(19)
(11)EP 2 875 629 B1

(12)EUROPEAN PATENT SPECIFICATION

(45)Mention of the grant of the patent:
09.10.2019 Bulletin 2019/41

(21)Application number: 13820502.6

(22)Date of filing:  18.07.2013
(51)International Patent Classification (IPC): 
G08B 21/02(2006.01)
H04W 4/021(2018.01)
H04M 1/725(2006.01)
H04W 4/029(2018.01)
(86)International application number:
PCT/US2013/051082
(87)International publication number:
WO 2014/015141 (23.01.2014 Gazette  2014/04)

(54)

ASSET SAFETY MOBILE NOTIFICATION SYSTEM

MOBILES BENACHRICHTIGUNGSSYSTEM ÜBER DIE SICHERHEIT VON VERMÖGENSWERTEN

SYSTÈME DE NOTIFICATION MOBILE DE SÉCURITÉ D'ACTIFS


(84)Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

(30)Priority: 20.07.2012 US 201213554962

(43)Date of publication of application:
27.05.2015 Bulletin 2015/22

(73)Proprietors:
  • Saigh, Michael M.
    Clayton, MO 63105-1604 (US)
  • Saigh, Andrew V.
    Clayton, MO 63105-1604 (US)

(72)Inventors:
  • Saigh, Michael M.
    Clayton, MO 63105-1604 (US)
  • Saigh, Andrew V.
    Clayton, MO 63105-1604 (US)

(74)Representative: Williams, David John 
Page White & Farrer Bedford House John Street
London WC1N 2BF
London WC1N 2BF (GB)


(56)References cited: : 
US-A1- 2006 104 249
US-A1- 2009 247 146
US-A1- 2011 137 775
US-A1- 2011 309 931
US-A1- 2009 150 236
US-A1- 2010 176 936
US-A1- 2011 285 535
US-A1- 2012 028 600
  
      
    Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


    Description

    [Technical Field]



    [0001] The disclosure relates to an emergency notification system and, specifically, a personal safety mobile notification system with geographic tracking and emergency sensing capabilities for assets.

    [Background Art]



    [0002] Current mobile technology schemes exist for warning the general public of an emergency situation, for example a terrorist act, crime, fire, natural disaster, or any other category of potentially or actually harmful event have numerous inherent disadvantages. For example, broadcast messaging (like Short Message Service (SMS) messaging), are a passive technology that do not allow subscribers to actively interact, interface, trigger or activate a location's alarm or siren network within a proximity of the emergency. Current mobile technology schemes generally do not allow for "real time" forensic information to be electronically collected, stored or transferred to emergency personnel and/or other organizations in order to help prevent further injury or to gather information about the emergency. Additionally, "emergency situation" can also affect tangible and intangible assets, but emergency warning systems employing mobile technology do not integrate monitoring and warning of emergency situations that might be associated with these assets.

    [Disclosure]


    [Technical Problem]



    [0003] Existing mobile technology schemes for warning of an emergency situation related to various types of assets do not allow subscribers to actively interact, interface, trigger or activate a location's alarm or siren network within a proximity of the emergency, and do not allow for "real time" forensic information to be electronically collected, stored or transferred to emergency personnel and/or other organizations in order to help prevent further injury or to gather information about the emergency.

    [0004] US 2011/0309931 discloses a wirelessly-linked RFID tracking system. US 2011/0285535 discloses a mobile asset security, tracking and recovery system. US 2009/0150236 discloses an asset management system.

    [Technical. Solution to Problem]



    [0005] Monitoring and tracking of assets might be achieved through radio frequency identification (RFID) technology, radio tags, optical emitters and the like. RFID technology might be integrated with a wireless smartphone or other mobile device enabling reading of, and interaction with, active and/or passive RFID tags as well as with databases containing information related to the assets. The wireless smartphone might interface one or more other mobile devices within a system comprising RFID readers, RF tags, and environmental sensors.

    [0006] In accordance with the invention there is provided a system for safety and protection of assets according to claim 1.

    [Advantageous Effects of Invention]



    [0007] Embodiments of the present invention might be employed to aid in safety and protection of property including tangible objects or intangible objects of any value, importance, or personal interest. Intangible or tangible property or asset might be monitored and tracked both when stationary or in motion. Monitoring of assets might be conducted through a constant or periodic evaluation of various environmental occurrences or other events that occur outside of a predetermined acceptable range. Occurrences or events that occur outside of this range or are otherwise deemed to be unacceptable might trigger sending of an alert.

    [Description of Drawings]



    [0008] Other aspects, features, and advantages of the present invention wilt become more fully apparent from the following detailed description, the appended claims, and the accompanying drawings in which like reference numerals identify similar or identical elements.

    FIG. 1 shows a block diagram of a mobile device having a radio frequency identification (RFID) reader integrated circuit (IC) in accordance with exemplary embodiments;

    FIG. 2A shows a diagram of an exemplary network database and system that may be used with RFID asset monitoring sensors and smartphone equipped readers in accordance with exemplary embodiments;

    FIG. 2B show a block diagram of an exemplary network database and system that may be used with RFID asset monitoring sensors and smartphone equipped readers in accordance with exemplary embodiments;

    FIG. 3 shows an exemplary smartphone equipped with a reader screen display exemplifying various real-time and archival sensor data from one or more RFID sensor devices;

    FIG. 4A shows an exemplary smartphone equipped with a reader screen display exemplifying an alert based on temperature monitoring;

    FIG. 4B shows an exemplary smartphone equipped with a reader screen display exemplifying an alert based on asset tracking;

    FIG. 5A shows an exemplary smartphone equipped with a reader screen display with intraoperative global information systems tracking global assets and global temperature alerts;

    FIG. 5B shows an exemplary smartphone equipped with a reader screen display with intraoperative global information systems tracking global assets and global InTransit tracking alerts;

    FIG. 6 shows an exemplary tracking system of assets when being transported from pickup through delivery;

    FIG. 7 shows an exemplary tracking system of assets in which guest-smartphones are moving toward a site established by a host-smartphone;

    FIG. 8 shows an example of a host-locator campus meeting place and time with two tracked independent guest-smartphone devices in accordance with exemplary embodiments;

    FIG. 9 shows an exemplary host-smartphone alert based on failure of a guest-smartphone arrival to a designated site in accordance with exemplary embodiments; and

    FIG. 10 shows an asset at a location, equipped with a RFID sensor/tag and in communication with a smartphone operating in accordance with exemplary embodiments.


    [Best Mode]



    [0009] Described embodiments relate to various aspects of devices, systems and methods for safety and protection of tangible and intangible assets that might be integrated within a mobile technology-based safety and warning system.

    [0010] Hereinafter, exemplary embodiments are described with reference to the drawings.

    [0011] The following detailed description utilizes a number of acronyms, which are generally well known in the art. While definitions are typically provided with the first instance of each acronym, for convenience, TABLE 1 provides a list of the acronyms and abbreviations used along with their respective definitions.
    TABLE 1
    MSM Mobile Safety Management Software Program   UMTS Universal Mobile Telecommunications System
    GSM Global System for Mobile Communications   PCS Personal Communications Service
    PLMN Public Land Mobile Network   GPS Global Positioning System
    SMS Short Message Service   IC Integrated Circuit
    USB Universal Serial Bus   SD Secure Digital
    PDA Personal Digital Assistant   DSP Digital Signal Processor
    RFID Radio Frequency Identification Device   NFC Near Field Communication
    UID Unique Identifying Number   GPRS General Packet Radio Service
    API Application Program Interface   CCM Central Control Manager software
    EPC Electronic Product Code   ISO International Organization for Standards
    GIS Geographical Information System   AO/M Asset Owners and Manager
    PID Personal Identification Data   GPX GPS eXchange Format
    KML Keyhole Markup Language   NMEA National Marine Electronics Association
    CAN Controller Area Network   CST Central Standard Time
    UDP User Datagram protocol   CDMA Code Division Multiple Access
    IDENT Identification Protocol   IP Internet Protocol
    CGI Cell Global Identity   LAI Location Area Identity
    IDE Integrated Development Environment   GUI Graphical User Interface
    IVR Interactive Voice Response      


    [0012] FIG. 1 shows a block diagram of a mobile device having a RFID reader IC, in accordance with embodiments of the present invention. In one embodiment, mobile device 100 might be a cellular telephone, Personal Digital Assistant (PDA), or other mobile communications device. As shown, mobile device 100 includes RFID reader IC 132 and RF antenna 134 for reading data from RFID tags associated with sensors and writing data to the RFID tags. While the present embodiments are described with respect to RFID tags and RFID technology, one skilled in the art will realize that the techniques might be extended to near-field communication devices and technologies. Mobile device 100 includes GPS transceiver 104 for communication with the satellite-based global positioning system, and Wi-Fi transceiver 106 for communication with a wireless network, for example, a wireless network operating in accordance with one or more of the 802.11 communication standards. Mobile device 100 includes Bluetooth® transceiver 108 for communication with wireless peripheral devices, for example, devices operating in accordance with the 802.15 communication standard.

