Cordless identification security system and method

ABSTRACT

A system and method described for tracking portable devices. The system may include a transmitter which transmits wireless inquiries to a plurality of portable devices and a receiver receiving replies to the inquiries from the portable devices. In addition, the system may include a memory storing identifier data corresponding to the portable devices and a processor coupled to the memory and to the receiver, the processor retrieving from each reply, identifier data uniquely identifying a particular one of the portable devices which generated the reply and comparing the identifier data to the stored identifier data. Furthermore, the system may include an alarm system coupled to the processor and controlled based on the comparison of stored identifier data to the identifier data retrieved from the replies.

BACKGROUND INFORMATION

Conventional portable computing devices are becoming more powerful andexpensive. The problem with such portable devices is that, due to theirsmall size and/or light weight, they are often misplaced or stolen. Forexample, warehouse employees often utilize portable bar code scannerswhich, due to their small size, are difficult to manually track. Thus,replacement costs for these devices can become burdensome.

Some conventional security systems have attempted to deal with thisissue. For example, small metal tags have been affixed to such portabledevices so that, each time such a portable device is carried through asecurity area, the metal tag activates an alert system which notifiessecurity personnel. However, such security systems cannot determinewhether this portable device is being legitimately carried through thesecurity area or whether it is being stolen. Thus, security personnelmust conduct time-consuming investigations to make these determinations.

SUMMARY OF THE INVENTION

A system and method described for tracking portable devices. The systemmay include a transmitter which transmits wireless inquiries to aplurality of portable devices and a receiver receiving replies to theinquiries from the portable devices. In addition, the system may includea memory storing identifier data corresponding to the portable devicesand a processor coupled to the memory and to the receiver, the processorretrieving from each reply, identifier data uniquely identifying aparticular one of the portable devices which generated the reply andcomparing the identifier data to the stored identifier data.Furthermore, the system may include an alarm system coupled to theprocessor and controlled based on the comparison of stored identifierdata to the identifier data retrieved from the replies.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 shows an exemplary embodiment of a system according to thepresent invention; and

FIG. 2 shows an exemplary embodiment of a method according to thepresent invention.

DETAILED DESCRIPTION

The present invention relates to a cordless/wireless identificationsecurity system and method. The exemplary embodiment of the presentinvention described below utilizes, as an example of cordlesstechnology, Bluetooth technology. Bluetooth technology is designed toenable fast, robust and secure wireless communication between small,portable computing devices. Thus, this technology eliminates the needfor proprietary cables which had previously been required to enabledevice connectivity. Those skilled in the art will understand that othercordless/wireless technologies may be utilized with the presentinvention.

FIG. 1 illustrates an exemplary embodiment of the system according tothe present invention. In particular, FIG. 1 shows a facility 1 whichutilizes portable devices 16. The portable devices 16 may be laptopcomputers, bar code scanners, computer terminals, beepers, phones,printers, personal digital assistants, etc. Each of various employees ofthe facility 1 receives a device 16 at a beginning of a working shiftand returns the device 16 at the end of the shift. To assure that thedevices 16 are not misplaced or stolen, the facility 1 utilizes acordless identification security system and method for tracking thedevices 16.

This system may include a security monitor device 12 and a controlcomputer 24. The security monitor device 12 may be situated, forexample, in a security area 10 of the facility 1. The security area 10also may include a security office 18 where an alert system 14 andsecurity personnel may be located.

The control computer 24 may be situated, for example, in a control room20 of the facility 1. The control computer 24 may collect and maintain arecord for each of the devices 16. In particular, the record may includetechnical information about a type of each device 16, a uniqueidentification number (“UIN”) for each device 16 which is assigned bythe manufacturer, status and location information for each device 16(e.g., whether the device 16 is activated and an indication as to wherethe device 16 may be situated), etc. The control computer 24 updates therecord of each device 16 each time there is a change to the status ofthe device 16. Each time the facility 1 receives a new device 16, acorresponding record is generated and stored by the control computer 24.

