Methods and system for identifying lost or stolen RFID devices

ABSTRACT

A system for identifying a lost or stolen device includes a transmitter, a receiver and a computer. The transmitter is coupled to the device and transmits identification information. The receiver receives the identification information transmitted by the transmitter when the transmitter is within a defined distance from the receiver. The computer is coupled to the receiver so as to receive the information from the receiver. The computer has a first secure database which stores data associated with lost or stolen devices and which prevents unauthorized access to the data stored therein. The computer compares the information with the stored data, and generates an alarm if the information matches at least some of the stored data.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.11/759,743, filed on Jun. 7, 2007, which is scheduled to issue as U.S.Pat. No. 7,982,608 on Jul. 19, 2011, which is a continuation of U.S.patent application Ser. No. 10/649,372, filed Aug. 26, 2003, now U.S.Pat. No. 7,230,534, issued Jun. 12, 2007, entitled “METHOD AND SYSTEMFOR IDENTIFYING LOST OR STOLEN DEVICES,” which is a continuation of Ser.No. 09/049,697, filed Mar. 27, 1998 entitled “METHOD AND SYSTEM FORIDENTIFYING LOST OR STOLEN DEVICES,” now U.S. Pat. No. 6,609,656, issuedAug. 28, 2003, the disclosure of which is incorporated herein byreference.

FIELD OF INVENTION

The invention relates to a method and system for retrieving lost orstolen devices. More particularly, the invention relates to a method andsystem for identifying lost or stolen portable computers as they passthrough an airport checkpoint.

DESCRIPTION OF RELATED ART

The theft of portable devices, especially portable electronic devices,continues to be a widespread problem in the United States andworld-wide. Each year, millions of dollars worth of electronic equipmentsuch as portable, or laptop, computers are stolen or lost. Typically,when a device is lost or stolen, the owner has no way of retrieving orotherwise locating the device. He or she is then forced to replace thelost item, or make do without it.

Currently existing technology allows devices to be identified by meansof radio frequency identification (RFID) tags. RFID technology useselectromagnetic energy (such as radio) as a medium through whichinformation is sent. Referring to FIG. 1, an RFID system 100 isillustrated. The RFID system 100 includes an RFID tag 102 fortransmitting and/or receiving radio frequency signals and a reader 104for receiving radio frequency signals from the RFID tag 102 andtransmitting radio frequency signals to the RFID tag 102. The system 100also includes a computer 106 which is coupled to the reader 104 by acommunications link 108. The communications link 108 may be any one ofvarious types of well-known communication links such as a cable linethat directly connects the reader 104 to the computer 106, an Ethernetcommunications link, or a modem communications link, for example.Through the communications link 108, the reader 104 can receive commandsand data from the computer 106 and, thereafter, send data to the remoteRFID tag 102. As was noted above, the reader 104 can also receive datafrom the remote RFID tag 102 and pass the data back to the computer 102,

RFID technology overcomes many limitations of other automaticidentification approaches, such as those using bar codes and infraredtechnology, which use light to communicate. Since an RFID tag 102 doesnot require a visual scanner, or other vision system, to detect itspresence, it may be hidden or invisible to the eye and may also be usedin harsh or dirty environments. A reader 104 reads informationtransmitted by the RFID tag 102 even if the tag 102 is completely hiddenfrom view.

An RFID tag 102 typically includes a receiver and some type oftransmitter, an antenna, and memory. There are two categories of RFIDtags--active and passive--that represent two different types of RFcommunication. Tags without batteries are known as passive tags becausethey derive their power from the RF energy transmitted from a reader.Passive RFID tags tend to be smaller and exhibit short rangetransmission characteristics (under six feet), whereas battery-powered,active tags, tend to be larger and exhibit long range transmissioncharacteristics (over one hundred feet),

Active tags send data back to the reader with radio power generated froma battery within the tag. Passive tags, on the other hand, use modulatedbackscatter (MBS) to transmit reflected energy, dictated by the datastream from the tag, back to the reader. Passive tags using MBS arebetter suited for gate or lane applications where it is undesirable towake up (see) any tags beyond a certain distance and where there are fewobstructions in the energy path.