    [0013] Cellular transceiver 110 is in communication with Public Land Mobile Network (PLMN), for example, in accordance with one or more mobile communications standards such as Universal Mobile Telecommunications System (UMTS), Personal Communications Service (PCS), global system for mobile communications (GSM), 3G, 4G, or others. As indicated by the dashed line, one or more of transceivers 104, 106, 108 and 110 might share one or more common antennas 102.

    [0014] Mobile device 100 includes one or more microcontrollers or digital signal processors (DSPs), shown collectively in FIG. 1 as processor 114. Processor 114 includes at least a portion of an operating system of mobile device 100, perform signal processing for signals received from or transmitted to transceivers 104, 106, 108 and 110, and generally control operation of other modules of mobile device 100. Processor 114 interfaces with memory 112, which includes one or more memories for storage of, for example, the operating system of mobile device 100, software applications installed on mobile device 100, various user data such as contact information, calendar information, text messages, email messages, photographs, videos, or other electronic files. Memory 112 might be internal to the hardware of mobile device 100, might be on a memory card, such as a micro Secure Digital (SD) card, inserted into mobile device 100, or some combination thereof

    [0015] Mobile device 100 is powered by battery 118 via power supply and power manager 116, which might typically provide required operating voltages of mobile device 100 and manage recharging of battery 118. User entry 120, which might include a touch screen input, keypad, buttons, scroll wheel, touch pad, voice commands, or other input device, allows a user to interface, make selections, and input data to mobile device 100. Mobile device 100 displays output data on video screen 122, and provides output audio data to and receives audio input data from audio input and output 126. Mobile device 100 might typically include camera 124 for taking photos and/or videos. Universal Serial Bus (USB) interface 128 might allow mobile device 100 to be plugged in to various USB devices, such as a computer. In accordance with embodiments of the present invention, mobile device 100 also includes secure encapsulator 130.

    [0016] Secure encapsulator 130 might, when activated, record at least some portion or all of sensor based data received from mobile device 100. The sensor data might be sourced in a given format, protocol and technology including, but not limited to, audio, video, thermal imaging, still images, biological data, GPS location data, cellular tower data, and the like. Secure encapsulator 130, when activated, might store such data leading up to, and during, the activation of an emergency alert mode of mobile device 100. Alternatively, secure encapsulator 130 might collect sensor data over a predefined period, where when the period is reached newer data overwrites older data. In addition, secure encapsulator 130 might activate additional sensors, either local to mobile device 100, or remote to mobile device 100 through one or more of transceivers 104,106, 108 and 110, to help record data pertaining to the emergency alert and enhance any sensors available on mobile device 100. Secure encapsulator 130 might typically, in order to save memory space, store data for a determined period of time, before erasing or overwriting the stored data. Thus, secure encapsulator 130 might be configured with programmed time duration to track, or a programmed time duration to maintain, the tracked data.

    [0017] FIG. 1 shows exemplary GPS receiver, Wi-Fi transceiver, Bluetooth® transceiver, memory, processor, power supply and power management, battery, user entry touchscreen, video screen, camera, audio (speaker, headset, earpiece, microphone), USB interface and secure encapsulator) as might be incorporated in a smartphone. As described above, processor 114 includes at least a portion of an operating system of mobile device 100, to perform signal processing for signals received from or transmitted to transceivers 104, 106, 108 and 110, and generally control operation of other modules of mobile device 100. Processor 114 interfaces with memory 112, which might include one or more memories for storage of, for example, the operating system of mobile device 100, software applications installed on mobile device 100, various user data such as contact information, calendar information, text messages, email messages, photographs, videos, or other electronic files, messages, or transmissions.

    [0018] In addition, a smartphone operating in accordance with described exemplary embodiments might interface to one or more other mobile devices within a system comprising RFID readers, RFID tags, and environmental sensors. Although RFID technology is specifically referred to herein, one skilled in the art might employ other systems or technologies capable of achieving the same functionality. In this particular example, RFID tag and/or sensor information is sent to a reader and the reader might write information back to the RFID tag and/or report the information to the PLMN and/or Mobile Safety Management Software Program (MSM) system and/or mobile devices, peripheral devices, or other devices capable of accepting and/or transmitting data. A mobile device antenna or other transceiver might be employed to connect to a wireless network. The device might also possess the ability to directly or indirectly communicate with an RFID reader or device controlling the RFID reader. A smartphone or other mobile device when interfaced, equipped or otherwise integrated with an RFID reader might collects data from various devices, connect to wireless networks and send and receive information across those networks related to the RFID tags, environmental sensors, encapsulators, security systems, and any other information derived from those devices. For example, smartphone technology might be integrated with RFID tags, tag readers, and sensors which might monitor changes in the environment such as climate, motion, and vibration. Mobile devices and smart phones might read and interact with RFID tags at any distance, however several mobile devices might also be integrated or networked together in communication and in some cases a mobile device within said network might remain within a designated proximity of the RFID tags to eliminate the need for mobile devices to remotely interact constantly thus saving battery power, network bandwidth, and other resources.

    [0019] In another embodiment of the present invention, intangible assets such as digital intellectual property might be monitored and tracked virtually either on the internet, a private network, or a public network to ensure against corruption of data, unauthorized use, unauthorized access, and unauthorized distribution. As shown in FIG. 1, mobile device 100 also includes secure encapsulator 130. Encapsulator 130 might transmit real-time information regarding aspects of the asset, such as video, pictures, text and other information regarding the asset. The asset might be monitored and tracked to ensure against the escalation of any undesirable event, status, or state of being (e.g., theft, damage by fire or environmental conditions, and unauthorized movement). Secure cloud networks might be employed to disseminate environmental alerts endangering a tangible or intangible asset or person when an emergency situation occurs.

    [0020] Any tangible or intangible item of any value might be monitored, tracked, and thereby protected. Monitoring, tracking, and reporting on the safety of the assets might be achieved in a number of ways including but not limited to: inventory/asset management software, active and passive RFID technology, RFID readers, Near Field Communication (NFC) enabled devices, distributable nodes, environmental condition sensors, forensic data, global positioning technology, wireless transceivers, cellular transceivers, mobile devices, peripheral devices operating in accordance with the 802.15 communication standard or other wireless standards.

    [0021] RFID is an auto identification technology where a physical object is associated with a unique identifying number (UID) that incorporated in an RFID transponder, or tag. The RFID system has three primary components: a transceiver with a RFID decoder, an antenna or coil and a RFID tag programmed with the UID. In another example of the disclosure, asset protection might integrate any form of Application Program Interface (API), web-based or otherwise, with the asset. Smartphones or other mobile devices as described herein and equipped with RFID readers might be defined as a gateway between a tag and an intelligent distributed database system connected to enterprise and commercial software applications and other mobile devices.

    [0022] Identification data might be transmitted using RF frequencies to the RFID enabled smartphone or mobile device which might then transmit said data over a General Packet Radio Service (GPRS), GSM, or other phone network and on to a networked centralized management system. The data might be gathered within open or closed loop systems, transferred to public or private networks, stored by one or more centralized databases, or any combination of the above.

    [0023] Received RFID tag data might be transmitted either over a serial port or a network interface to a corporate enterprise system server or other servers. In addition, the current invention might include various safeguards allowing individuals or organizations secure access to current or past data, reporting, and other valuable information regarding the asset(s) such as history, ownership, title, financial, insurance, location, alert history, current alerts and the status of the resolution of a pending undesirable situation. Note that a redundant system might also be implemented to increase the efficiency of the network of devices involved in the current invention. A user might also access information regarding their own assets or regarding information concerning the assets. The alerts might in some embodiments transfer text, audio, video and or multimedia information related to the asset, the environment, or the status and resolution process of a pending undesirable situation.