Each of the portable devices 16 and the security monitor device 12 mayinclude, for example, a Bluetooth radio transceiver, as is known in theart, which allows wireless communications to be established andfacilitates data exchange. This radio transceiver may operate within,e.g., the 2.4 GHZ ISM band utilizing a 2.4 GHz Short Range Radio linkprotocol as defined by the Bluetooth Special Interest Group (SIG) inBluetooth System Specification v. 1.1 (Dec. 1, 2000).

Bluetooth-enabled devices may be grouped into a plurality of piconetswith each piconet including up to seven “slave” devices and one masterdevice. The master device's clock and hopping sequences may besynchronized with those of the corresponding slave devices. In theexemplary embodiment of FIG. 1, a master device 12′ (which is similar tothe security monitor device 12) and two “slave” devices 16′ (which aresimilar to the device 16) are shown in Piconet A. As described above,the master device 12′ of Piconet A may have up to seven “slave” devices16′. Additionally, each of Piconets B–G must have a master device 12′and may have up to seven “slave” devices 16′.

As would be understood by those skilled in the art, each of theBluetooth-enabled devices may operate in a plurality of modes. Bydefault, the device may be placed in a standby mode, during which thedevice performs scanning operations. The standby mode may allow thedevice to (a) listen for its own device access code for the duration ofa scan window (e.g., 11.25 ms) (i.e., a request to enter a “page scanmode”) or (b) listen for an inquiry access code (i.e., a request toenter a “inquiry scan mode”). The page scan mode is utilized to set upan actual connection between the two or more Bluetooth-enabled devices.The inquiry mode, on the other hand, is used to determine which devicesare within the scan range of the another Bluetooth-enabled device.

FIG. 2 shows an exemplary embodiment of the method according to thepresent invention. The method is performed continuously as long as theidentification security system is active. In step 100, security monitordevice 12 is in the inquiry mode, transmitting inquiries to all devices16 within the security area 10. The transmission of the inquires may beperformed continuously. Each inquiry includes an inquiry access code anda request to all Bluetooth-enabled devices to respond and identifythemselves. The devices 16 which are situated within the security area10 “listen” for the inquiry access code and generate replies theretowhich are forwarded to the security monitor device 12 (step 104). Eachreply includes the UIN of the corresponding device 16. If no reply isreceived, the security monitor device 12 continues transmittinginquiries (step 100).

Once the security monitor device 12 has received a reply, the UIN of thedevice 16 is extracted and forwarded to the control computer 24 alongwith the date and time when the reply was received by the securitymonitor device 12 (step 106). The control computer 24 compares this UINto a database of registered UINs to find a match (step 108). If no matchis found, the control computer 24 indicates that the device 16 is notregistered at the facility 1 (step 110). Thus, the control computer 24does not need to activate the alert system 14 and the employee with thedevice 16 may exit the facility 1.

Alternatively, the system and method may be utilized to detect theexistence of unregistered devices 16 in areas where they are notsupposed to be. In this case, when the control computer 24 finds nomatch in step 110, the control computer 24 may activate the alert system14 and inform the security personnel of the unregistered device 16present in the security area 10.

If there is a match in step 108, the control computer 24 activates thealert system 14 (step 112). The activation of the alert system 14 may bemade in many different ways. For instance, the alert system 14 maynotify security personnel in the security office 18 who may then preventthe employee with the device 16 from exiting the security area 10. Thealert system 14 may also activate security equipment (e.g., videocameras) situated, for example, in the security area 10 to recordactivities therein for as long as the device 16 is present within thesecurity area 10 and continues to reply the inquires of the securitymonitor device 12. The alert system 14 may also automatically lock thesecurity area 10 so that no one can leave the security area 10 until thedevice 16 is located. All of the above mentioned activities may betransmitted to the control computer 24 which may record the activitiesin a corresponding record for the particular device 16.

