets that are in stock. This is needed for internal control and statutory audit purposes.
- Such dealerships use stock management IT systems that record the location of each individual asset following a physical check.
- larger dealerships may occupy multiple sites, with stock assets often being moved between these sites. Such movements are not always recorded in their stock management system.
- dealerships currently need to perform physical, on-site inventory audits at each of their sites on a regular basis. Such audits are time- consuming and costly to perform.
- the present disclosure adopts a different approach to the auditing of assets, by which term we include checking on the existence and/or status not only of a plurality of assets, but even of a single asset.
- this is inherently less costly, more reliable, and more accurate than current auditing systems involving physical checks, and is readily scalable to businesses of different sizes.
- a system for auditing assets comprises: a communications network; at least one data input station adapted to communicate with the communications network, at which data input station data relating to an asset located at the station and bearing a machine readable encoded identification may be inputted, the data input station being adapted to communicate asset-related data to the communications network; a remote server coupled to the communications network, and adapted to receive asset-related data communicated to the network by said at least one data input station and to store such data in memory associated with the remote server; the remote server being further adapted to control and direct the at least one data input station for inputting of asset-related data; at a said data input station, both a code reader associated with a User and adapted to read a machine readable encoded identification borne by an asset located at said data input station and to a camera associated with the User and adapted to record an image of said machine readable encoded identification and/or of said asset; both the code reader and the camera being adapted for coupling to the communications network at the data input station for
- the data input station need not have a fixed location. It may be mobile for the purpose of auditing assets at a plurality of geographical locations.
- the data input station comprises a smartphone, the smartphone serving both as said code reader and as said camera, the smartphone including a camera adapted to record an image of a said machine readable encoded identification and/or asset, and being pre-loaded with applications software enabling the smartphone to read said machine readable encoded data via its camera.
- the machine readable encoded identification includes data adapted for interaction with said applications software when read to cause said applications software automatically to communicate asset-rated data included in said machine readable encoded identification to said remote server via the communications network.
- the remote server is adapted to communicate with a said smartphone via the communications network providing messages directing the User for operation of the smartphone in sequential steps to read a said machine readable encoded identification and to record an image of the machine readable encoded identification and/or of the asset using the smartphone' s camera and to communicate such recorded image(s) to the remote server, and optionally to enter additional alphanumeric asset-related data via a keyboard associated with the smartphone, such additional alphanumeric asset-related data, optionally including one or more of make, model, serial number, condition and usage of the asset, and for communicating such additional alphanumeric asset-related data to said remote server.
- the remote server preferably includes an interrogation engine adapted to interrogate the communications network and or the data input station to identify the geographical location of the data input station; and the memory associated with the remote server being adapted to associate asset-related data communicated to said server from a said data input station with said geographical location in an asset audit database.
- the system preferably also includes at least one data display station coupled to the network at (a) location(s) optionally remote from the remote server, said at least one data display station being adapted for password-controlled access via the communications network to said asset audit database or to selected data entries therein.
- each of the at least one data input station is adapted to act as a data display station, the data input station including a monitor (preferably the display screen of the smartphone when the data input station comprises a smartphone) and communication between the data input station and the remote server upon reading of a machine readable encoded identification by the camera allows password controlled access to data in the asset audit database relating to the asset identified by the machine readable encoded identification and display of such data on said monitor, and optionally for amendment to such data by the User if allowed by the security level associated with their password.
- a monitor preferably the display screen of the smartphone when the data input station comprises a smartphone
- communication between the data input station and the remote server upon reading of a machine readable encoded identification by the camera allows password controlled access to data in the asset audit database relating to the asset identified by the machine readable encoded identification and display of such data on said monitor, and optionally for amendment to such data by the User if allowed by the security level associated with their password.
- the asset may additionally bear a radio frequency identification (RFID), and the system additionally includes a RFID reader arranged to be coupled to the smartphone, preferably via BluetoothTM technology, for reading the RFID.
- RFID may be provided on a label which is fixed to the asset, the RFID label including anti-tamper features that render the RFID inoperable if the label is removed from an asset.
- the RFID suitably includes an antenna and an electronic chip bearing a unique identification and coupled to the antenna, and the anti-tamper features may be provided by mounting the chip and antenna on a label substrate to form the RFID label, and by providing adhesives of different strengths between the chip and antenna and the substrate and between the label and the asset so that, upon an attempt being made to remove the label from the asset, the antenna is destroyed and/or the chip is removed from an electronic circuit comprising the chip and the antenna, so that the RFID is rendered inoperative.