    [0024] Assets protected, monitored, and tracked might include any tangible or intangible material item such as, but not limited to paintings, classic cars, coins, stamps, autographs, books, manuscripts, fine art and photographs, films, recordings, compositions, musical instruments, electronics, museum pieces, antiques, memorabilia, patents and intellectual property (IP), music distribution rights, film distribution rights, web content, digital information or artwork, copyright protected IP, confidential documents, or any other privately and/or publically held asset and/or government owned asset. Tangible or intangible assets might be located, stored and/or displayed in one or more countries, and one or more locations such as homes, museums, office buildings, banks, bank vaults, safe deposit boxes, commercial centers, galleries, industrial centers, park and recreation geographies or any other location. In addition, the asset might be tracked when in transit between one or more locations.

    [0025] The RFID reader might be integrated with the smartphone components such as those described above with respect to FIG. 1. In terms of hardware, the RFID reader IC 132 and the RF antenna 134 desirably fits within a standard handheld mobile device or smartphone. The RFID enabled mobile device or smartphone might include software (e.g., an application or "APP") that programs and/or reprograms RFID tags. In addition, the software might be enabled to both reading from the RFID tags and writing to the RFID tags as shown in FIG. 2A.

    [0026] There are four frequency bands for RFID communication varying from low frequency, high-frequency, ultra-high frequency and microwave. The appropriate frequency for the RFID-enabled smartphone depends on the range required by the application for which it is going to be used. High-frequency bands that allow communication in a few meters are expected to be appropriate for the RFID enabled smartphone. More specify the appropriate frequency ranges in different parts of the globe causing incompatibility issues between tags and RFID readers. The current invention enables RFID equipped smartphones to interface multiple standards, protocols and platforms.

    [0027] For example, one application might allow a museum patron of the arts to interface in a museum guide of assets through the smartphone device. The smartphone device might provide an interactive asset map of all exhibits within the complex. A virtual tour or exhibit might be customized in accordance to the patron's interest and accessed through their mobile device.

    [0028] FIG. 2A and FIG. 2B show aspects of an exemplary network database and system that may be used with RFID asset monitoring sensors and smartphone equipped readers. FIG. 2A shows a RFID network 1406 (a.) including a smartphone RFID equipped reader 1401 (a.) which reads one or more RFID sensor tags 1403 (a.) in one or more environmental sensors. The sensor tag might enable various asset environmental monitoring as described subsequently with respect to FIG. 3.

    [0029] A mobile device or smartphone is a device connecting to GPRS, GSM or other wireless networks and is able to run on its operating system an application/software and Graphical User Interface (GUI) for the purposes of RFID reading, tracking, and monitoring. In addition, FIG. 2A and FIG. 2B show an exemplary network database and system transferring RFID information to one or more external databases that enable one or more value-added services. The mobile device communicates with a centralized asset management and control system via any of the various communication protocol, platform, format, frequency, database network or system. In addition, it should be easily integrated with call initiation or wireless data transmission so that data collected via the RFID reader can be transmitted over the wireless phone network to a centralized database. It may also require special provisions from the smartphone operating system, to generate alerts related to the sensor RFID tag. The communication between the RFID tags and the RFID enabled smartphone might be encrypted using cryptographic algorithms and authentication. The RFID tag sends identification data using RF frequencies and the RFID enabled cell phone transmits it over the GPRS or GSM and phone network to the central ized asset management and control system.

    [0030] Referring to FIG. 2A, smartphone device 1401 (a.) is equipped with one or more RF applications (e.g., RFID reader 132 shown in Fig. 1) and is RFID-enabled. The equipped smartphone reader is embedded with at least one RF transceiver (e.g., Wi-Fi or Bluetooth®), an RFID-reader, and environmental sensor readers). RFID-tagged tangible asset 1404 (a.), is integrated with the asset management and control system, central database and server and network architecture, as well as a graphical user interface that might be in the form of a software application or hosted on a web server and accessed by way of the internet. Smartphone device 1401 (a.) includes a graphical user interface that might be used by a user to access the features as outlined in FIG. 2A and FIG. 2B. Information associated with any given asset might be accessed by the general public or in cases in which information regarding some assets is proprietary and thus access would be restricted and/or limited. Information for assets might be organized and referenced in the database by their unique RFID number and other identifying information that might also be associated directly with the RFID tag itself.

    [0031] Environmental occurrences include, but are not limited to, temperature, humidity, gaseous content, chemicals, air quality, air pressure, radiation, vibration, exposure to light and other factors which will trigger an alert if the optimum range is exceeded or falls below the thresholds of what is determined or generally considered by experts to be optimal conditions. For example, if the active RFID Sensor monitoring of the asset exceeds 23.89°C (75°F) the sensor would trigger an alert.

    [0032] In FIG. 2B, three logical processing sections are shown for the system illustrated in FIG. 2A: the Sensor RFID processing, the mobile reader protocol processing, and the central database/server processing (shown as ProActive Alert API). The smartphone equipped with an RFID reader 1401 (a.) collects information from active and/or passive RFID tags during Sensor RFID processing and transfers the information to the mobile reader protocol processing. The exemplary communication network as shown in FIG. 2A and 2B might interface any platform and architectures as well as a multitude of devices through location Base Network 1402(a.) or a wireless network (e.g., GSM or Wi-Fi). Referring to FIG. 14B, an RFID reader (interrogator) extracts the UID from the tag as referenced by the UID architecture at Sensor RFID processing 1407 (b.).

    [0033] In some embodiments, the smartphone includes an RFID tag (hereinafter, a "smartphone/RFID tag"). In other words, the smartphone has an embedded or attached RFID chip with identification information programmed on it. When the smartphone/RFID tag including the RFID reader (e.g., 1401 (a.) and 1406 (b.)) is within range they can communicate: the RFID tag information is sent to the reader and the reader might write some information back to the smartphone's RFID tag. Cloud storage 1410 (a.) through 1413 (a.) represent at least four distinct organizations which might securely access asset information including, but not limited to, alert notifications of information corresponding to actions based on their ownership and service. Cloud storage 1410 (a.) might represent the individual asset owners, financial companies or investment banks' managed investment vehicles that include the assets, private placement investment vehicles including the assets, all of which might access asset information regarding their property, cloud storage 1411 (a.) might represent a manner for insurance companies to manage, track, and monitor assets they insure or are providing policy quotes for, cloud storage 1412 (a.) might represent emergency organizations and other related fields such as forensic laboratories which might be granted limited access based on the severity of a situation or the needs of any investigations they may conduct. Cloud storage 1413 (a.) might represent public access to information regarding their security if held by a public security vehicle such as a mutual fund for example. One skilled in the art will realize that various levels of security and access as well as scope of access might be restricted and controlled by an asset management and control system as described by the current invention. It is also understood that firewalls might be incorporated in order to help retain the integrity of the safety, security and privacy of each asset and or asset classification or fund.

    [0034] Cloud storage processing 1411 (b.) represents actions such as by insurance companies and other asset owners monitoring and tracking assets that they have insured, and this might be performed in real-time. Mobile sensor smartphone reader module 1404 (b.) and other LAN networks 1402 (a.) might detect alert warnings, environmental warnings and other information if warranted and authorized as represented by processes 1408 (b.) and 1409 (b.). For example, module 1404 (b.) shows a TRIGGER ACTIVATION (ON) switch which might be activated when and if various environmental thresholds are reached. Threshold set-points might be dynamically programmed through a central server 1410 (b.) local severer where the asset is held represented by location base network 1402 (a.) and/or by a smartphone reader equipped device (as shown by 1401 (a.) and 1404 (b.) and herein described).

    [0035] Non-wired RFID sensors generally rely on an independent battery power source. The current invention includes periodic and or constant monitoring of the asset. However, periodic monitoring and constant monitoring when not wired to a power source might exhaust battery power. One of the main benefits of the current embodiments is that threshold set-points and ALERT TRIGGERING extends the life of the RFID battery when armed to protect the asset. Alert threshold set-points 1403 (b.) are generally predetermined through industry practice or experiment. A Mobile Sensor Reader module 1404 (b.) defines TRIGGER ACTIVATION (ON) as harmful or otherwise unacceptable situation occurring (usually in real-time). This alert activated TRIGGER ACTIVATION (ON) thus minimizes battery consumption by activating full functionality only in the event that undesirable conditions occur outside of the predetermined acceptable optimal limits required to maintain and protect the asset. For example, instead of constant monitoring of temperature, the alert trigger(s) might be engaged if the thermometer crosses a programmed minimum or maximum temperature threshold and/or a humidity set-point, maximum light exposure, or unauthorized movement or proximity. When the set-point threshold is crossed the sensor will activate and signal an alert to an asset management and control system. For example, the RFID sensor threshold set-points 1403 (b.) might be programmed to monitor the air for smoke or other gases, chemicals, and airborne substances that might potentially damage the asset. If it were determined that the air quality around the asset had exceeded acceptable levels, this would automatically trigger and set in motion the alert process.