With the aid of RFID technology, devices which are brought within rangeof a reader, or interrogator, may be detected. Furthermore, knowndevices, such as those on assembly lines, can be identified and theirprogress tracked using this technology. However, there is currently nomethod or system which provides a mechanism by which it can bedetermined if the device being detected is lost or stolen. To accomplishthis purpose and to be of value, such a system would not only have toidentify the device, but be able to determine that it was, in fact, lostor stolen and thereafter, notify appropriate personnel of the matter.Additionally, the reader of such an anti-theft/retrieval system, wouldbest be strategically located so as to make it likely that a significantnumber of lost or stolen devices would come within range of the reader.

Therefore, what is needed is a method and system of identifying devices,which are randomly brought within range of a reader, determining if thedetected devices are lost or stolen and thereafter, notifyingappropriate security personnel when such device is located.

SUMMARY OF THE INVENTION

The invention addresses the above and other needs by providing a methodand system which utilizes RFID technology to identify lost or stolengoods that randomly come within range of an RFID reader, and thereafter,notifies security personnel of the lost or stolen status of the goods.

In one embodiment of the invention, a system for identifying a lost orstolen device, includes: a transmitter, coupled to the device, fortransmitting identification information; a receiver which receives theidentification information transmitted by the transmitter, when thetransmitter is within a defined distance from the receiver; and acomputer, coupled to the receiver so as to receive the information fromthe receiver, said computer having a first database for storing dataassociated with lost or stolen devices, wherein said computer comparesthe information with the stored data, and generates an alarm if theinformation matches at least some of the stored data.

In another embodiment, a system for identifying a lost or stolen item,includes: a radio frequency identification device, connected to theitem, for transmitting information related to the item; a reader whichreceives the information transmitted by the radio frequencyidentification device, when the radio frequency identification device iswithin a defined distance from the reader; and a computer, coupled tothe reader so as to receive the information from the reader, saidcomputer having a database for storing a list of lost or stolen items,wherein the computer compares the information with the list of lost orstolen devices, and generates an alarm if the comparison produces amatch.

In another embodiment, a system for identifying lost or stolen goods,includes: means for receiving data transmitted by a radio frequencyidentification device coupled to an item when the item comes within adefined distance of the means for receiving; means for storing a list oflost or stolen goods; means for comparing the data to the list of lostor stolen goods and determining if the data matches informationcontained in the list of lost or stolen goods; and means for generatingan alarm, if the data matches information contained in the list.

In a further embodiment of the invention, a system for identifying alost or item includes: means for storing identification information in amemory of a radio frequency identification (RFID) device containedwithin the item, wherein the RFID device transmits the identificationinformation; means for reporting when the item is lost or stolen; meansfor receiving the identification information transmitted by the RFIDdevice when the item comes within a defined range of the means forreceiving; means for storing data associated with lost or stolen items;means for comparing the received identification information to the dataassociated with the lost or stolen items and for determining if theidentification information indicates that the item is lost or stolen;means for generating an alarm, if the identification informationindicates the item is lost or stolen, so as to alert personnel of thelost or stolen status of the item; and means for updating the dataassociated with the lost or stolen items.

In yet another embodiment, the invention is a method of identifying lostor stolen goods, which includes the acts of: receiving informationtransmitted by a radio frequency identification (RFID) device, coupledto an item, when the item comes within a defined range of a receiverwhich receives the information; storing data associated with lost orstolen goods in a database coupled to the receiver; comparing theinformation to the data and determining if the information matches thedata associated with the lost or stolen goods; and generating an alarm,if the information matches the data.

In another embodiment, the method of the invention includes: storingidentification information in a memory of a radio frequencyidentification (RFID) device contained within an item, wherein the RFIDdevice transmits the identification information; maintaining a list oflost or stolen items in a database of a computer; receiving theidentification information transmitted by the RFID device when thecomputer comes within a defined range of a receiver, coupled to thecomputer; comparing the received identification information to the listof lost or stolen items and determining if the identificationinformation indicates that the item is included in the list of lost orstolen items; and generating an alarm, if the identification informationindicates the item is lost or stolen.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram illustrating a prior art radio frequencyidentification (RFID) system in which an RFID tag may be identified witha reader device coupled to a computer.