- the machine readable encoded identification may be printed on the RFID label.
- a method for auditing assets comprising the steps of: employing a code reader at a data input station to read a machine readable encoded identification borne by an asset located at the data input station; recording an image of the machine readable encoded identification and/or of the asset itself using a camera located at the data input station; and communicating both said machine readable encoded identification or data derived therefrom by said code reader and said image(s) of said machine readable encoded identification and/or said asset as asset-related data via a communications network to a remote server.
- the data input station comprises a smartphone serving both as said code reader and as said camera, the smartphone including a camera that can record an image of a said machine readable encoded identification and/or asset, and being pre-loaded with applications software enabling the smartphone to read said machine readable encoded data via its camera.
- the machine readable encoded identification interacts with said applications software when read to cause the applications software automatically to communicate asset-rated data included in said machine readable encoded identification to said remote server via the communications network.
- the remote server provides messages via the communications network directing the User for operation of the smartphone in sequential steps to read a said machine readable encoded identification and to record an image of the machine readable encoded identification and/or of the asset using the smartphone' s camera and to communicate such recorded image(s) to the remote server, and optionally to enter additional alphanumeric asset-related data via a keyboard associated with the smartphone, such additional alphanumeric asset-related data, optionally including one or more of make, model, serial number, condition and usage of the asset, and for communicating such additional alphanumeric asset-related data to said remote server.
- the remote server interrogates the communications network and/or the data input station to identify the geographical location of the data input station; and an asset audit database associates asset-related data with the geographical location at which that asset-related data was produced.
- the asset audit database or to selected data entries therein may be displayed at at least one data display station coupled to the network at (a) location(s) optionally remote from the remote server employing password-controlled access.
- Each of the at least one data input station may act as a data display station, and communication between the data input station and the remote server upon reading of a machine readable encoded identification by the camera allows password controlled access to data in the asset audit database relating to the asset identified by the machine readable encoded identification and display of such data on a monitor at the data input station, and optionally allows amendment to such data by the User if allowed by the security level associated with their password.
- FIG. 1 schematically illustrates an embodiment of a system for providing an audit of assets
- Fig. 2 is of assistance in explaining the management of authorised users of the system
- Fig. 3 shows an example of displayed data derived from an asset audit database created and maintained using the teachings of this disclosure
- Fig. 4 provides an example of a report created detailing irregularities apparent as the result of an asset audit
- Fig. 5 shows a smartphone display
- Fig. 6 shows a RFID label and reader.
- a machine readable encoded identification 1 is applied to each of a plurality of assets to be audited.
- the assets may comprise obviously mobile tangible assets such as the dozer-truck 2 shown in Fig. 1 , or less obviously mobile assets such as industrial plant or a packaging line.
- the machine readable encoded identification preferably comprises a two- dimensional bar code.
- a number of two-dimensional barcode systems are commercially available, including those available under the respective Trademarks Data MatrixTM, AztecTM, MaxiCodeTM, SemacodeTM, Microsoft TagTM, and, in particular, QKTM code.
- QR codes for the reason that code reading application software capable of reading QR codes is incorporated into or readily freely available for the majority of currently available smartphones.
- QR codes can be read by Google's mobile AndroidTM operating system via the Google GogglesTM application or via certain third-party barcode scanner applications; Nokia's SymbianTM operating system is provided with a barcode scanner, which is able to read QR codes; although Apple's operating system for its iPhoneTM smartphone does not include a QR code reader, QR Code reading apps can be freely downloaded for the iPhoneTM mobile phone; and BlackBerryTM devices include a scanner for QR codes.
- An example of a QR code is shown at 1 on label 3.
- a two- dimensional barcode may be applied to an asset, including printing the two-dimensional barcode on to an asset label that is then fixed to the asset, incorporating the two- dimensional barcode into the manufacturer's identification plate, or by printing, etching or otherwise marking the two-dimensional barcode directly on to the asset itself.
- the machine readable encoded identification may be covert.
- a covert code may be printed in ultraviolet or infrared ink.
- a covert code may even be overprinted on top of a visible code, thus deterring copying of labels, since, in general, copying will only copy the visible code.