    [0036] The advantages of the automatic triggering of the alert system include maximizing battery life while minimizing monitoring requirements. In addition, solar powered RFID sensors and other similar green technologies might be used to power RFID and sensor units in order to extend battery life while in transit over long distances.

    [0037] Key environmental monitoring and tracking data module 1405(b.) receives and processes data that might be entered from one or more databases in order to provide various functional asset sensor control tools (e.g., management/managerial command control) 1402 (b.) and set-points (thresholds) 1403(b.). Optimal environmental conditions might vary greatly depending on the classification of an asset. For example, rare coins might not be as susceptible to exposure to sunlight, but rare painting are. One skilled in the art will realize that the alert threshold set-points as well as the types of environmental and other conditions being monitored might vary widely depending on the asset and the situation. In some cases, comprehensive monitoring and tracking measures might be required, while for other cases monitoring and tracking might be handled to a more limited degree. This level of monitoring and tracking might be determined, for example, by an asset owner, experts, managers, or by insurance companies.

    [0038] The host database and server represented by 1407(a.), 1408(a.), 1410(b.) might store information regarding the asset such as, but not limited to, history of the asset, location, environmental historical archive of alerts, financial information, title and ownership history, market price valuation data, quality evaluation data, forensic history and data, appraisal information and other qualitative and quantitative analysis.

    [0039] Access to asset information might be controlled by incorporating a user ID, biometric access and other means of secure login registration via module 1408(b.). In addition, management control system 1400(b.) and central database and server module 1408 (a.)/ 1409 (a.)/ 1410(b.) might generate, store, and present real-time and archival data on an individual asset or group of assets, location(s) of the asset(s), information regarding storage and the archival history of placement and other management tools including but limited to location tracking, environmental sensor alerts, theft alerts, alerts concerning important market information regarding the asset(s), and other information regarding the monitoring or history of the asset(s).

    [0040] In another embodiment of the current invention, alert threshold set-points 1403 (b.) based on the acceptable range of conditions might be dynamically adjustable when moving the asset from one approved location to another in order to adjust to altitude, humidity, temperature and other factors. FIG. 2A shows RFID sensor 1403 (a.) attached or in proximity of the asset. These sensors might detect any environmental threshold which might affect the tangible or intangible asset. Detector 1416 (a.) might be, for example, a motion detector attached to the RFID sensor which might monitor the movement or proximity of a person to the asset as well the proximity of a person getting too close to the asset as exemplified by a person crossing the line and moving too close when viewing a museum art asset. If a person goes over the designated line the motion detector might trigger the sending of an alert notification to museum security guard(s) mobile devices within the area (as represented by alert 1505, described subsequently for FIG. 3).

    [0041] The programming of set-points for each RFID sensor tag monitoring the asset might be programmed to trigger an alert based on exceeding various environmental set-points (e.g., programmed to trigger warning when environmental conditions warrant). For example, if a temperature set-point optimal storage temperature is 68°F and elevates to 70°F, given the danger threshold alert was set at 72°F the warning alert might be sent to the persons responsible for the asset. The programming of set-points for each RFID sensor tag monitoring the asset might also be programmed to dynamically adjust set-point thresholds to meet all unique conditions of place and environment. The programming of set-points for each RFID sensor tag monitoring the asset might further be programmed to trigger an alert based on periodic or constant monitoring of environmental conditions. Constant monitoring might be necessary in certain conditions when transporting the asset for example or after an alert has been activated. When an alen has been activated the environmental sensor might be reset and rearmed (as shown in FIG. 2B by processes 1412 (b.) and 1413 (b.)). The alert or alert information might be logged and archived in the central database for future reference.

    [0042] Table 2 shows an exemplary set of threshold set-points which might be programmed onto the RFID tags themselves via the wireless network or on site. As shown in Table 2, a temperature set-point, for example, for a Van Gough painting represented by the RFID tag serial number/ UID number (as referenced in FIG. 2B and FIG. 3 as 1407 (b.) and 1504) might, for example, refer to the specific asset 177408748124549018. Asset serial number177408748124549018 has, for example, an optimal temperature range of 68° F-72°F (20-22.22°C), if a temperature over 72°F (22.22°C) is reached an alert might be sent out to all parties associated with the asset. In addition, Table 2 exemplifies other environmental condition set-points such as humidity and lumens. One skilled in the art might extend the teachings herein to set other condition and environmental set-points, which are then programmed and monitored.
    TABLE 2. ENVIRONMENTAL RFID SENSOR THRESHOLDS SETPOINTS
    Form of Asset / MaterialRelative humidity in %Temperature in °C/FHIlluminance in Lux
    1. Optimum Painting Setpoint RFID No. 177408748124549018 Van Gough 45-50 +20-22.22/68-72 Varies, stability is best for all
    2. Oil and Acrylic Paintings on wood or canvas 50-65 +20-23.89/68-75 150-200 max. 500 short term


    [0043] FIG. 3 shows a smartphone equipped with a reader screen display (mobile device 1500) exemplifying various real-time and archival sensor data from one or more RFID sensor devices. Mobile device 1500 as described by FIG. 3 is equipped with a sensor reader reads tags and is alerted if the RFID Tag reader and/or sensor monitoring the asset detects an environmental condition that falls outside of an acceptable range of measurements or threshold set-points (thus triggering an alert). Optimal threshold set-points might be defined as a measure of temperature or a maximum relative humidity percentage, the detection a vibration which exceeds an acceptable m/s2, light exposure which exceeds an acceptable level of lumens, static electricity exceeding beyond an acceptable kv unit, and other environmental conditions which might affect the value and longevity of an asset. In addition, smoke detection, motion detection and a multitude of other environmental sensors set-points might be monitored by the current invention as represented by 1503.

    [0044] RFID Alert data 1504 as shown might include information of standards established by the Electronic Product Code (EPC) and international Organization for Standards (ISO), which define data structures within the tag and allowed/available frequencies. One skilled in the art will recognize that the current invention might utilize any frequency, standard or platform available for such purposes described herein. RFID numbers might include a comprehensive database of information pertaining to one asset or a group of assets.

    [0045] Smartphone equipped readers might access global sensor alerts resulting from environmental triggers, as referenced by various entries 1503. A central computer system might log, trace and monitor one or a multitude of various asset classifications, located in various geographies and stored under a wide variety of conditions and programmed setpoint thresholds. Each art asset and corresponding RFID tag might be globally monitored by authorized personnel order to protect the asset.

    [0046] The RFID tag might also contain information regarding history of the asset, ownership history, financial data, present location, past locations, location tracking, asset security, environmental climate security and other information regarding the asset. Sensor alerts 1503 reference various environmental sensor alerts from one or more location. Environmental sensors as exemplified by alerts 1503 represent buill-in sensors including but limited to temperature monitoring alerts, light exposure monitoring alerts, humidity alerts, air composition alerts, chemical alerts, vibration alerts, weather alerts and the like. A comprehensive Geographical Information System (GIS) 1506 might integrate with the asset management and control system, as well as other personal safety and/or security alert systems, to track and monitor assets as well as capture, store, manipulate, analyze, manage, and present all types of geographical data information as shown in the Mobile Asset Management Reader icon represented by FIG 3. The alert information might be accessed through one or more secure networks or central servers as previously described.

    [0047] In addition, the host computer as well as mobile devices equipped with readers might securely access and receive information and alerts from one or more locations. For example, temperature sensor alerts 1501 (and 1601 of FIG. 4A described subsequently) reference six alerts related to assets in different locations that exceed the optional range of 72°F. Intangible and tangible assets and property locations might be vaulted, in a home, commercial building, displayed in a museum or gallery or any other outdoor or indoor environment.

    [0048] If the RFID system detects a problem associated with the asset, an alert might be sent to various smartphones and closed end or opened ended databases or sub-databases. Information pertaining to a single RFID monitored asset might for example, provide text and or audio, and or visual and or multimedia commentary of the art asset through the smartphone or other device.

    [0049] The application might be capable of utilizing Wi-Fi or Wi-Max communication, or communication via other wireless frequencies, and access a wireless router in order to disseminate any and all information regarding one or more assets within a given geographic location or a multitude of locations. It must also be noted that the coordinates of an asset might be determined according to not only the "x" and "y" values but the "z" indicating altitude as well.