FIG. 2 is a perspective view of an anti-theft/retrieval system inaccordance with one embodiment of the invention.

FIG. 3 is a block diagram of a computer network, having multiplereaders, for identifying lost or stolen goods, in accordance with oneembodiment of the invention.

FIG. 4 is a perspective view of a laptop computer having an RFID deviceembedded within its housing so as to transmit information related to thelaptop computer to a receiving device, in accordance with one embodimentof the invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

The invention is described in detail below with reference to thefigures, wherein like elements are referenced with like numeralsthroughout.

Referring to FIG. 2, an anti-theft/retrieval system 200 is illustrated.The system 200 includes a reader 202 coupled to a corridor 204 throughwhich a person 206 may walk. As shown in FIG. 2, the person 206 iscarrying a device 208 having a transmitter 210 embedded therein. Thetransmitter 210 transmits information related to the device 208 to thereader 202 when the transmitter 210 is within a defined distance fromthe reader 202. In this way the reader 202 detects the presence of thedevice 208 and is able to identify it.

In one embodiment, the corridor 204 may be a metal detector such asthose typically located in or near an airport terminal. Alternatively,the corridor 204 may be replaced by an x-ray machine, such as thosewhich are typically located next to a metal detector in an airport,which includes a conveyor belt for transporting items placed thereonunder an x-ray scanner.

By placing the RFID reader 202 near the metal detector and/or the x-raymachine of an airport checkpoint, the invention provides a securitymeasure against persons trying to board a plane with lost or stolenproperty. Alternatively, or as an additional security measure, a reader202 may be positioned near a baggage check-in point such that allbaggage being loaded into a plane may be screened for lost or stolendevices. Therefore, by placing readers 202 at strategic checkpoints,within an airport, for example, a radio frequency security net/retrievalsystem is established which can identify lost/stolen items and assistsecurity personnel stationed near each checkpoint in retrieving thelost/stolen devices. As used herein, the term “checkpoint” refers to anylocation or point in which people and/or items must pass in order tomove on to another location or point.

In the scenario described above, it may be preferable to utilize atransmitter 210, and/or reader 202 with a short transmission/receptionrange, e.g., six feet, so as to not read transmitters that are far awayfrom the reader 202. Since it is an object of the invention to identifya particular item which has been reported to be lost or stolen, it iscounter-productive to receive information from multiple transmitterslocated in different areas. In such a scenario, one could not be surewhich transmitter was transmitting information indicating the presenceof a lost or stolen item. In one embodiment, the transmitter 210 is apassive RFID tag.

Coupled to the reader 202 is a computer 212 which receives informationfrom the reader 202 and compares the information to a list of lostand/or stolen devices, stored in a database 214 coupled to the computer212. Upon comparing the information received from the transmitter 210 tothe list of lost and/or stolen devices, the computer 212 determines ifthere is a match. If there is a match, the computer 212 generates anappropriate alarm signal to notify personnel stationed near the locationof the reader 202 and corridor 204 of the status of the device 208 sothat appropriate action can be taken. As used herein, the term “list”refers to any format in which data, or information may be stored so asto be retrievable for purposes of review and/or analysis.

In one embodiment, the transmitter 210 may be a standard radio frequencyidentification (RFID) tag which is well-known in the industry. Inanother embodiment, the transmitter 210 is a MicroStamp® remoteintelligent communications (RIC) device, manufactured by MicronCommunications, Inc. Microstamp® is a registered trademark for a familyof RIC devices that use active and passive transmitters. However, RICdevices differ from traditional RFID devices in that RIC devicestypically have a battery, a microprocessor, a high-frequency radio, morememory and longer range capability when compared to standard RFIDdevices.

The MicroStamp® RIC device contains a MicroStamp Engine™ integratedcircuit (IC), which combines a direct sequence spread spectrum (DSSS)microwave frequency radio, a microcontroller, and a low power staticrandom access memory (SRAM) into a single chip. The MicroStamp EngineIC, when coupled with an antenna and a battery, forms the MicroStamp RICdevice. Because the IC combines hundreds of thousands of components onone small chip, the MicroStamp RIC device may be assembled, with a smallbattery, into very small packages, making it ideal for applications insmall handheld, or portable, electronic devices. Although RIC devicesare typically more advanced than standard RFID tags, as used herein, theterm “radio frequency identification,” or “RFID tag”, or “RFID device”,and any combination or conjugation thereof, refers to both standard RFIDdevices and RIC devices as described above, as well as any radiofrequency transmission device, capable of transmitting data foridentification purposes to a receiver.