- the manner in which the code is applied to the asset should deter or make tampering apparent.
- the code may be affixed to the asset by use of a durable, adhesive asset label 3.
- asset label 3 is made from high density polyethylene suitable for thermal overprinting and protective lamination. We have found that a base material weight of 75gsm, with a 5% tolerance gives good results.
- the label adhesive will be based on deep freeze substrates to cope with condensing environments giving an inherent water resistance. The adhesive should preferably prove stable in conditions between -40°C & +80°C.
- the asset label itself can also include other technologies and features such as the use of radio frequency identification (RFID) components, thus allowing the asset label to be additionally readable using RFID reading devices, as explained in more detail below with reference to Fig. 6.
- RFID radio frequency identification
- the two-dimensional bar code and/or a RFID may be embedded in the glazing set of the asset, if a vehicle, for example in the vehicle windscreen.
- the two-dimensional barcode 1 will contain re-direct instructions via a communications network 4, suitably a global communications network such as the Internet, to a URL that identifies a remote server 5 for purposes to be explained below.
- an alphanumeric identifier 6, in this example in hexadecimal code may also be applied to the asset label.
- Fig. 1 also shows a company logo 7 on the asset label 3. This will enable a lessor for the asset to mark their asset with a visual statement as to their ownership interest, thereby deterring certain frauds perpetrated by lessees, such as fraudulent multiple lease financing. Fraudulent multiple lease financing is where a lessee undertakes a sale and leaseback (whereby the purported owner of the asset raises funds by selling it to a lessor who then immediately leases it back) with more than one lessor at the same time. Typically, when approached for a sale and leaseback deal, a lessor will conduct an on-site inspection of the asset prior to completing the transactions and releasing funds and is likely to notice any on-asset statement of interest from another lessor.
- Fraudulent multiple lease financing is where a lessee undertakes a sale and leaseback (whereby the purported owner of the asset raises funds by selling it to a lessor who then immediately leases it back) with more than one lessor at the same time.
- a lessor will conduct an on-site
- any authorised user equipped with a smartphone 8 may audit an asset 2 located at a data input station, namely the location where the user of the smartphone is located. This is a key feature in reducing the cost of performing an audit, as a user inputting data at a data input station (who may be the lessee) will typically possess their own smartphone, reducing the capital expenditure in implementation of a system for conducting asset audits.
- smartphone 8 may serve as a code reader by exposing the smartphone' s camera to the QR code 1.
- smartphone's camera may serve as a code reader by exposing the smartphone' s camera to the QR code 1.
- the smartphone camera is employed to record an image of the label or of the asset, and preferably images of both.
- the QR code incorporates instructions which, when read cause the smartphone to communicate with a specific URL (namely that of remote server 5) over the global communications network 4.
- a specific URL namely that of remote server 5
- connection with server 5 will set up two-way web connected communications between the smartphone 8 and server 5.
- Messages from server 5 are displayed on the display screen of smartphone 8, and suitably direct the user to record an image of the QR code 1, label 3 and/or asset 2.
- the user may need to exit this software in order to select the in-built camera application for the image recordal.
- the user will usually be able to click on an 'Image' button, which will interact with the appropriate application program interface in order to launch the camera application in photo mode without needing to exit the smartphone software communications application.
- the image(s) is (are) stored within memory, and the user selects "upload image" from either the mobile internet browser or smartphone software application and chooses the appropriate image(s) from the memory. Once confirmed, the image(s) is (are) uploaded to server 5 via a mobile phone connection to communications network 4.
- Server 5 includes memory that stores the machine readable encoded identification or data derived therefrom by the code reader and image(s) of the machine readable encoded identification and/or the asset itself as asset-related data (for example, as illustrated in Fig. 3) in an asset audit database.
- a smartphone Although use of a smartphone is preferred, as it incorporates both a code reader and a camera, these may be provided as separate components with appropriate applications software, provided that these separate components may be coupled to the communications network at the data input station.
- the server 5 may additionally direct a User to enter additional alphanumeric asset- related data via a keyboard associated with the smartphone 8.
- This additional alphanumeric asset-related data may include the alphanumeric identifier 6, make, model, serial number, condition or usage of the asset.