    [0050] Theft alerts as represented by alert 1507 are based on the theft of any asset of any value tangible or intangible. The alert process might include the addition of RFID sensors monitoring the theft of the asset as previous described in the context of the asset based sensor alert management system.

    [0051] Alerts 1502(a.) represent various GPS asset tracking alerts, which in the example shows 8 assets in different locations that are accessed through the Mobile Asset Management System through one or more servers and subservers. In addition, Locator 1502(b.) refers to a locator GPS Beacon for each transit alert which logs and stores the position and trail of the asset within the transporting vehicle at regular intervals.

    [0052] FIG. 4A and FIG. 4B show two views of an exemplary smartphone equipped with a reader screen display exemplifying an alert based on temperature monitoring and asset tracking, respectively. Alerts triggered by an unacceptable change in temperature are a component of the environmental threshold set-point as shown by alert 1601. Alert 1601 shows six global alerts that were sent to the owner(s) of the assets or organizations involved with the assets. Address data 1602 shows the location address of one of the exemplified alerts. RFID number: 177408748124549018, in this example, is located at 150 Price Rd. St. Louis MO, 63124, USA. Also, detailed current and historical information regarding the asset(s) and related or unrelated to alerts might be accessed. RFID serial number 1604 might be cross referenced to the specification of the temperature alert 1605 which posts a current temperature of 87.1°F, and which might be updated regularly in real-time. Maximum allowable temperature 1606 exemplifies the maximum allowable temperature programmed through the threshold set-point parameters. Time duration alert 1607 shows an example of the time duration of the alert from the time it was initiated up to the present time. The time might be translated to any standard time zone, date and time scale. Alert 1603 refers to a "Mobile Asset Network" alert sent to Asset Owners and Managers (AO/M's) exemplified by M45233j and other mobile shared mobile access codes. Alert scale 1608 quantifies a dynamic analysis management tool that is capable of prioritizing incoming alerts according to their urgency and state of resolution.

    [0053] InTransit tracking alerts 1609 references an example of an alert in which an asset is being tracked as it is moves and lists the number of managed InTransit alerts (which in this particular example is one). Screen area includes data 1610 that identifies the RFID number and current location of the asset in transit. A map 1611 might be used to display the location of the asset, the destination, structures that are being entered or exited, a time locator matrix, GPS guidance system accident alert, arrival notification and in-transit tracking set-point and reset-points as described in FIG. 2B, as well as the optimal approved route. 124988 referenced by data 1614, represents a serial number for a designated destination. Data 1615 references the time the alert was sent. Data 1612 exemplifies an accident and a route detour in order to avoid weather conditions, road construction, reported theft alerts and other hazardous conditions which might otherwise jeopardize the safety of the assets. In addition, other information might accompany the InTransit alert, such as but not limited to traffic patterns, maps and other environmental conditions. Such collection and in transit tracking might allow for, for example, allocation of liability for damage to an asset as it travels to the destination by identifying and/or detecting events that might have caused the damage while in an agent's and/or carrier's possession.

    [0054] FIG. 5A and FIG. 5B show two views of an exemplary smartphone equipped with a reader screen display with intraoperative global information systems tracking global assets and alerts, respectively. Temperature alerts detected globally total six in example. Map display area 1702 enables the user to pinpoint one or more assets which a temperature alert has been detected and through the touch screen zero in on the precise GPS location. In addition, other information regarding the temperature and other related sensor activity might be viewed in real-time. Archival alerts for asset shown on map display area 1702 might be accessed as described previously in the current invention. Mobile InTransit alerts tracking alert globally total 8 in this example as shown in alerts 1706 (a.) and 1706 (b.). The RFID serial number might be accessed in order to check transit status, cargo authorization, vehicle registration, transit route, third party transportation companies and organizations, driver's licenses, weather and other conditions, road construction, purpose of shipment, value, information about the asset and it history, ownership and other information.

    [0055] A Mobile Asset Management network might give users the ability to keep track of a vehicle charged with transporting an asset as well as the individual asset itself. The system of the current invention, might link the assets RFID to the vehicle's RFID through a Personal Identification Data (PID) data pusher or other data archetypes. GPS or other similar technologies might be used for asset tracking, personal tracking, vehicle tracking and other related tracking requirements relative to the global tracking of assets 1706(b.) and 1707(b.) that are classified as in transit.

    [0056] FIG. 6 shows an exemplary tracking of assets when being transported in conjunction with a network of mobile devices and alert notification based on weather and traffic conditions from the pickup location through delivery. A GPS logger might record the in transit (InTransit) positions of one or more asset as shown at display 1801 at regular intervals in its internal memory within the RFID chip and or mobile reader. Display portion 1803 shows eight InTransit alerts having been logged and tracked through GPS from the original starting point exemplified by displayed global position 1802. A memory card slot, or internal flash memory and a USB port might be interface the mobile device allowing downloading of the track log data for further analysis from the cloud network through the mobile asset tracking and management system. In addition, various tracking technologies might be used including but not limited to GPS eXchange Format (GPX), Keyhole Markup Language (KML), National Marine Electronics Association (NMEA) or other format.

    [0057] A GPS navigation device and GPS-integrated mobile devices or smartphones running GPS tracking software might enable the device to be a data pusher (or logger) device. "Bread crumb" GPS asset tracking exemplified by transit path display 1804 might track the transported asset from its original designation. Point-to-point access to the InTransit cargo might be achieved by a combination location hardware (or tracking devices) and (racking software. This combination is often referred to as an Automatic Vehicle Location system. The tracking device might be hardwired and installed in the vehicle; connected to the Controller Area Network bus (CAN-bus), Ignition system switch, battery. It allows collection of extra data, which might be transferred to the GPS tracking server and available for viewing via a secure website accessed over the internet, where asset tracking can be viewed live or digital maps and reports to its final designation as exemplified by endpoint 1805 might be stored and referenced at any time.

    [0058] GPS data pullers, also known as GPS transponders, might be incorporated to track the position of assets position at regular intervals; these devices are "always-on" and might be queried as often as required. GPS data pullers can often be used in the case where the location of the tracker will only need to be known occasionally e.g. placed in area with high risk of a theft alert, or that does not have constant supply of power available therefore limiting the ability to send data on a constant basis.

    [0059] FIG. 7 shows an exemplary tracking system of assets in which guest-smartphones are moving toward a designated site established by the host-smanphone. Host-smartphone 1901 establishes a hosted meeting designation including xyz coordinate locator and time. The setting of a campus based environment might include any building and or geography. The "campus" in this example a stadium was entered by the host-smartphone as the meeting place (section 204, Row F, seats 17-20, is shown in FIG. 7 as the designated location). The time established by the host-smartphone is 7:00 PM central standard time (CST). Guest-smartphone invitees are limitless and might include guests carrying smartphones which travel to the hosted meeting designation by car, foot, boat, plane, train or any other means of transportation. In addition, the smart system might include groups which are in real-time tracked by one or more guest or host-smartphones. In another example of the disclosure a GPS logger might log the position of one or more devices and not only track real-time positions, but also the positions of any guest-smartphone or other mobile device as well as access archival information such as positioning, information regarding the event or place, warnings, alerts and other safety information.

    [0060] GPS pathways 1904 (a.) and 1904 (b.) illustrate paths taken by two guest-smartphones as logged through respective GPS coordinates. GPS pathway 1904 (a.) exemplifies a guest traveling at 3 mph toward the host-smartphone designation. The guest-smartphone (with user named "John") has an estimated time of arrival of 6:55PM as given in label 1902. Although the user in this example is traveling by foot, it is understood by anyone familiar with the art that any transportation method might be used and displayed as such to users. Another guest-smartphone (with user named Jane) is traveling at 2 mph with an estimated time of arrival of 7:01 PM as given in label 1903.

    [0061] FIG. 8 shows an example of a host-locator campus meeting place and time as well as two independent guest-smartphone devices being tracked. GPS pathway 2002 (a.) illustrates John's path to the host-smartphone's meeting designation. Path 2004 is an example of a "best" path, where "best" is, for example, either a shortest, a fastest, or a safest course of travel to destination 2001. However, in this example John has taken an alternative path which now increased the estimated time of arrival to 6:58 PM. The other user (in this example, named Jane) 2006 along GPS pathway 2002 (b.) is provided optimal and alternative route information and is also provided with the other user's (John's) route information and options as well. In another example of the disclosure, when Jane's guest-smanphone approaches the stadium, a diagram map of the stadium might be displayed on the corresponding smartphone in a manner as a street map if "walking" is displayed. The football game's score, game brochure, concession stand locations, menus and specials, electronic tickets for admission into the stadium and other information might also be embedded on the phone and securely accessed and retrieved. Radio Frequency identification might be integrated in a combination with other wireless platforms, databases and cellular networks in order to provide seamless access to enriched data. Guest-smartphone users as well as host-smartphone users might access all types of data including, but limited to, text, maps, video, audio or multimedia.

