Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
A SYSTEM AND METHOD OF TRACKING AND MONITORING OF VALUABLE ARTICLES
Document Type and Number:
WIPO Patent Application WO/2018/104880
Kind Code:
A1
Abstract:
A system for tracking and monitoring of valuable articles includes a plurality of wireless electronic tags having unique identifiers, including at least one person tag (102) which is configured to be worn on or carried by a person (100) and at least one article tag (112.1, 112.2, 112.3) which is configured to be attached to an article (110.1, 110.2, 110.3). The system includes at least one wireless tag reader (224) at a location or travel path where the person (100) and the article (1 1 0.1, 110.2, 110.3) are to be tracked to read the identifier of the tags (1121, 112.2, 112.3), and a tag database (204) configured to store details of the tags (112.1, 112.2, 112.3) including the unique identifier of each tag. The system includes an association module (312) to create and store in the tag database (204) an association between tags (1121, 112.2, 112.3), a monitoring module (314) configured to receive tag readings and store them in the tag database (204) and an alert module (316) including to raise an alert if a person tag and its associated article tag are not proximate each other.

Inventors:
ESPACH HERMANUS (ZA)
NEL MARIO (ZA)
Application Number:
PCT/IB2017/057686
Publication Date:
June 14, 2018
Filing Date:
December 06, 2017
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ESPACH HERMANUS JOHANNES (ZA)
NEL MARIO (ZA)
International Classes:
G08B13/14; G08B21/02
Domestic Patent References:
WO2006014743A22006-02-09
WO2006135134A12006-12-21
Foreign References:
US20120242481A12012-09-27
DE102008031635A12010-01-21
US20040124982A12004-07-01
US20140002239A12014-01-02
JP2008234115A2008-10-02
DE102005012933B32006-10-26
JP2014096043A2014-05-22
JP2007254129A2007-10-04
US20100039259A12010-02-18
Attorney, Agent or Firm:
DAVIES, James, Hasely (ZA)
Download PDF:
Claims:
CLAIMS

1. A system for tracking and monitoring of valuable articles, the system including: a plurality of wireless electronic tags, each electronic tag having a unique identifier, the plurality of electronic tags including:

at least one person tag which is configured to be worn on or carried by a person and which is configured to identify the person; and at least one article tag which is configured to be attached to an article and which is configured to identify the article;

at least one wireless tag reader at a location or travel path where the person and the article are to be tracked, the wireless tag reader configured to read the identifier of the person tag and/or the article tag when they are within range of the wireless tag reader;

a tag database configured to store details of the person tag and the article tag, the details at least including the unique identifier of each tag; an association module communicatively coupled to the tag database and being configured to create and store in the tag database an association or relationship status between the person tag and the article tag; a monitoring module, communicatively coupled to the wireless tag reader, configured to receive tag readings from the wireless tag reader and to track and store details of the readings in the tag database; and

an alert module including alert criteria with at least one alert criterion being that a person tag and its associated article tag are not proximate each other, the alert module being configured to query the tag database to obtain details of the person tag and the article tag and to compare them to the tag readings from the tag reader, and to raise an alert in response to one of the alert criteria being violated.

2. The system as claimed in claim 1 , in which:

the person tag and/or the article tag include RFID tags; and the tag reader is an RFID reader or interrogator.

3. The system as claimed in any one of claims 1 -2, in which there are a plurality of wireless tag readers spaced along a travel path of the person or at check-out or destination points.

4. The system as claimed in any one of claims 1 -3, in which the person tag is configured to be worn by the person and includes an attachment arrangement configured to be attached to a body part of the person.

5. The system as claimed in claim 4, in which the attachment arrangement is in the form of a wristband or bracelet including a clasp.

6. The system as claimed in claim 5, in which the clasp includes a magnetic lock and is only openable with a magnetic key.

7. The system as claimed in any one of claims 1 -6, in which the person tag and/or the article tag include descriptors of the person and/or of the article.

8. The system as claimed in any one of claims 1 -7, in which the article tag includes a lockable loop which can be secured around part of an article.

9. The system as claimed in claim 8, in which the article is a container or case and the article tag is attachable to a handle of the container.