- the server 5 includes an interrogation engine which interrogates the smartphone 8 or other device serving as a data input station of the telephone system to which it is connected to determine the geographical location of the data input station by means of GPS or assisted GPS services that access data from a global navigation satellite system (GNSS) 9.
- GNSS global navigation satellite system
- Some devices that could be employed as data input stations for communicating to the communications network 5 may not possess GPS functionality, in which case an approximate geographical location may still be obtained by cell tower or wireless access point triangulation.
- the server 5 will store this determined location of the data input station with data derived from the two-dimensional barcode in the asset-related data for that particular asset stored in the asset audit database at server 5 (See, for example locations 10 in the example of asset-related data shown in Fig. 3).
- additional devices serving as data display stations 1 may be coupled to the communications network 4, as shown in Fig. 1.
- These may take various forms, including mobile phone devices 12 coupled via the mobile phone system to the network 4, devices 13 coupled directly via their browsers to the network and devices 14 coupled by Ethernet or Intranet to a server 15 which is coupled to the network 4.
- a particular Lessee may have a family of assets all leased from an owner associated with server 5. Data for this family of assets may be downloaded from server 5 to the Lessee's server 15 via network 4 for access by that Lessee's authorised staff via their respective devices 14 coupled to the Lessee's computer system.
- the system may provide for authorised Users to amend or delete data related to a specific asset in the asset audit database via a data input station such as smartphone 8, or via a data display station 1 1.
- a User will need to seek such authorisation and will be issued with a username and password, details of which will be recorded in a password memory associated with server 5.
- a particular company wishes to grant authorised user status to three employees 16.
- a co-ordinator 17 for that company provides the email addresses for the three employees 16 via communications network 4 to server 5.
- Server 5 will then email unique passwords to each of these three employees 16 via the network 4.
- the co-ordinator 17 is required to confirm each of the email addresses that still require authorised user status.
- An audit session may be commenced by communication of a two-dimensional barcode 1 to server 5 by a data input station such as smartphone 8 (Figs. 1 and 5). Although this will result in server 5 accessing the related data in its asset audit database and interrogating the geographical location, it will initially display only very limited data on display screen 18 of smartphone 7, as shown in Fig. 5. In this case, all that is displayed is the asset's make, model and serial number at 19, together with input fields for the User to input their username 20 and password 21 to fully log-in to the system.
- the present system provides a simple method of capturing the initial asset identification data and also the geographic location of the asset, and this data is suitably verified or amended each time an on-going audit is performed for the asset in question.
- the capture of a recorded image of the asset itself enables visual inspection to confirm that the asset still exists, is in serviceable condition, and has not been altered in unauthorised fashion.
- Digital images should be date-stamped on capture confirming that the image was captured at the time of the audit.
- Printed RFID labels are readily available commercially. While the geometry of individual labels will differ, a RFID label 23 will comprise a label substrate 24 bearing both a data chip 25 input with a unique code and an antenna 26 coupled to the chip in an electronic circuit and, where the label is active as opposed to passive, also a battery to increase read range. Preferred RFID labels for our purpose also incorporate anti-tamper features whereby the label is made inoperable if removed from an asset. This can be achieved, for example, by using adhesive compounds of different strengths in the label between the substrate and the antenna and chip, so that the antenna is destroyed if an attempt is made to remove the label from the asset. In some anti-tamper labels, the effect of removing an affixed label may also remove the chip from a circuit including the antenna.
- a RFID label may be printed with a QR code 1, so that one and the same label serves both as a QR label and as a RFID label, and, by virtue of the anti-tamper features discussed above, can readily indicate whether the label has been removed from the asset to which it was affixed.
- Some RFID labels operate over a short range, in which case a portable RFID reader will need to used in proximity to the smartphone. Connection between the reader and the smartphone may be by cable, as for example via a USB cable, but we prefer the use of a mobile, battery operated, RFID reader 27 with BluetoothTM connectivity to the smartphone. Suitable such readers are readily available from various sources.
- the advantage of employing additional RFID technology, especially with the tamper-proof label technology is that the RFID label must be present in the immediate proximity of the reader to be read, confirming that the specific asset to which the label is affixed is at the GPS location of the smartphone at the time the reading is taken, whereas someone intent upon a fraudulent audit might seek to use the smartphone to read a photocopied version of the QR code and use the camera to take an image of a different, but closely similar asset present at the GPS location when the real asset is elsewhere.