In another exemplary embodiment of the present invention, the system andmethod may be utilized to track misplaced devices 16. For instance,every time an employee carrying the device 16 passes through aparticular security monitor device 12, this information is recorded bythe control computer 24 so that later the movements of the device 16 maybe tracked. The system and method according to the present invention mayalso be utilized to locate a device 16 or a employee carrying device 16within the facility 1. The facility 1 may have a large number of thesecurity monitor devices 12 which effectively cover the area of thefacility 1. So that, when the device 16 is carried around the facility,its location is known.

In an alternative exemplary embodiment of the present invention, thesystem and method may be used to track employees time. For example,every employee may be assigned a Unique Employee Identification Number(“UEIN”). This UEIN may be stored in the control computer 24 along withthe UIN of an assigned device 16 which the employee may carry as heenters/exits the facility 1 through the security area 10. For example,when an employee enters the facility 1 through the security area 10, thesecurity monitor device 12 receives a reply to its inquiries from thedevice 16. The security monitor device 12 forwards this reply to thecontrol computer 24 which determines the corresponding UEIN as afunction of the UIN and records the date and time when the employeeentered the facility 1. Based on that information, the facility 1 maytrack the employee's time.

The system and method may also be utilized in retail environments. Forexample, in a retail environment, Bluetooth-enabled devices may beintegrated with Radio Frequency Identification tags (“RFID”). Theseintegrated devices may serve as part of a dual-mode security systemwhich allows detection of both the RFID tags and the Bluetooth-enableddevices. Thus, facilities may keep track of inventory of these devices16 and prevent the devices 16 from leaving the facility 1. This reducesoperating costs due to misplaced or stolen devices 16.

There are many modifications to the present invention which will beapparent to those skilled in the art without departing form the teachingof the present invention. The embodiments disclosed herein are forillustrative purposes only and are not intended to describe the boundsof the present invention which is to be limited only by the scope of theclaims appended hereto.