10. The system as claimed in any one of claims 8-9, in which the lockable loop of the article tag includes a magnetic lock which is openable with a magnetic key.

11. The system as claimed in any one of claims 1 -1 0, in which the tag database is remote from the wireless tag readers.

12. The system as claimed in claim 1 1 , in which the tag database is hosted by a computer server and communicatively coupled to the wireless tag readers by a telecommunications network.

13. The system as claimed in any one of claims 1 -12, in which the alert criteria additionally includes one or more of:

the person tag being proximate to an article tag not associated with the person tag;

the person tag being worn or carried by a person which does not match a descriptor of the person as stored in the tag database;

the article tag being proximate to a person tag not associated with the article tag;

the article tag being attached to an article which does not match the descriptor of the article as stored in the tag database;

the person tag and/or the article tag being flagged as suspicious; and/or a person tag and/or an article tag being at a location where they are not supposed to be.

14. The system as claimed in any one of claims 1 -13, in which the association module provides a user interface to an operator via which the operator may input details of at least one person tag and at least one article tag to be associated with each other.

15. The system as claimed in claim 14, in which the association module is operable to receive an input from a scanner operated by the operator in order to identify each of the tags and is configured to communicate the operator input indicative of the tag association to the tag database.

16. The system as claimed in any one of claims 1 -15, in which there are plural person tag to article tag associations or relationships.

17. The system as claimed in any one of claims 1 -16, in which the alert module is configured to trigger an alert device.

18. The system as claimed in any one of claims 1 -17, in which the alert module is operable to raise the alert in one or more of the following ways:

an audible alert;

a visual alert; and/or

a message alert.

19. The system as claimed in any one of claims 1 -18, in which:

the alert module is configured to provide an input arrangement or a user interface, via which at least one descriptor of the person tag and/or the article tag may be inputted; and

the alert module is operable to receive the descriptor input and to compare it against the descriptor in the tag database and, if there is a mismatch, raise an alert.

20. A method for tracking and security of valuable articles, the method including:

providing a plurality of wireless electronic tags, each electronic tag having a unique identifier, the plurality of electronic tags including:

at least one person tag which is configured to be worn on or carried by a person and which is configured to identify the person; and at least one article tag which is configured to be attached to an article and which is configured to identify the article; providing a plurality of wireless tag readers spaced around a location or travel path where the person and the article are to be tracked, each wireless tag reader configured to read the identifier of the person tag and/or the article tag when they are within range of one of the wireless tag readers; storing, in a tag database, details of the person tag and the article tag, the details at least including the unique identifier of each tag;

creating, by an association module communicatively coupled to the tag database, an association between the person tag and the article tag and storing the association in the tag database;

receiving, by a monitoring module communicatively coupled to the wireless tag readers, tag readings from the wireless tag readers;

storing details of the readings in the tag database; and

raising an alert, by an alert module including alert criteria with at least one alert criterion being that a person tag and its associated article tag are not proximate each other, wherein raising the alert comprises:

querying the tag database to obtain details of the person tag and the article tag;

comparing the details of the person tag and the article tag to the tag readings from the tag reader and raising the alert in response to one of the alert criteria being violated.

A non-transitory computer-readable medium having stored thereon a computer program which, when executed on a computer, causes the computer to perform the method as claimed in claim 20.

Description:
A system and method of tracking and monitoring of valuable articles

FIELD OF INVENTION This invention relates to tracking and monitoring of valuable articles (cargo) relative to a person, and it relates more specifically to a system and method, using wireless tags, of associating articles with a person and then tracking the articles relative to the person (e.g., at airports, harbours, stations or destinations).

BACKGROUND OF INVENTION The Applicants have noted that lost or stolen baggage and cargo at airports and harbours is problematic. This may occur accidentally, through mismanagement or careless staff, or intentionally if a thief obtains access to luggage or cargo. Also, in the present age of terrorist activities, every effort should be made to unite an owner with their luggage/cargo so that suspicious bags/cargo are not left unattended.

The Applicants desire a system and method of tracking and monitoring luggage and Cargo. However, many of the aspects of this system may find application in other fields and not just air travel, e.g., couriers of goods, freight - by land and sea, transport of valuables, etc. It is an aim of the invention to create an association between a person and articles belonging to that person, and to track this association along the journey, especially when a portion of the journey requires that the person and the articles are separated.