    [0062] FIG. 9 shows an exemplary host-smartphone alert, based on a failure of the guest-smartphone's arrival to the designated and scheduled-time meeting site. Event 2105 shows an exemplary confirmation that the guest-smanphone 2103 held by Jane has safely arrived at the host-smartphone designated site. Concurrently, the host-smartphone GPS tracking system warns the host that one of the guest-smartphones is nine minutes late and not moving. 2102 shows John's guest-smartphone is travelling at 0 mph and that the MSM system has determined through collecting encapsulator data the possibility that John may be in distress.

    [0063] The "Mobile Safety Network" might enable the host-smartphone to directly contact the guest-smartphone inquiring if they are in distress or lost and or send a message to the general public within various set radiuses. In addition, as referenced previously in the current invention, one or more host-smartphones might attempt to contact one or more guest-smartphones if a delay in arrival occurs.

    [0064] For an example an overriding message to the guest-smartphone might send an audio, text, or other message regarding if the user is distressed or in trouble. Overriding, as defined in the present invention, is the ability to remotely to activate the guest-smartphone 2102 based on previous permission from John to allow environmental encapsulator functionality. The ability to activate a cell phone that is turned off or not functioning might be utilized by the 2101 host-smartphone or emergency dispatch authorities 2104 as previously described. The permission to allow another device to remotely access encapsulate the audio, video, photos, real-time or archival location tracking might be either temporarily granted or controlled by the guest-smartphone. It is obvious that in case that an alert is sent from the host to the emergency dispatch units and or in this example stadium security 2104, emergency authorities might circumvent access any data necessary to assist the individual in need.

    [0065] FIG. 10 shows an asset 2203(a.) at a location, equipped with an RFID sensor/tag and in communication with a smartphone 2201. The asset of FIG. 10 might be, for example, located in a museum, art gallery, show room, corporate or government building, historical site, architectural structure, bridge, tower, monument, gravesite, ocean geography, recreational park and/or other geographic/campus location whether indoors or outdoors. Asset 2203 (a.) represents an exemplary painting referred to in the current invention as an asset. The exemplary asset is displayed to the public in a museum or any other location. The current invention includes a Smart Location Platform 2201 which might be defined as asset information database and server which might dynamically receive and transmit information regarding asset 2203 (a.) or other assets when in proximity or upon demand by the smartphone reader user, such as described above. The Smart location Platform 2201 might include a wireland or wireless sensor device which monitors the asset as herein described. In addition, as understood by those skilled in the art, integrated voice, Interactive Voice Response (IVR), SMS, SMS aggregation might be carrier independent (GSM, CDMA, Identification Protocol (IDENT)) and network independent (lP, radio, User Datagram protocol (UDP)). In addition Smart location Platform 2201 might interface one or more deliverable nodes and modules, a secure mash-up using Integrated Development Environment (IDE) and a secure database information archive server when accessing asset information.

    [0066] In yet another example of the disclosure, flexible message delivery and content type might utilize push and or pull technologies. The RFID tag chip and programmed software shown as RFID sensor 2204 might contain any type of environmental sensor as well as previously described herein. The RFID tag might be equipped with a distance proximity algorithm 2206; the programmed distance 2205 from the asset might vary and be adjusted by the owner of the asset on display. Distance 2205, in this example, might be established as a security set-point by museum administration. If the security line is crossed by a person or object (e.g., a security guard) guard alert 2204 (a.) might notify security personnel in real-time of the situation, which in this case presents immediate danger the asset.

    [0067] Another example of the disclosure, using the same example of a museum asset which is on display to the public, alert 2204 (a.) allows smartphone 2201 (by action of its user) to trigger a notification based on their "in the field" observation. Signal 604 (b.) from smartphone 2201 triggers a notification to a guard, an emergency responder, or other authority relative to the degree of potential harm to, or theft of, the asset. In addition, a user of smartphone 2201 might initiate an encapsulation of asset 2203 (a.) by activating button 2204 (c.). The encapsulation of the situation might be by activating the video, facial recognition, photos, audio and other technologies which might capture information regarding a situation which might endanger the asset.

    [0068] Smartphone 2201 is capable of dynamically accessing information regarding asset 2203 (a.) display information, and an asset information archive might be accessed through the smartphone, instead of the current method of handing out phone devices or headsets (e.g., station information 2207 and video/audio/multimedia and track information 2208, 2209). The smartphone might detect which asset, station or asset through the RFID tag proximity reading application, the station or what area of the museum or campus, relative to an exhibit or selected patron interest in a certain asset such as 16th century art or Chinese Ming Dynasty sculpture for example. The museum patron in this case might customize Italian Renaissance paintings query through the Mobile Asset Management system and Smart Location Platform. A GPS-based guiding system and map helps guide the patron to one asset to another as shown and exemplified by title 2210, history 2211, related historical archive (e.g., other similar artists) 2212; other exhibits 2213 at the site or other geographies; special features 2214 (such as for example interviews, documentaries, books, and news articles, Internet and other data access), artist archive 2215 (e.g., other paintings by the artists and where the paintings etc.), and other historical data 2216.

    [0069] The smartphone reading application might provide detail of the asset when in proximity of the asset. Asset information might be in any form of text, video, audio, pictures and or multimedia regarding the painting for example or its historical linage and heritage. In addition, solar powered RFID sensors and other technologies might be used to powered units in order to extend battery life while in transit over long distances.

    [0070] GPS data pullers, also known as GPS transponders, might also be incorporated to track the asset's position at regular intervals; these devices are always-on and can be queried as often as required. GPS data pullers might be used in the case where the location of the tracker will only need to be known occasionally e.g. placed in area with high risk of a theft alert, or that does not have constant supply of power available, therefore limiting the ability to send data on a constant basis.

    [0071] As described herein, some examples of the disclosure, might be implemented as a software application downloadable to a mobile device. The downloaded software application might work with existing hardware of the mobile device to implement an emergency notification alert system as described herein. For example, some examples might be available as an "app" or icon on the screen of the mobile device. Alternatively, some examples of the disclosure, might require special purpose hardware, and this might only be compatible with mobile devices having the emergency notification hardware.

    [0072] While the exemplary examples of the disclosure, have been described with respect to processing blocks in a software program, including possible implementation as a digital signal processor, micro-controller, or general purpose computer, the present invention is not so limited. As would be apparent to one skilled in the art, various functions of software may also be implemented as processes of circuits. Such circuits may be employed in, for example, a single integrated circuit, a multi-chip module, a single card, or a multi-card circuit pack.

    [0073] The present invention can be embodied in the form of methods and apparatuses for practicing those methods. The present invention can also be embodied in the form of program code embodied in tangible media, such as magnetic recording media, optical recording media, solid state memory, floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium, wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the invention. The present invention can also be embodied in the form of program code, for example, whether stored in a storage medium, loaded into and/or executed by a machine, or transmitted over some transmission medium or carrier, such as over electrical wiring or cabling, through fiber optics, or via electromagnetic radiation, wherein, when the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the invention. When implemented on a general-purpose processor, the program code segments combine with the processor to provide a unique device that operates analogously to specific logic circuits. The present invention can also be embodied in the form of a bitstream or other sequence of signal values electrically or optically transmitted through a medium, stored magnetic-field variations in a magnetic recording medium, etc., generated using a method and/or an apparatus of the present invention.

    [0074] As used herein in reference to an element and a standard, the term "compatible" means that the element communicates with other elements in a manner wholly or partially specified by the standard, and would be recognized by other elements as sufficiently capable of communicating with the other elements in the manner specified by the standard. The compatible element does not need to operate internally in a manner specified by the standard.

    [0075] Also for purposes of this description, the terms "couple," "coupling," "coupled," "connect," "connecting," or "connected" refer to any manner known in the art or later developed in which energy is allowed to be transferred between two or more elements, and the interposition of one or more additional elements is contemplated, although not required. Conversely, the terms "directly coupled," "directly connected," etc., imply the absence of such additional elements. Signals and corresponding nodes or pons may be referred to by the same name and are interchangeable for purposes here.