1. A system for tracking portable devices comprising: a transmittertransmitting wireless inquiries to a plurality of portable devices; areceiver receiving replies to the inquiries from the portable devices; amemory arrangement storing identifier data corresponding to the portabledevices, the identifier data including status information; a processorcoupled to the memory arrangement and to the receiver, the processorretrieving from each reply, reply identifier data uniquely identifying aparticular one of the portable devices which generated the reply andcomparing the reply identifier data to the stored identifier data; and aportable device control system coupled to the processor and controlledbased on the comparison of the stored identifier data to the identifierdata retrieved from the replies, wherein, when the reply identifier datamatches the stored identifier data the status information correspondingto the portable device is updated on the memory and, when the replyidentifier data does not match the stored identifier data, the portabledevice control system provides an indication that the portable device isunregistered.
 2. The system according to claim 1, wherein thetransmitter and the receiver include a Bluetooth radio transceiver whichutilizes a 2.4 GHZ Short Range Radio protocol.
 3. The system accordingto claim 1, wherein the portable device includes a Bluetooth radiotransceiver utilizing a 2.4 GHZ Short Range Radio protocol.
 4. Thesystem according to claim 1, wherein the portable devices include atleast one of laptop computers, bar code scanners, computing terminals,beepers, phones, printers and personal digital assistants.
 5. The systemaccording to claim 1, wherein the inquiries include an include aninquiry access code which prompts the portable devices to generate thecorresponding replies.
 6. The system according to claim 1, wherein theprocessor retrieves from the reply, date and time when the reply wasgenerated, the processor determining a corresponding employeeidentifying number as a function of the identifier data and storing thedate and time into a data record corresponding to the employeeidentifying number.
 7. The system according to claim 1, wherein theportable device control system includes a sound arrangement providing asound alert when the reply identifier data retrieved from the repliesmatches to the stored identifier data.
 8. The system according to claim1, wherein the portable device control system includes a videoarrangement taping an area from which the replies are received when thereply identifier data retrieved from the corresponding replies matchesto the stored identifier data.
 9. The system according to claim 1,wherein the portable device control system includes a displayarrangement displaying to security personnel an area from which thereplies are received when the reply identifier data retrieved from thecorresponding replies matches to the stored identifier data.
 10. Thesystem according to claim 1, wherein the portable device control systemincludes a locking arrangement locking an area from which the repliesare received when the identifier reply data retrieved from thecorresponding replies matches to the stored identifier data.
 11. Thesystem according to claim 1, wherein the portable device control systemis activated when the reply identifier data retrieved from the repliesdoes not match to the stored identifier data.
 12. The system accordingto claim 1, wherein the transmitter transmits the wireless inquiriescontinuously.
 13. The system according to claim 1, further comprising: aRadio Frequency Identification tag situated on each of the portabledevices; and a Radio Frequency Identification receiver coupled to theprocessor and being capable of detecting the presence of the tag in apredetermined area, wherein the portable device control system isactivated when at least one of (a) the Radio Frequency Identifierreceiver detects the tag in the predetermined area and (b) the replyidentifier data retrieved from the replies matches to the storedidentifier data.
 14. A method of tracking portable devices comprisingthe steps of: transmitting from a security monitor device wirelessinquiries to a plurality of portable devices; retrieving from each replyto the inquiries received by the security monitor device, replyidentifier data uniquely identifying a particular one of the portabledevices which generated the reply and comparing the reply identifierdata to stored identifier data, the stored identifier data includingstatus information; and controlling operation of a portable devicecontrol system based on the comparison of the stored identifier data tothe identifier data retrieved from the replies, wherein, when the replyidentifier data matches the stored identifier data the statusinformation corresponding to the portable device is updated and, whenthe reply identifier data does not match the stored identifier data, theportable device control system provides an indication that the portabledevice is unregistered.
 15. The method according to claim 14, wherein,in the transmitted step, the security monitor device transmits thewireless inquiries continuously.
 16. The method according to claim 14,further comprising the step of: with a Bluetooth radio transceiver ofthe security monitor device, transmitting the inquiries utilizing a 2.4GHZ Short Range Radio protocol.
 17. The method according to claim 14,further comprising the step of: before the transmitting step, generatingthe inquiries to include an inquiry access code, the inquiry access codebeing capable of prompting the portable devices to generate thecorresponding replies.
 18. The method according to claim 17, furthercomprising the steps of: before retrieving step, receiving the inquiriesby the particular device; and generating the reply as a function of theinquiry access code.
 19. The method according to claim 14, furthercomprising the steps of: retrieving from the reply, date and time whenthe reply was generated; determining a corresponding employeeidentifying number as a function of the identifier data; and storing thedata and time corresponding to the employee identifying number.
 20. Themethod according to claim 14, further comprising the step of: using theportable device control system, providing a sound alert when the replyidentifier data retrieved from the replies matches to the storedidentifier data.
 21. The method according to claim 14, furthercomprising the step of: using the portable device control system, tapingan area form which the replies are received when the reply identifierdata retrieved from the corresponding replies matches to the storedidentifier data.
 22. The method according to claim 14, furthercomprising the step of: using the portable device control system,locking an area from which the replies are received when the replyidentifier data retrieved from the corresponding replies matches to thestored identifier data.
 23. The method according to claim 14, furthercomprising the step of: activating the portable device control systemwhen the reply identifier data retrieved from the replies does not matchto the stored identifier data.
 24. The method according to claim 14,further comprising the step of: controlling the portable device controlsystem when at least one of (a) a Radio Frequency Identifier receiverdetects a Radio Frequency Tag situated on one of the portable devices ina predetermined area and (b) the reply identifier data retrieved fromthe replies matches to the stored identifier data.