SUMMARY OF INVENTION

The invention provides a system for tracking and monitoring of valuable articles, the system including: a plurality of wireless electronic tags, each electronic tag having a unique identifier, the plurality of electronic tags including:

at least one person tag which is configured to be worn on or carried by a person and which is configured to identify the person; and

at least one article tag which is configured to be attached to an article and which is configured to identify the article;

at least one wireless tag reader at a location or travel path where the person and the article are to be tracked, the wireless tag reader configured to read the identifier of the person tag and/or the article tag when they are within range of the wireless tag reader;

a tag database configured to store details of the person tag and the article tag, the details at least including the unique identifier of each tag;

an association module communicatively coupled to the tag database and being configured to create and store in the tag database an association or relationship status between the person tag and the article tag;

a monitoring module, communicatively coupled to the wireless tag reader, configured to receive tag readings from the wireless tag reader and to track and store details of the readings in the tag database; and

an alert module including alert criteria with at least one alert criterion being that a person tag and its associated article tag are not proximate each other, the alert module being configured to query the tag database to obtain details of the person tag and the article tag and to compare them to the tag readings from the tag reader, and to raise an alert in response to one of the alert criteria being violated.

The person tag and/or the article tag (collectively referred to as the tags) may include RFID tags (e.g., passive RFID tags). In such case, the tag reader may be an RFID reader or interrogator.

There may be a plurality of wireless tag readers spaced along a travel path of the person or at check-out or destination points. The person tag may be configured to be worn by the person. The person tag may include an attachment arrangement configured to be attached to a body part of the person. The attachment arrangement may be in the form of a wristband or bracelet. The attachment arrangement may include a clasp. The clasp may include a magnetic lock and may be openable only with a special tool, e.g., a magnetic key with a unique code.

In addition to the unique identifier of the tags, the details may include descriptors of the person and/or of the article. A descriptor of the person may include a name, details of a journey (e.g., source, destination) of the person, etc. A descriptor of the article may include a weight, a nature of the article (e.g., fragile, over-size, etc.).

The article tag may include a lockable loop which can be secured around part of an article. The article may be a valuable article or the article may be a container or case (e.g., a suitcase) containing valuables. The article tag may be attachable to a handle of the container, e.g., like airline tags are currently looped around suitcase handles. Again, the lockable loop of the article tag may include a magnetic lock which is openable only with a special tool, e.g., a magnetic key.

Some or all of the wireless tag readers may be provided by a Threshold Antenna by Impinj (htlp^www.impinj.com/products/readers/speedwav-antennas/, accessed 21 September 2016).

The tag database may be remote from the wireless tag readers. The tag database may be hosted by a computer server and communicatively coupled to the wireless tag readers by a telecommunications network which may include the internet.

The alert criteria may additionally include one or more of: the person tag being proximate to an article tag not associated with the person tag;

the person tag being worn or carried by a person which does not match the descriptor of the person as stored in the tag database;

the article tag being proximate to a person tag not associated with the article tag; the article tag being attached to an article which does not match the descriptor of the article as stored in the tag database;

the person tag and/or the article tag being flagged as suspicious; and/or a person tag and/or an article tag being at a location where they are not supposed to be.

The association module may provide a user interface to an operator via which the operator may input details of at least one person tag and at least one article tag to be associated with each other. The association module may be operable to receive an input from a scanner operated by the operator in order to identify each of the tags. For example, the operator may wield a handheld RFID or barcode scanner to scan each of the tags and then enter a user input via the user interface to link or associate the tags. The association module may then communicate the operator input indicative of the tag association to the tag database.

There may be plural or various person tag to article tag associations or relationships. For example, one person tag may be associated with only one article tag. One person tag may be associated with plural article tags (e.g., when a traveller is travelling with plural luggage articles). A person tag may be associated with another person tag (e.g., when a parent is travelling with a child). Plural person tags may be associated with plural article tags (e.g., when a group with common luggage is travelling together). There may be various other tag relationships, as may suit the circumstances of use of the tags. The alert module may be able to trigger an alert device. The alert module may be operable to raise the alert in one or more of the following ways:

an audible alert (e.g., a siren);

a visual alert (e.g., a red light);

a message alert (e.g., a message sent to security personnel).

