Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Protection Of Personal Property Via Radio Frequence Identifiers.

IP.com Disclosure Number: IPCOM000028146D
Original Publication Date: 2004-Apr-28
Included in the Prior Art Database: 2004-Apr-28
Document File: 1 page(s) / 50K

Publishing Venue

IBM

Abstract

Personal security system using twin RFID tags

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 1

Protection Of Personal Property Via Radio Frequence Identifiers .

Theft of laptops at an airport while going through the security checkpoints and x-ray machines is a reoccurring problem for anyone flying with a laptop. Disclosed is a system of devices that work together to avoid theft of personal belongings at any location where a person travels through a security checkpoint.

Devices:

· Primary RFID with tag to be worn on a person. A keychain or a smart card to go in a wallet are some examples
· Secondary RFID tags to be placed on any belongings that could be lost or stolen
· RFID tag reader with the ability to read a primary tag's information, any number of secondary tags' information,

and perform a calculation that determines if the tags agree

   The solution to prevent theft of personal items is that a person carries the Primary tag on themselves, and places the secondary tags on their belongings. When the person then goes through a security checkpoint enabled with an RFID tag reader, the tag reader will read codes from the secondary RFID tags in the person's belongings and then check to see that the person is carrying a matching RFID tag. If a secondary RFID tag is read without a complementary primary RFID tag an alarm will sound. A thief will not have the primary RFID tag; they will sound the alarm by walking through the tag reader with someone else's belongings and be thwarted.

1