- the audit additionally to require a RFID label to be read.
- the data record (Fig. 3) for a particular asset may be viewed (if not also amended) by any authorised User having need to check the asset database.
- Reports 28 (Fig. 4) and alerts can also be generated.
- assets may be leased by Lessor 29 to a Lessee 30 for a specific geographical area. Since the geographical location of any particular asset is recorded each time an audit is conducted, any unexpected location 31 may be recorded in Report 28.
- the system can provide both improved data integrity and a richness in available data not previously available for lessors, dealers, manufacturers and end users who may employ the system.
- the system will deter lessee fraud, as the lessee will be aware of the lessor's greater interest and control over the asset.
- the location of an asset or stock item and its visible appearance can be determined whenever desired by requiring an audit to be conducted.
- Asset owners are able to access the available data as desired for the benefit of their business, including enhancement of their asset management processes by greater control and visibility over their asset portfolios.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Strategic Management (AREA)
- Human Resources & Organizations (AREA)
- Quality & Reliability (AREA)
- Theoretical Computer Science (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Development Economics (AREA)
- General Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Educational Administration (AREA)
- Game Theory and Decision Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Telephonic Communication Services (AREA)
Abstract
Dans le système selon la présente invention, un lecteur de code situé dans une station d'entrée de données est utilisé pour lire une identification codée lisible par machine et portée par un bien situé dans la station d'entrée de données. Une image de l'identification codée lisible par machine et/ou du bien proprement dit est enregistrée à l'aide d'un appareil photo situé dans la station d'entrée de données. L'identification codée lisible par machine ou les données obtenues à partir de celle-ci par le lecteur de code, ainsi que la ou les images de l'identification codée lisible par machine et/ou du bien proprement dit sont transmises en tant que données relatives au bien via un réseau de télécommunications à un serveur distant.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GBGB1113687.6A GB201113687D0 (en) | 2011-08-09 | 2011-08-09 | Auditing assets |
| GB1113687.6 | 2011-08-09 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2013021158A2 true WO2013021158A2 (fr) | 2013-02-14 |
| WO2013021158A3 WO2013021158A3 (fr) | 2013-11-07 |
Family
ID=44735635
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/GB2012/000649 Ceased WO2013021158A2 (fr) | 2011-08-09 | 2012-08-09 | Vérification de biens |
Country Status (2)
| Country | Link |
|---|---|
| GB (2) | GB201113687D0 (fr) |
| WO (1) | WO2013021158A2 (fr) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114829227A (zh) * | 2019-10-16 | 2022-07-29 | 北伯林顿铁路公司 | 资产审计系统及方法 |
| US11610183B2 (en) | 2017-06-29 | 2023-03-21 | Walmart Apollo, Llc | Systems and methods for performing and tracking asset inspections |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| IT201900012333A1 (it) * | 2019-07-19 | 2021-01-19 | Logibiotech Srl | Procedimento di archiviazione e tracciabilità di vetrini cito-istologici e biocassette istologiche |
Family Cites Families (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6794000B2 (en) * | 2001-07-17 | 2004-09-21 | Intermec Ip Corp. | Tamper evident label with transponder employing multiple propagation points |
| AU2003279994A1 (en) * | 2002-10-21 | 2004-05-13 | John P. Sinisi | System and method for mobile data collection |
| US7774268B2 (en) * | 2003-03-03 | 2010-08-10 | The Tb Group, Inc. | System, method, and apparatus for identifying and authenticating the presence of high value assets at remote locations |
| US7957990B2 (en) * | 2005-12-30 | 2011-06-07 | Reflexis Systems, Inc. | System and method for managing asset installation and evaluation |
| EE05523B1 (et) * | 2005-12-30 | 2012-02-15 | Priit@Vimberg | Meetod ja süsteem ühtseks ressursside haldamiseksning juhtimiseks |
| MX2008014302A (es) * | 2006-05-09 | 2008-12-09 | Ticketmaster | Aparato para el control y procesamiento de accesos??. |