The alert module may be configured to provide an input arrangement or a user interface, via which at least one descriptor of the person tag and/or the article tag may be inputted. The alert module may be operable to receive the descriptor input and to compare it against the descriptor in the tag database and, if there is a mismatch, raise an alert. For example, if the article was described as weighting 10 kg when beginning a journey, and only 6 kg upon arriving at its destination, it may indicate tampering/theft and warrant further investigation.

The invention extends to a method for tracking and security of valuable articles, the method including:

providing a plurality of wireless electronic tags, each electronic tag having a unique identifier, the plurality of electronic tags including:

at least one person tag which is configured to be worn on or carried by a person and which is configured to identify the person; and

at least one article tag which is configured to be attached to an article and which is configured to identify the article;

providing a plurality of wireless tag readers spaced around a location or travel path where the person and the article are to be tracked, each wireless tag reader configured to read the identifier of the person tag and/or the article tag when they are within range of one of the wireless tag readers;

storing, in a tag database, details of the person tag and the article tag, the details at least including the unique identifier of each tag; creating, by an association module communicatively coupled to the tag database, an association between the person tag and the article tag and storing the association in the tag database;

receiving, by a monitoring module communicatively coupled to the wireless tag readers, tag readings from the wireless tag readers;

storing details of the readings in the tag database; and

raising an alert, by an alert module including alert criteria with at least one alert criterion being that a person tag and its associated article tag are not proximate each other, wherein raising the alert comprises:

querying the tag database to obtain details of the person tag and the article tag;

comparing the details of the person tag and the article tag to the tag readings from the tag reader and raising the alert in response to one of the alert criteria being violated.

The invention extends to a non-transitory computer-readable medium having stored thereon a computer program which, when executed on a computer, causes the computer to perform the method defined above.

BRIEF DESCRIPTION OF DRAWINGS The invention will now be further described, by way of example, with reference to the accompanying diagrammatic drawings.

In the drawings:

FIG. 1 shows a schematic view of a series of wireless tags;

FIG. 2 shows a schematic view of a network topology of a system for tracking and monitoring of valuable articles, in accordance with the invention, using the tags of FIG. 1 ; FIG. 3 shows a schematic view of a tag server forming part of the system of FIG. 2;

FIG. 4 shows a flow diagram of a setup portion of a method for tracking and monitoring of valuable articles, in accordance with the invention;

FIG. 5 shows a flow diagram of a check-in portion of the method of FIG. 4;

FIG. 6 shows a flow diagram of a check-out portion of the method of FIG. 4; and

FIG. 7 shows a schematic view of a computer within which a set of instructions, for causing the computer to perform any one or more of the methodologies described herein, may be executed.

DETAILED DESCRIPTION OF EXAMPLE EMBODIMENT

The following description of the invention is provided as an enabling teaching of the invention. Those skilled in the relevant art will recognise that many changes can be made to the embodiment described, while still attaining the beneficial results of the present invention. It will also be apparent that some of the desired benefits of the present invention can be attained by selecting some of the features of the present invention without utilising other features. Accordingly, those skilled in the art will recognise that modifications and adaptations to the present invention are possible and can even be desirable in certain circumstances, and are a part of the present invention. Thus, the following description is provided as illustrative of the principles of the present invention and not a limitation thereof.

This example is described with reference to air travel. It will be appreciated by one skilled in the art that this is not the only use of the invention, and there may be many other uses, e.g., courier services, events or functions, general logistics, etc.

In this example, and with reference to FIG. 1 , a person 100 is an airline passenger who will be travelling by aeroplane from one place (a journey source) to another place (a journey destination). During his journey, he will be travelling with a plurality of articles 1 1 0.1 -1 1 0.3 (collectively referenced by numeral 1 10) in the form of items of luggage. As is typical in air travel, most luggage, and certainly the larger items, is checked into the cargo hold and thus separated from the person 1 00 for most of the journey. The luggage 1 10 is usually reclaimed by the person 100 at the end of the journey at the destination.

