1. Field of the Invention
The present invention is generally directed toward systems for securing and keeping track of personal possessions employing a security device attached to the object to be secured or tracked, a portable communication device including security device detection circuitry, location identification circuitry, and wireless communication circuitry.
2. Description of the Prior Art
The inadvertent loss or theft of valuable objects presents many problems not only for the owners of the objects, but also companies responsible for their loss and replacement. For example, the loss or theft and subsequent misuse of credit cards represents a significant problem for card issuers especially because of consumer protection laws limiting the liability of the card holder for improper charges. The credit card issuer becomes responsible for these unauthorized charges or must seek to recoup the loss from the retailer who inappropriately accepted payment. In short, such credit card misuses cost the industry millions, if not billions, of dollars annually.
Also, if owners of valuable property such as watches, jewelry, etc. could be assisted in locating items inadvertently lost, insurance companies could potentially avoid having to pay claims for these losses. Such a reduction in loss has the potential to save the industry millions of which at least a portion could be passed along to consumers.
Presently, there does not exist a simple or effective system for securing these every day objects. Therefore, there is a need for a security system for personal possessions that not only notifies the user of a loss, but also assists in locating or tracking down the item's whereabouts.
The present invention overcomes the above problems by providing a systems and methods for protecting personal possessions. In one embodiment, a system for protecting personal possessions is provided comprising a portable communication device having incorporated therein security device detection circuitry, location identification circuitry, and wireless communication circuitry; and a security device attached to an object and capable of being detected by the security device detection circuitry.
In another embodiment, a system for tracking personal possessions is provided comprising an RFID device attached to an object to be tracked; and a portable communication device including—an RFID reader, circuitry capable of determining the location of the communication device using either terrestrial or non-terrestrial signals, apparatus for wirelessly transmitting information about the object and the location of the communication device.
In yet another embodiment, a system for protecting personal possessions is provided comprising a credit card including an RFID device; and a portable communication device having incorporated therein an RFID reader capable of detecting the RFID device, location identification circuitry for determining the position of the portable communication device, and wireless communication circuitry for transmitting information about the credit card and the location of the communication device.
In a further embodiment, a method for protecting personal possessions is provided comprising providing an object including a security device; activating security device detection circuitry contained within a portable communication device for detecting the presence of the security device; and if the security device detection circuitry detects the security device, the portable communication device waits a predetermined length of time and attempts to detect the security device again, or, if said security device detection circuitry fails to detect the security device, location identification circuitry contained within the portable communication device determines the location of the communication device using either terrestrial or non-terrestrial signals.
In still another embodiment, a method for tracking personal possessions of a user is provided comprising: associating an object with an RFID device that is attached thereto; attempting to detect the RFID device using a portable communication device including an RFID interrogator; and if the RFID reader detects the RFID device, the portable communication device pauses for a predetermined time period and attempts to detect the RFID device again, or if the RFID reader does not detect the RFID device, the portable communication device determines its location using location identification circuitry contained within the portable communication device, and alerts the user of the detection failure and prompts the user to either confirm the detection failure or instruction the communication device to ignore said detection failure, if the user confirms the detection failure or fails to confirm or fails to instruct the communication device to ignore the detection failure, wireless communication circuitry contained within the portable communication device transmits data regarding the object and the location of the portable communication device at the time of detection failure to a central computer system.
In yet another embodiment, a method for protecting personal possessions is provided comprising providing a credit card including an RFID device; attempting to detect the RFID device using an RFID reader built in to a portable communication device; and if the RFID reader fails to detect the RFID device, location identification circuitry built in to the portable communication device determines the location of the portable communication device at the time of detection failure.
The following description sets forth exemplary and preferred embodiments according to the present invention. It is to be understood, however, that these examples are provided by way of illustration and nothing therein should be taken as a limitation upon the overall scope of the invention.