In one embodiment, the reader 202 is a MicroStamp® 4000 RF Interrogator,manufactured by Micron Communications, Inc. The function of thisinterrogator 202 is twofold: 1) it receives commands and data from thecomputer 212 and sends data packets to the remote intelligentcommunications (RIC) unit 210, and 2) it receives reply packets from theRIC unit 210 and passes the reply back to the computer 212. When theinterrogator 202 receives a command from the computer 212, theinterrogator 202 either executes the command internally, or transmitsthe command to the RIC unit 210. The RIC unit 210 then executes thecommand, but may or may not reply, depending on the command's specificfunction. When the RIC unit 210 replies, the interrogator 202 passes thereply back to the computer 212. This communication protocol between theRIC unit 210, the interrogator 202 and the computer 212 is well-known inthe art.

In one embodiment, the computer 212 is directly connected to the reader202 by the communications link 216, which may be any type of electricalcable having a parallel or serial port connector for interfacing withthe external ports of the computer 212, such as an enhanced parallelport (EPP), RS-232, RS-422 or RS-485 communications line, for example.As mentioned above, the communications link 216 may be any type ofwell-known communications links, or medium, used for transmitting datafrom one device to another. In one embodiment. The computer 212 may belocated near the reader 202 such that security personnel can view adisplay screen (not shown) of the computer 212 as people pass throughthe corridor 204 to verify that each person passing through is notcarrying an item which has been reported to be lost or stolen. If aperson passing through the corridor 204 is carrying a lost or stolenitem, the computer 212 should identify the item and, thereafter notifysecurity personnel by displaying a message on its display screen orproviding a visual and/or auditory alarm signal.

Alternatively, the computer 212 may be a local computer 212, that is notlocated near any one reader 202 but, instead, has many readers 202coupled to it, each reader monitoring a different checkpoint. In thisscenario, each reader 202 at each checkpoint requires a means foralerting security personnel stationed at each of the checkpoints. Thisfunction can be performed in a number of different ways. For example, anoperator monitoring the local computer 212 can call, via telephone,intercom, radio, etc., security personnel located at a particularcheckpoint with instructions. Alternatively, the local computer 212 maysend an alarm signal to a device located near the particular checkpointwhich can provide a visual and/or auditory alarm signal to securitypersonnel stationed at the checkpoint.

As shown in FIG. 2, the anti-theft/retrieval system 200 may furtherinclude a central database 218 which is coupled to the local computer212 by a communications link 220. The communications link 220 may be anyone of various well-known communications links or mediums which can beused to transmit data from one device to another. As described infurther detail below, a primary function of the central database 218 isto store a master list of lost or stolen devices and periodically updatea local list of lost or stolen devices contained within the database 214of the local computer 212.

Referring to FIG. 3, the central database 218 (FIG. 2) may be a computerserver 218 which is connected via a computer network 300, to many localcomputers 212. Each local computer 212 may in turn be interfaced withone or more readers 202, each reader 202 being responsible formonitoring a specified area, or checkpoint, as described above. Anywell-known communications protocol, such as the Ethernet communicationsprotocol, may be used to transmit data between each of the multiplelocal computers 212 and the central server 218. The computer network 300may be a local area network (LAN), a wide area network (WAN), oralternatively, a part of the global computer information network,otherwise known as the internet.

In order to police for lost or stolen items, a system must beestablished to report and record lost and stolen items in an efficientand timely manner. For example, after an owner of an item has reportedthe item to be stolen, its serial number, or other identifyinginformation, should be promptly stored in the central database 218 andprovided to each of the local computers 212 to enable them to monitorfor the item within a relatively short time after it has been reportedto be lost or stolen. Therefore, in one embodiment, the database 214within the computer 212 is periodically updated with the latest list oflost or stolen goods from the central database 218. The frequency ofthese updates can be responsive to addition or deletion of an item fromthe master list stored in the central database 218, or alternatively,the update can occur at predetermined time intervals.