In accordance with the invention, the person 100 has a person tag 102 associated with him (or her). The person tag 102 is a wireless electronic tag and is worn by the person 100. In this example, the person tag 102 embodies a wristband with a magnetic clasp which is only openable with a special magnetic key. Accordingly, once the person tag 102 has been placed around the person's wrist, it cannot readily be removed with the key. The person tag 1 02 is intended to be reusable.

Each luggage item 1 10 has an article tag 1 1 2.1 -1 1 2.3 (collectively referenced by numeral 1 12 and further referred to in this example as luggage tags 1 12) associated therewith. The luggage tags 1 1 2 are also wireless electronic tags (e.g., RFID tags) and are configured to be attached to the luggage 1 1 2 around a handle or like structure using a loop of the tag 1 12 which also has a magnetic lock which cannot easily be opened without the magnetic key.

Each tag 102, 1 12 has a unique identifier (e.g., a serial number or code) non-removably embedded therein or programmed thereon. Accordingly, each tag 102, 1 12 serves to identify the person 100 or luggage 1 10 to which it is attached (more on this below).

The tags 1 02, 1 1 2 are configured for use in a system 200 for tracking and security of valuable articles (that is, the luggage items 1 10, in this example). FIG. 2 illustrates a network topology of the system 200. The system 200 (in this example) comprises three main nodes: a tag server 202, a check-in counter 220, and a check-out area 230.

The tag server 202 is a computer server which is hosted in a virtual or cloud environment. It is coupled to a tag database 204. The tag server 202 is linked to a telecommunications network 21 0 (e.g., the internet) via which it can communicate with the other nodes, i.e., the check-in counter 220 and check-out area 230. The tag server 202 is responsible for much of the functionality and intelligence of the system 200 (refer to FIG. 3 for more detail) and for the operation of a method in accordance with the invention (see FIG. 4). The tag server 202 and tag database 204 are hosted remotely from the airport, typically at a datacentre. The geographical location of the server 202 is not material to the functionality of the system 200 due to the connectivity provided by the telecommunications network 210.

The check-in counter 120 is a client node of the tag server 202 and comprises a computer terminal 222 and a tag reader 224. The function of the check-in counter is to form an association or link between the person tag 102 and the luggage tags 1 12 and optionally also to capture further details like descriptors of the person 1 00 and the luggage 1 10. The computer terminal 222 merely serves as a user interface, providing a display and an input arrangement for entering or viewing information, but the association functionality is actually provided by the tag server 202.

Similarly, the check-out area 230 is also a client node of the tag server 202 and comprises a wide-area tag reader in the form of a threshold antenna 232. Adjacent the tag reader is an alert device 234, e.g., a red light and a siren, operable to raise an alert in the event that any alert conditions are triggered. Optionally, an input arrangement 238 for use by an operator can be provided. The operator will usually also have a magnetic key 240, to release the tags 102, 1 1 2 from the person 1 00 and his luggage 1 1 0. The tag reader (comprising the threshold antenna 232), the alert device 234 and the input arrangement 238 are all networked to, and controlled by, the tag server 202.

Although only one check-in counter 220 and check-out area 230 are illustrated, it is to be appreciated that there may be a multitude of each of these at any given airport. Further, such check-in counters 220 and check-out areas 230 are preferably installed at various airports, and each check-in counter 220 and check-out area 230 at each airport is networked to the tag server 202. In this setup, a travel path of the tags 1 02, 1 1 2 and accordingly of the person 100 and his belongings 1 10 can be tracked and monitored.

FIG. 3 shows a schematic view of the tag server 202 and illustrates much of the functionality which it provides. The tag server 202 has a computer processor 302 and a computer-readable medium 304 which has stored thereon a computer program 310 to direct the operation of the processor 302. The processor 302 comprises three modules, namely an association module 312, a monitoring module 314, and an alert module 316. The modules 312-316 are conceptual modules corresponding to functional tasks performed by the processor 302. It is to be understood that the processor 302 and/or the modules 312-316 may be one or more microprocessors, controllers, Digital Signal Processors (DSPs), or any other suitable computing device, resource, hardware, software, or embedded logic. Further, the modules 312-316 may be consolidated at a single node (as illustrated) or distributed or network across various nodes (not illustrated).

