System for the assets identification and protection

An asset and protected technology, applied in the system field for asset identification and protection, can solve long-term, unsuccessful and other problems, and achieve high reliability results

Inactive Publication Date: 2007-04-11
CEMA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Likewise, where stolen assets are intercepted or found, re-identifying or tracing their provenance can be a non-negligible problem, i.e. where vehicles or items have been disassembled into individual components is a problem that in many cases is nearly insoluble and the forensic process regarding the identification of the authorized owners of these stolen assets has often been protracted and unsuccessful in many cases

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System for the assets identification and protection

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0026] Example 1: Spraying and sticking protective elements (microphotographs and microchips) to numerous concealed and visible locations on protected items (vehicles, motorcycles, construction machinery, trailers, boats, etc.). Data on protected objects and their owners are recorded in the registry. In case these items are stolen and when they are found, the code can be read from the protection unit by a reader and checked in the registration center via the Internet. It is possible that found items can be clearly identified and returned to the owner.

example 2

[0027] Example 2: Brushing and pasting protective elements (microphotographs and microchips) at numerous hidden and visible locations on protected items (electronics, PCs, printers, curios, art, tools, spare parts, etc.). Data on protected objects and their owners are recorded in the registry. The data stored in the registry are used for further use in case of theft.

example 3

[0028] Example 3: Spray or brush and stick protection elements (microphotographs and microchips) at numerous concealed and visible locations on the protected item. Data on protected objects and their owners are recorded in the registry. In the case where these items are rented or sold, these items can be easily identified when the code is read by the reader. This is why it is possible to check whether the same item that was rented is returned or to check whether a complaint is justified when a sold item exhibits certain defects.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

System of the assets identification 0nd protection which is bound to marking 0nd reverse identification of stolen things or lost transport means, things and animals by the means of electronic records, in order to determinate correctly the origin and the owner. It consists of protection elements (microdots and microchips bearing unique codes), registered in the database of protected property of the central register, which is connected to the terminals of authorized persons (clients with the access to the central register via Internet) and of the protection elements database of the central register, which is connected to the set of registered terminals places. Each terminal, in the set of terminals of authorized persons, is equipped by the readers of protection elements. Each terminal in the set of registration places is equipped by applicators of the protection elements. All protection elements, used in the identification sets and placed on registered protected property, are registered in the central register of the system for the assets identification and protection.

Description

technical field [0001] This technology is designed for use in systems for asset identification and protection, that is, systems designed to identify and re-identify stolen or lost vehicles, objects and animals by means of electronic records in order to precisely trace their origin and their authorized everyone. Background technique [0002] Currently, there are many security systems and devices available for buildings, vehicles and / or items. Their purpose is to search for or protect these items from theft if they are stolen. Although such devices already exist, we cannot expect complete protection against theft of vehicles or objects by means of such devices. Despite the continuous development of these devices, the fact is that the utility of these devices has been overcome time and time again. The frequency of cases of stolen assets remains high. Likewise, where stolen assets are intercepted or found, re-identifying or tracing their provenance can be a non-negligible pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/00G06F19/00G08B13/00G08B29/02G08G1/017
CPCG06Q30/00
Inventor 雅罗斯拉夫·里普塔
Owner CEMA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products