For example, when an owner of a laptop computer discovers that his orher laptop is lost or stolen, the owner can report the missing item to amanufacturer, dealer, or other authorized agent, who can then add thelost/stolen computer to the list of lost/stolen items in the centraldatabase 218. The authorized agent may then input the lost/stolencomputer's serial number into the central database 218. This serialnumber is the information, or at least part of the information, which istransmitted by the transmitter 210 (FIG. 2) which is contained in thelaptop computer. Additional information transmitted by the transmitter210 may be the name and address of the registered owner of the laptopcomputer, for example.

When a person carrying the lost/stolen laptop computer attempts to passthrough a checkpoint, represented by corridor 204 in FIG. 2, the reader202 receives the serial number transmitted by the transmitter 210 andforwards this serial number to the computer 212 for comparison with thelist of lost or stolen items. If there is a match, the computer 212generates an alarm signal which is communicated to proper authorities.

After a lost or stolen laptop computer has been retrieved, its serialnumber, or other identifying information should be removed from themaster list of lost or stolen devices. When local lists are updated bythe master list, the retrieved laptop computer will also be removed fromall local lists of lost or stolen devices.

For security reasons, the list of lost or stolen goods should only beaccessible by authorized personnel. In one embodiment, to add or deletean item from the list of lost or stolen items which is stored in thecentral database 218, a person must provide a password to verify andauthenticate his or her identity. Only after such a password is receivedand verified can that person obtain access to the central database 218.It is also contemplated that the owner of the laptop computer will beable to personally call a “hotline” telephone number that allows theowner to add the serial number of his or her lost laptop computer to themaster list of lost or stolen goods, after passing certain securitymeasures, such as entering a registered password, for example.

Referring to FIG. 4, a perspective view of a portable computer 400 isillustrated. The computer 400 includes a transmitter 210 located withinthe housing of the computer 400. As mentioned above, the transmitter 210may be an RFID tag, which is well-known in the art, or a MicroStamp RICunit, manufactured by Micron Communications, Inc. However, other typesof transmitters which are compact in size and capable of transmittinginformation at desired frequencies and ranges may be utilized inaccordance with the invention.

The transmitter 210 should be permanently attached to an internalportion of the computer 400 so as to not be easily accessible.Therefore, a thief would not be able to circumvent the security featuresprovided by the transmitter 210 by simply removing the transmitter 210.In one embodiment, the transmitter 210 is embedded in the housing of thecomputer 400 during its manufacture. Since typical radio frequencydevices are capable of transmitting and receiving data when encapsulatedby plastic, or other similar materials, encapsulating the transmitter210 within a portion of the housing of the computer 400, will notsignificantly degrade the performance of the transmitter 210. After thetransmitter 210 is programmed with a serial number, or other identifyinginformation, related to the computer 400, the transmitter 210 cantransmit this information. In one embodiment, this information may beprogrammed into the memory of the transmitter 210 by utilizing adesignated reader 202 (FIGS. 2 and 3) to transmit the information to thetransmitter 210 and store the information in a memory of the transmitter210. In one embodiment, for security purposes, the designated reader 202may be required to provide a password which allows it to write to thememory of the transmitter 210, or alternatively, the informationtransmitted by the reader 202 may be encrypted such that only thetransmitter 210 can read and store the information. Such methods ofprogramming RFID/RIC transmitters are well-known in the art. However,any well-known method of programming the transmitter 210 may be utilizedin accordance with the invention.

Once the identifying information has been stored in the memory of thetransmitter 210, it should be unalterable, except by authorizedpersonnel and/or the registered owner of the item containing thetransmitter 210. Any well-known method of ensuring the integrity of theinformation stored in the transmitter 210, such as password protectionand/or encryption schemes, may be utilized in accordance with theinvention.

As described above, the invention provides a method and system whichutilizes radio frequency technology to identify lost or stolen goodsthat randomly come within range of a reader capable of receivinginformation transmitted by a radio frequency transmitter permanentlyfixed within the lost or stolen goods. After identifying an item whichhas been reported to be lost or stolen, the method and system notifiesdesignated personnel, as necessary.