    [0076] It will be further understood that various changes in the details, materials, and arrangements of the parts which have been described and illustrated in order to explain the nature of this invention may be made by those skilled in the art without departing from the scope of the invention as expressed in the following claims.


    Claims

    1. A system for safety and protection of assets, the system comprising:

    a wireless network;

    at least one asset sensor combined with a corresponding identification tag, each asset sensor either attached to or placed in proximity of an associated one of the assets;

    a mobile device (100) of a plurality of mobile devices in communication with the wireless network, each mobile device including a sensor reader configured to receive sensor data from the at least one asset sensor corresponding to the identification tag, each mobile device transmitting acquired data across the wireless network, each mobile device having corresponding mobile device sensors including at least one sensor recording one or more of audio, video and Global Positioning System (GPS) information, and each mobile device including a secure encapsulator (130) securely storing acquired data including the sensor data associated with the corresponding identification tag; and

    a server, in communication with the wireless network, configured i) to communicate with the mobile device and each asset sensor, ii) to receive the sensor data from the mobile device, iii) to generate real-time and archival data on the assets, wherein the server is coupled to one or more databases including information related to the assets, wherein the information related to the assets includes information of asset environmental occurrences related to predefined alerts, wherein the asset environmental occurrences include one or more of temperature, humidity, gaseous content, chemicals, air quality, air pressure, radiation, vibration, exposure to light, and sensing at least one of a moving object and person approaching the asset,

    wherein, when pre-programmed alert threshold set-points for the at least one asset sensor in communication with the mobile device are reached, the corresponding asset sensor triggers the mobile device to send an alert to alert components associated with the assets, and

    wherein, in response to the alert, the secure encapsulator (130) of the mobile device activates one or more mobile device sensors to collect and securely store additional sensor data related to the alert in combination with the sensor data associated with the identification tag.


     
    2. The system of claim 1 wherein the server is configured to allow the mobile device to track the asset environmental occurrences and asset positions of the associated one of the assets.
     
    3. The system of claim 2 wherein the server is configured to determine the pre-programmed alert threshold set-points and to transmit the pre-programmed alert threshold set-points to the at least one asset sensor and the mobile device.
     
    4. The system of claim 1 wherein the information related to the assets includes information of asset location.
     
    5. The system of claim 1 wherein the information related to the assets includes information of asset travel data having occurred travel conditions and estimated future travel conditions based on predetermined itineraries.
     
    6. The system of claim 1 wherein the assets include digitized assets represented in digital format in a tangible media.
     
    7. The system of claim 6 wherein the digitized asset is digital intellectual property monitored and tracked when resident as the tangible media on at least one of an Internet, a private network, and a public network.
     
    8. The system of claim 1 wherein the sensor reader is a radio frequency identification reader including a transceiver with a radio frequency identification decoder.
     
    9. The system of claim 8 wherein the identification tag is a radio frequency identification sensor tag programmed with a unique identification number, wherein the asset is associated with the unique identification number within the radio frequency identification sensor tag.
     
    10. The system of claim 9 wherein the assets are registered with an asset management and control system, including a central database, wherein each asset is identified in the central database by the corresponding unique identification numbers.
     
    11. The system of claim 9 wherein the mobile device includes at least one host mobile device designated to act as a gateway between the at least one asset sensor and the one or more databases connected to the assets and other ones of the plurality of mobile devices.
     
    12. The system of claim 9 wherein the pre-programmed alert threshold set-points are adjustable.
     
    13. The system of claim 9 wherein an alert scale is associated with the alert, the alert prioritizing incoming alerts from the at least one asset sensor.
     
    14. The system of claim 9 wherein the at least one mobile device is a smartphone and one smartphone is designated as a host-smartphone, at least one other smartphone is designated as a guest-smartphone, the host-smartphone designated to act as a gateway between the at least one asset sensor and the one or more databases connected to the assets and the guest-smartphone, and each guest-smartphone tracked by the host-smartphone.
     
    15. The system of claim 1 wherein the alert components include other mobile devices absent from communication with the at least one asset sensor and the corresponding identification tag.
     


    Ansprüche

    1. System zur Sicherheit und zum Schutz von Vermögenswerten, wobei das System umfasst:

    drahtloses Netzwerk;

    mindestens einen Vermögenswertsensor, der mit einem entsprechenden Identifikations-Tag kombiniert ist, wobei jeder Vermögenswertsensor entweder an einem zugehörigen der Vermögenswerte befestigt oder in der Nähe davon angeordnet ist;

    mobile Vorrichtung (100) aus einer Vielzahl von mobilen Vorrichtungen, die in Kommunikation mit dem drahtlosen Netzwerk stehen, wobei jede mobile Vorrichtung ein Sensorauslesegerät beinhaltet, das dafür ausgelegt ist, Sensordaten vom mindestens einen Vermögenswertsensor zu empfangen, der dem Identifikations-Tag entspricht, wobei jede mobile Vorrichtung erfasste Daten über das drahtlose Netzwerk überträgt, wobei jede mobile Vorrichtung entsprechende Sensoren für mobile Vorrichtungen aufweist, die mindestens einen Sensor beinhalten, der eines oder mehrere von Audio-, Video- und GPS-Informationen aufzeichnet, und jede mobile Vorrichtung einen sicheren Verkapseler (130) beinhaltet, der erfasste Daten sicher speichert, einschließlich der Sensordaten, die dem entsprechenden Identifikations-Tag zugeordnet sind; und

    Server, der in Kommunikation mit dem drahtlosen Netzwerk steht und für Folgendes ausgelegt ist: i) Kommunizieren mit der mobilen Vorrichtung und jedem Vermögenswertsensor, ii) Empfangen der Sensordaten von der mobilen Vorrichtung, iii) Erzeugen von Echtzeit- und Archivdaten über die Vermögenswerte, wobei der Server mit einer oder mehreren Datenbanken gekoppelt ist, einschließlich Informationen über die Vermögenswerte, wobei die Informationen über die Vermögenswerte Informationen über Vermögenswert-Umgebungsereignisse in Bezug auf vordefinierte Alarme beinhalten, wobei die Vermögenswert-Umgebungsereignisse eines oder mehrere von Temperatur, Luftfeuchtigkeit, Gasgehalt, Chemikalien, Luftqualität, Luftdruck, Strahlung, Vibration, Lichteinwirkung und Erfassen mindestens eines von einem sich bewegenden Objekt und einer Person, die sich dem Vermögenswert nähert, beinhalten,

    wobei, wenn vorprogrammierte Alarmschwellen-Sollwerte für den mindestens einen Vermögenswertsensor, der in Kommunikation mit der mobilen Vorrichtung steht, erreicht werden, der entsprechende Vermögenswertsensor die mobile Vorrichtung veranlasst, einen Alarm an die den Vermögenswerten zugehörigen Alarmkomponenten zu senden, und

    wobei als Reaktion auf den Alarm der sichere Verkapseler (130) der mobilen Vorrichtung einen oder mehrere Sensoren der mobilen Vorrichtung dazu aktiviert, zusätzliche Sensordaten in Bezug auf den Alarm in Kombination mit den Sensordaten, die dem Identifikations-Tag zugeordnet sind, zu erfassen und sicher zu speichern.


     
    2. System nach Anspruch 1, wobei der Server dafür ausgelegt ist, der mobilen Vorrichtung zu ermöglichen, die Umgebungsereignisse und die Vermögenswertpositionen des zugehörigen der Vermögenswerte nachzuverfolgen.
     
    3. System nach Anspruch 2, wobei der Server dafür ausgelegt ist, die vorprogrammierten Alarmschwellen-Sollwerte zu bestimmen und die vorprogrammierten Alarmschwellen-Sollwerte an den mindestens einen Vermögenswertsensor und die mobile Vorrichtung zu übertragen.
     
    4. System nach Anspruch 1, wobei die Informationen über die Vermögenswerte Informationen über Vermögenswert-Standorte beinhalten.
     
    5. System nach Anspruch 1, wobei die Informationen über die Vermögenswerte Informationen über Vermögenswert-Wegdaten beinhalten, die eingetretene Wegbedingungen und geschätzte zukünftige Wegbedingungen basierend auf vorbestimmten Wegrouten aufweisen.
     
    6. System nach Anspruch 1, wobei die Vermögenswerte digitalisierte Vermögenswerte beinhalten, die in digitaler Form in einem materiellen Medium repräsentiert sind.
     