| WO2008047386A2 (fr) * | 2006-10-17 | 2008-04-24 | Speck System Limited | Système de gestion de réseau d'électricité |
| AT10520U3 (de) * | 2008-09-05 | 2013-10-15 | Knapp Systemintegration Gmbh | Vorrichtung und verfahren zur visuellen unterstützung von kommissioniervorgängen |
| EP2209301A1 (fr) * | 2008-12-04 | 2010-07-21 | Alcatel, Lucent | Procédé de commande de caméra pour la télécommande d'une caméra et serveur de commande de caméra correspondant |
| US20110173127A1 (en) * | 2010-01-08 | 2011-07-14 | Albert Ho | System and method used for configuration of an inspection compliance tool with machine readable tags and their associations to inspected components |
| US8220711B2 (en) * | 2009-07-17 | 2012-07-17 | Primary Marking Systems, Inc. | Systems and methods for the tracking of evidence |
-
2011
- 2011-08-09 GB GBGB1113687.6A patent/GB201113687D0/en not_active Ceased
-
2012
- 2012-08-09 GB GB1214275.8A patent/GB2493629A/en not_active Withdrawn
- 2012-08-09 WO PCT/GB2012/000649 patent/WO2013021158A2/fr not_active Ceased
Non-Patent Citations (1)
| Title |
|---|
| None |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11610183B2 (en) | 2017-06-29 | 2023-03-21 | Walmart Apollo, Llc | Systems and methods for performing and tracking asset inspections |
| US12430620B2 (en) | 2017-06-29 | 2025-09-30 | Walmart Apollo, Llc | Systems and methods for performing and tracking asset inspections |
| CN114829227A (zh) * | 2019-10-16 | 2022-07-29 | 北伯林顿铁路公司 | 资产审计系统及方法 |
| CN114829227B (zh) * | 2019-10-16 | 2024-04-12 | 北伯林顿铁路公司 | 资产审计系统及方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| GB2493629A (en) | 2013-02-13 |
| WO2013021158A3 (fr) | 2013-11-07 |
| GB201113687D0 (en) | 2011-09-21 |
| GB201214275D0 (en) | 2012-09-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10152720B2 (en) | Authentication tags and systems for golf clubs | |
| US9256881B2 (en) | Authenticating and managing item ownership and authenticity | |
| US8650097B2 (en) | System and method for streamlined registration of products over a communication network and for verification and management of information related thereto | |
| CN112470441B (zh) | 利用分布式计算对物品进行安全跟踪的方法 | |
| US8712873B2 (en) | System for and method of remotely auditing inventoried assets | |
| US20160210547A1 (en) | Identification Tag with Magnet Attachment and System for Supply Chain Management | |
| US9449325B2 (en) | System and method for authenticity verification | |
| US9373015B2 (en) | Asset verification and tagging | |
| US20130227653A1 (en) | System and method for streamlined registration of products over a communication network and for verification and management of information related thereto | |
| US20180107914A1 (en) | System for tracking inventory (used or new) using one or more of a multiplicity of identification methods optionally including but not limited to rfids and a database management system | |
| US20150035650A1 (en) | System and Method Employing Near Field Communication and QR Code Technology to Access and Manage Server-Side Personal and Business Property Security Status Accounts | |
| US20110231316A1 (en) | Method, system and computer readable media containing a program for identifying whether a product is genuine | |
| US20120173411A1 (en) | Management method of article | |
| CN105378774A (zh) | 安全交易系统和方法 | |
| US20090193501A1 (en) | Document evidence and article retrieval and identification system | |
| CN111539677B (zh) | 一种基于区块链的rfid固定资产管理系统及方法 | |
| CN101599129A (zh) | 基于标记信息提供服务的方法、对应标记和标记阅读设备 | |
| US20010053949A1 (en) | Secure tracking of articles | |
| WO2013021158A2 (fr) | Vérification de biens | |
| WO2017195084A2 (fr) | Procédé et utilitaire basé sur un réseau pour l'identification unique virtuelle, la surveillance et la gestion du cycle de vie d'un actif | |
| US20190295153A1 (en) | Method and system for managing an asset | |
| KR100718799B1 (ko) | Rfid를 이용한 요금청구 서비스 시스템 및 그 방법 | |
| Malik et al. | RFID Based Door Lock Security System | |
| CN120543275A (zh) | 车商拜访核验方法、装置、计算机设备和可读存储介质 | |
| JP2006018704A (ja) | 遺失物管理システム |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12756228 Country of ref document: EP Kind code of ref document: A2 |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 12756228 Country of ref document: EP Kind code of ref document: A2 |