The invention may be embodied in other specific forms without departingfrom its spirit or essential characteristics. The described embodimentsare to be considered in all respects only as illustrative and notrestrictive. The scope of the invention is, therefore, indicated by theappended claims, rather than by the foregoing description. All changeswhich come within the meaning and range of equivalency of the claims areto be embraced within their scope.

1. (canceled)
 2. A method for identifying a lost or stolen radiofrequency (RF) device, the method comprising: receiving a report for alost or stolen RF device, said lost or stolen RF device having a uniqueidentifier associated therewith; causing the storing of informationassociated with the report in a secure database, the stored informationbeing useful for the comparison of a received unique identifier to theinformation stored in the secure database, the received uniqueidentifier obtained via the transmission of an interrogation signal byat least one reader to an RF device associated with the received uniqueidentifier; causing the determination that a received unique identifierby the at least one reader is associated with the lost or stolen device;and causing the notification of the lost or stolen device to personnelassociated with the operation of the at least one reader.
 3. The methodof claim 2, wherein the lost or stolen RF device comprises a passiveradio frequency identification (RFID) tag.
 4. The method of claim 3,wherein the received unique identifier is obtained in a public place. 5.The method of claim 4, wherein the public place has a checkpointassociated therewith.
 6. The method of claim 5, wherein the checkpointrefers to a location in which people and/or items must pass in order tomove on to another location.
 7. The method of claim 3, wherein thecausing the notification comprises sending an alarm signal to acomputing device associated with the at least one reader.
 8. The methodof claim 7, wherein the sending the alarm signal causes the display ofan indicator on a display screen.
 9. The method of claim 8, wherein thedisplay of the indicator on the display screen notifies personnel thatthe RF device associated with the unique identifier is lost or stolen.10. The method of claim 2, wherein the at least one reader is configuredso as to read unique identifiers from only one RF device at a time. 11.A system for identifying a lost or stolen radio frequency (RF) device,the system comprising: an interrogation device configured to transmit aninterrogation signal and in response thereto, receive one or morereplies from an RF device; a computing device in communication with theinterrogation device and configured to facilitate operation of theinterrogation device, the computing device further comprising a networkinterface in operative communication with a secure database via anetwork; wherein the computing device is further configured to: causethe interrogation device to transmit a first interrogation signal;receive information associated with one or more replies received from alost or stolen RF device in response to the transmitted firstinterrogation signal; transmit the received information to the securedatabase; receive a message from the secure database that the lost orstolen RF device is in fact lost or stolen; and cause the display of anotification to a display device that the lost or stolen RF device islost or stolen.
 12. The system of claim 11, wherein the lost or stolenRF device comprises a passive RFID tag.
 13. The system of claim 12,wherein the received information is obtained in a public place.
 14. Thesystem of claim 13, wherein the public place has a checkpoint associatedtherewith.
 15. The system of claim 14, wherein the checkpoint refers toa location in which people and/or items must pass in order to move on toanother location.
 16. The system of claim 15, wherein the notificationcomprises sending an alarm signal to the computing device associatedwith the interrogation device.
 17. The system of claim 16, wherein thealarm signal causes the display of an indicator on a display screen ofthe computing device.
 18. The system of claim 17, wherein the indicatoron the display screen notifies personnel that the RF device associatedwith the received information is lost or stolen.
 19. The system of claim18, wherein the interrogation device is configured so as to receiveinformation from only one RF device at a time.
 20. A method for locatinga lost or stolen device, the method comprising: receiving a report of alost or stolen device, the device having transmitter circuitry attachedthereto or therein; causing data associated with the report of the lostor stolen device to be stored into a secure database; causing thereceipt of a unique identifier via the transmission of an interrogationsignal; causing the authentication of the interrogation signal using thetransmitter circuitry of at least one detected device; and comparing thereceived unique identifier with the data stored in the secure databaseto locate the lost or stolen device.
 21. The method of claim 20,additionally comprising sending an alarm signal to a computing deviceassociated with the receipt of the unique identifier of the lost orstolen device.