The present invention is directed toward a system for protecting personal possessions, particularly those that are readily susceptible to loss or theft. The object to be protected comprises a security device attached thereto. In
Credit card 2 includes an RFID device 4 therein. Credit card 2 is preferably formed by laminating RFID device 4 between two plastic sheets, however, it is not necessary for the device sought to be protected by the present invention to be formed with the security device therein. Any security device, such as an RFID tag, may be placed upon a pre-fabricated object at the owner's discretion. In such an embodiment, a user could purchase individual pressure sensitive RFID tags and apply them to objects that he or she would like to protect. The illustration of an RFID tag in
A communication device 6 is provided that includes security device detection circuitry for detecting the presence of the security device, namely, RFID device 4. As illustrated in
Radio waves 8 from the RFID reader contact RFID device 4 thereby causing RFID device 4 to transmit a responsive signal 10 back to the RFID reader. The RFID reader is preferably an RFID reader/writer presenting “writing” capabilities for uploading data to RFID device 4 input by the user. Such data input can include object identification information. For example, if the object to be protected was not initially fabricated with an RFID tag, but rather the RFID tag was placed on the deice by the user, the user could program the RFID tag with the name of the good on which it was placed (such as “watch” or “jewelry”). As explained below, associating particular RFID tags with the name of the object on which it is placed facilitates easy identification of the object by the user.
Conversely, the unique, pre-programmed identifier (generally an alpha-numeric code) may be associated with a particular good and stored in the memory of the communication device instead of uploading the object named to the RFID tag. In this particular embodiment, the RFID interrogator would initially obtain the unique identifier from the RFID tag and prompt the user to associate a brief description of the good with this identifier.
The system protects credit card 2 by maintaining periodic contact with RFID device 4 using the RFID reader housed in communication device 6. At preset intervals, the RFID reader broadcasts a signal 8 and, if credit card 2 is within the operational range of the interrogator, RFID device 4 picks up signal 8 and transmits a reply signal 10. Upon detecting reply signal 10, the RFID reader waits a predetermined period of time and broadcasts signal 8 again to determine whether card 2 is still within range. This cycle continues indefinitely or until the RFID reader does not receive a reply signal from RFID device 4.
RFID device 4 may also be connected with its own power source such as a “watch battery” or other small, light weight battery (not shown). This enables the RFID device to transmit signals under its own power rather than relying upon the power generated by the signals from the RFID reader. This also allows the RFID device to continuously “squawk” its unique identifier which can be picked up by the RFID reader. This enables the RFID reader to avoid having to periodically broadcast its own radio waves thereby conserving power of communication device 6.
As shown in
As explained further below, at some point following failure to detect RFID device 4, wireless communication circuitry housed within communication device 6 can be activated to transmit information about credit card 2 and the location determined by the location identification circuitry to a central computer or data gathering system via existing cellular communication networks or satellite. From this point on, actions may be taken such as automatically notifying the credit card issuer of the card's loss so that account activity may be temporarily frozen. Also, an email or other form of electronic communication may be sent to the user's email account notifying the user of the loss and location where the communication device failed to detect the card.
If the RFID device does not respond, the communication device records the time and location of the response failure 26. As noted above, location identification circuitry determines the position of the communication device by triangulation of terrestrial or non-terrestrial signals
Next, the communication device sends an audio and/or visual notification of the unresponsive RFID device to the user 28. This notification may comprise a “tone” or “beep” alerting the user that the object being protected is no longer within range of the communication device. Different sounds could be programmed by the user corresponding to different objects. Alternatively, or conjunctively, the screen of the communication device can display a message indicating which particular object is no longer in contact. In order to correctly identify the object for which contact has been lost, the communication device associates the unique RFID identifier with the corresponding label input by the user. For example, the user had previously programed the communication device that the object onto which RFID tag containing the identifier “11111111” is a watch. Upon failure to detect this particular RFID tag, the communication device may display a message such as “your watch is lost.”