    7. System nach Anspruch 6, wobei der digitalisierte Vermögenswert digitales geistiges Eigentum ist, das überwacht und nachverfolgt wird, wenn es als das materielle Medium in mindestens einem von einem Internet, einem privaten Netzwerk und einem öffentlichen Netzwerk vorhanden ist.
     
    8. System nach Anspruch 1, wobei das Sensorauslesegerät ein Funkfrequenz-Identifikationslesegerät ist, einschließlich eines Sender-Empfängers mit einem Funkfrequenz-Identifikationsdekodierer.
     
    9. System nach Anspruch 8, wobei das Identifikations-Tag ein Funkfrequenz-Identifikationssensor-Tag ist, das mit einer eindeutigen Identifikationsnummer programmiert ist, wobei der Vermögenswert der eindeutigen Identifikationsnummer im Funkfrequenz-Identifikationssensor-Tag zugeordnet ist.
     
    10. System nach Anspruch 9, wobei die Vermögenswerte in einem Vermögenswertverwaltungs- und -kontrollsystem registriert sind, das eine zentrale Datenbank beinhaltet, wobei jeder Vermögenswert in der zentralen Datenbank durch die entsprechenden eindeutigen Identifikationsnummern identifiziert ist.
     
    11. System nach Anspruch 9, wobei die mobile Vorrichtung mindestens eine mobile Host-Vorrichtung beinhaltet, die dazu bestimmt ist, als Gateway zwischen dem mindestens einen Vermögenswertsensor und der einen oder den mehreren Datenbanken, die mit den Vermögenswerten und anderen aus der Vielzahl von mobilen Vorrichtungen verbunden sind, zu wirken.
     
    12. System nach Anspruch 9, wobei die vorprogrammierten Alarmschwellen-Sollwerte einstellbar sind.
     
    13. System nach Anspruch 9, wobei dem Alarm eine Alarmeinstufung zugeordnet ist, wobei der Alarm eingehende Alarme von dem mindestens einen Vermögenswertsensor priorisiert.
     
    14. System nach Anspruch 9, wobei die mindestens eine mobile Vorrichtung ein Smartphone ist und ein Smartphone als ein Host-Smartphone gekennzeichnet ist, mindestens ein anderes Smartphone als ein Gast-Smartphone gekennzeichnet ist, wobei das Host-Smartphone als Gateway zwischen dem mindestens einen Vermögenswertsensor und der einen oder den mehreren mit den Vermögenswerten verbundenen Datenbanken und dem Gast-Smartphone wirkt, und jedes Gast-Smartphone vom Host-Smartphone nachverfolgt wird.
     
    15. System nach Anspruch 1, wobei die Alarmkomponenten andere mobile Vorrichtungen beinhalten, die nicht in Kommunikation mit dem mindestens einen Vermögenswertsensor und dem entsprechenden Identifikations-Tag stehen.
     


    Revendications

    1. Système destiné à la sécurité et la protection d'actifs, le système comprenant :

    un réseau sans fil ;

    au moins un capteur d'actifs combiné à une étiquette d'identification correspondante, chaque capteur d'actifs étant attaché ou placé à proximité d'un actif associé parmi les actifs ;

    un dispositif mobile (100) d'une pluralité de dispositifs mobiles en communication avec le réseau sans fil, chaque dispositif mobile comportant un lecteur de capteur configuré pour recevoir des données de capteur à partir dudit capteur d'actifs correspondant à l'étiquette d'identification, chaque dispositif mobile transmettant des données acquises à travers le réseau sans fil, chaque dispositif mobile ayant des capteurs de dispositif mobile correspondants comportant au moins un capteur enregistrant un ou plusieurs éléments parmi des informations audio, vidéo et GPS (système mondial de positionnement), et chaque dispositif mobile comportant un encapsulateur sécurisé (130) stockant de façon sécurisée des données acquises incluant les données de capteur associées à l'étiquette d'identification correspondante ; et

    un serveur, en communication avec le réseau sans fil, configuré pour i) communiquer avec le dispositif mobile et chaque capteur d'actifs, ii) recevoir les données de capteur à partir du dispositif mobile, iii) générer des données temps réel et d'archives sur les actifs, le serveur étant couplé à une ou plusieurs bases de données comportant des informations concernant les actifs, les informations concernant les actifs contenant des informations d'occurrences environnementales d'actifs associées à des alertes prédéfinies, les occurrences environnementales d'actifs comportant un ou plusieurs éléments parmi la température, l'humidité, le contenu gazeux, des produits chimiques, la qualité de l'air, la pression atmosphérique, le rayonnement, la vibration, l'exposition à la lumière, et la détection d'au moins un élément parmi un objet en mouvement et une personne approchant l'actif,

    lorsque des points définis de seuils d'alerte préprogrammés pour ledit capteur d'actifs en communication avec le dispositif mobile sont atteints, le capteur d'actifs amenant le dispositif mobile à envoyer une alerte pour alerter des composants associés aux actifs, et

    en réponse à l'alerte, l'encapsulateur sécurisé (130) du dispositif mobile activant un ou plusieurs capteurs de dispositif mobile pour collecter et stocker de façon sécurisée des données de capteur additionnelles concernant l'alerte en combinaison avec les données de capteur associées à l'étiquette d'identification.


     
    2. Système selon la revendication 1, dans lequel le serveur est configuré pour permettre au dispositif mobile de suivre les occurrences environnementales d'actifs et les positions d'actifs des actifs associés parmi les actifs.
     
    3. Système selon la revendication 2, dans lequel le serveur est configuré pour déterminer les points définis de seuils d'alerte préprogrammés et pour transmettre les points définis de seuils d'alerte préprogrammés au dit capteur d'actifs et au dispositif mobile.
     
    4. Système selon la revendication 1, dans lequel les informations concernant les actifs comprennent des informations d'emplacement d'actifs.
     
    5. Système selon la revendication 1, dans lequel les informations concernant les actifs comprennent des informations de données de trajet d'actifs ayant des conditions de trajet survenues et des conditions de trajet futures estimées basées sur des itinéraires prédéterminés.
     
    6. Système selon la revendication 1, dans lequel les actifs comprennent des actif numérisés représentés dans un format numérique dans un support tangible.
     
    7. Système selon la revendication 6, dans lequel l'actif numérisé est une propriété intellectuelle numérique contrôlée et suivie lorsqu'il réside comme le support tangible sur au moins un élément parmi Internet, un réseau privé, et un réseau public.
     
    8. Système selon la revendication 1, dans lequel le lecteur de capteur est un lecteur d'identification radiofréquence comportant un émetteur-récepteur avec un décodeur d'identification radiofréquence.
     
    9. Système selon la revendication 8, dans lequel l'étiquette d'identification est une étiquette de capteur d'identification radiofréquence programmée avec un numéro d'identification unique, l'actif étant associé au numéro d'identification unique à l'intérieur de l'étiquette de capteur d'identification radiofréquence.
     
    10. Système selon la revendication 9, dans lequel les actifs sont enregistrés auprès d'un système de gestion et de contrôle d'actifs, comportant une base de données centrale, chaque actif étant identifié dans la base de données centrale par les numéros d'identification uniques correspondants.
     
    11. Système selon la revendication 9, dans lequel le dispositif mobile comprend au moins un dispositif mobile hôte désigné pour agir comme une passerelle entre ledit capteur d'actifs et les une ou plusieurs bases de données connectées aux actifs et d'autres dispositifs mobiles parmi la pluralité de dispositifs mobiles.
     
    12. Système selon la revendication 9, dans lequel les points définis de seuils d'alerte préprogrammés sont ajustables.
     
    13. Système selon la revendication 9, dans lequel une échelle d'alertes est associée à l'alerte, l'alerte priorisant des alertes entrantes à partir dudit capteur d'actifs.
     
    14. Système selon la revendication 9, dans lequel ledit dispositif mobile est un téléphone intelligent et un téléphone intelligent est désigné comme un téléphone intelligent hôte, au moins un autre téléphone intelligent est désigné comme un téléphone intelligent invité, le téléphone intelligent hôte est désigné pour agir comme une passerelle entre ledit capteur d'actifs et les une ou plusieurs bases de données connectées aux actifs et au téléphone intelligent invité, et chaque téléphone intelligent invité est suivi par le téléphone intelligent hôte.
     
    15. Système selon la revendication 1, dans lequel les composants d'alerte comprennent d'autres dispositifs mobiles absents d'une communication avec ledit capteur d'actifs et l'étiquette d'identification correspondante.
     




    Drawing






































    Cited references

    REFERENCES CITED IN THE DESCRIPTION



    This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

    Patent documents cited in the description