The communication device then wirelessly transmits a notification to a central computer or data gathering system 30 that the object has been lost. Also contained within this communication may be information such as the user's identity, the location of the detection failure, and other information pertinent to the object. The central computer system can then notify the pertinent authority of the object's loss 32. The pertinent authority to be notified can vary depending upon the particular object. For example, if the object is a credit card, the pertinent authority would be the card's issuer, or if the object is a valuable jewelry item, law enforcement authorities or a private security company retained by the owner can be notified. Also, the central computer system can send an email 34 or other notification to the user alerting him or her of the loss in case he or she did not receive the alert from the communication device itself in step 28. Other operations are also possible at this point including notification of other responsible parties previously supplied by the user.
For example, the user may have set his wallet containing credit card 2 on top of a dresser in the bedroom of his house and then left the room to go to the kitchen. The card would no longer be in range of the RFID reader thereby prompting the communication device to issue a “non-responsive RFID” alert. The user, knowing that his credit card is secure, instructs the communication device to ignore the unresponsive RFID device. By allowing the user to override the automatic notification of the central computer system, wasteful “false alarms” are avoided. By the same token, the user also has the option of acknowledging the loss of the object bearing the RFID tag thereby initiating immediate notification of the central computer system of the loss 48. However, if the user does not input a response within a predetermined time period, the communication device proceeds with notification of the central computer system 50 which then notifies the relevant authority of the loss 52 and sends an email or other notification to the user's account 54.
If the RFID tag does not respond one is added to the counter thereby increasing the value of “n” 64. Next, the communication device analyzes whether “n” has exceeded a predetermined threshold that is either input by the user or programmed by the manufacturer of the communication device 66. If “n” is less than the threshold level, the system pauses 68 and begins the interrogation process again without resetting the counter to zero. The cycle of interrogating and comparing the value of “n” to the preset threshold continues until the value of “n” has exceeded the threshold. Once “n” is no longer less than the threshold, the communication device records the time and position at which the threshold was exceeded 70. The rest of the process (steps 72-78) proceeds in substantially similar manner to steps 28-34 of
The system illustrated in
Another advantage of this system is that it also acts to protect the communication device from loss. The audible warning generated once contact is lost between the communication device and RFID device may alert a user that he or she has just walked away from their communication device (PDA, cellular phone) or that it has been removed from her or her person. Thus, the present system also assists in loss prevention of the communication device.
Of course, it is certainly within the scope of the present invention to combine various features of
Also contemplated within the scope of the present invention is the retrofitting of existing battery-powered (i.e., portable electronic) devices with circuitry for carrying out the aforementioned functions. For example, the battery pack of the device could be configured to contain at least one of the security device detection circuitry, location identification circuitry, wireless communication circuitry, or any combination thereof. The battery also contains an interface to the battery-powered device thereby enabling the battery-powered device controls to operate the circuitry contained within the battery. The only action required by the user to retrofit the battery-powered device to operate according to the present invention would be to purchase a replacement battery containing the necessary add-on circuitry which would be pre-programmed with the requisite software to enable operation with the battery-powered device.
In the context of a cellular phone, the replacement battery would contain security device detection circuitry and location identification circuitry (if not all ready enabled by the particular cellular phone). If the battery-powered device were an MP3 player, the replacement battery would contain security device detection circuitry, location identification circuitry, and wireless communication circuitry. Once the battery is installed, the user can easily activate the wireless communication circuitry with an wireless communications provider.
The replacement battery may also be supplied with software for upgrading the battery-powered device so as to allow the device to function as a part of a personal possessions security system as described herein. Such software would be uploaded to the battery-powered device upon installation of the replacement battery. Also, such software may be downloaded by the wireless communication circuitry and installed on the battery-powered device. In one such embodiment, the replacement battery contains basic software for initiating a remote download of the full software update that allows the electronic device to function in accordance with the present invention. For example, a cellular phone replacement battery may contain software instructing the cellular phone to wirelessly access, download, and install software upgrading or replacing the cellular phone's factory programmed software. Once installed, the new software enables the cellular phone to function as an integral part of the personal possessions security system.