The association module 312 is linked to the check-in counter 220 and is configured to direct the operation of the computer terminal 222 in order to create a link or association between the tags 1 02, 1 1 2. The association module 31 2 receives readings of the tags 102, 1 12 to be linked from the tag reader 224, and optionally descriptors of the person 100 and/or luggage 1 10, together with an inputted command from the check-in operator to associates the tags 1 02, 1 1 2. Details of this are stored in the tag database 204.

The monitoring module 314 is configured to receive and log readings from all tag readers along the path of the tags 102, 1 12, and particularly from the threshold antenna 232 provided at the check-out area. The monitoring module 314 logs the time and date of the reading, as well as the location of the reader 232, in order to generate a journey trail for each tag 102, 1 12 which passes within reading distance of any tag reader 232. The monitoring module 314 is communicatively coupled to all of the tag readers 232 via the telecommunications network 210. The alert module 316 is configured to compare details of the readings of the tags 1 02, 1 1 2 as stored in the tag database 204 against tag alert criteria 318 and, in response to an alert criterion being violated, raise an alert or alarm. The alert criteria 318 are carefully defined and relate to the presence of absence of associated tags 1 02, 1 12 relative to each other. The alert module 31 6 is communicatively coupled, via the telecommunications network 21 0, to the alert device 234 which it triggers in response to the alert criteria 318 being violated.

The invention will now be described in use with reference to method 400-600 of FIGS 4-6. FIG. 4 illustrates a setup portion 400 of the method. Each location, that is, each airport, is outfitted with the requisite equipment. Each check-in counter 220 is provided with a computer terminal 222 and a tag reader 224 for the purposes of checking in the person 1 00 and initiating the associations between the provided tags 102, 1 12. An operator, e.g., an airline employee, operates the computer terminal 222 and is provided (at block 402) with a cache or supply of suitable tags 102, 1 12. Similarly, the tag reader comprising the threshold antenna 232 is outfitted (at block 404) at each exit or checkout area 230.

Importantly, the alert criteria 318 are predefined (at block 406) by a system administrator. In this example, there is a primary single alert criterion 318: the person tag 102 must check-out with each and every one of its associated luggage tags 1 12 at the check-out area 230. There is also a secondary alert criterion in this example: a measured weight of each luggage item 1 1 0 must match both at check-in and at checkout.

Once the system 200 has been setup, it may be used to track and monitor the articles 1 1 0. The person 100 is an airline passenger with a booked flight from a source to a destination. He arrives at the check-in counter 220 to check in himself and his three pieces of luggage 1 10. The check-in operator retrieves four tags from his cache: one person tag 102 and three luggage tags 1 12. The association module 312 of the tag server 202 causes the computer terminal 222 to display a user interface via which the operator enters information. The operator uses the computer terminal 222 to input that the person 1 00 is checking in and a new tag association should be created.

The operator reads (at block 502) each of the four tags 102, 1 12 with the tag reader 224. More specifically, the tag reader 224 interrogates the tag 102, 1 12 and obtains each of their unique identifiers (referred to as IDs). The operator assists the person 100 in attaching the person tag 102 around his wrist and attaches the luggage tags 1 1 2 to the luggage 1 10. The operator also records the weight of each item of luggage 1 1 0 and enters it into the computer terminal 222. A flight itinerary of the person 100 may also be captured. The operator confirms the details by inputting a confirmation (at block 504). The computer terminal 222 sends (at block 506) the received information, including the tag IDs, via the association module 31 2 which stores (at block 508) the association on the tag database 204, together with the other descriptors including luggage weight, in the form of a tag record 330.1 . A separate tag record 330. m is created for each set of tag associations (e.g., each person and their linked luggage). The details and association of the tags 1 02, 1 1 2 are then securely stored and remotely accessible on the tag database 204 by any authorised terminal, even at another airport in another country.

The person 1 00 is then free to continue his journey. He may be separated from his luggage 1 10 if it is being checked-in to the cargo hold of the aeroplane. This is common practice. When his plane arrives at his destination and he disembarks, he proceeds to a conventional baggage carousel to collect his suitcases 1 10. He collects his suitcases 1 10 and carries or wheels them to the check-out area 230. The threshold antenna 232 continuously scans for proximate electronic tags. When the person 100 and the luggage 1 10 are proximate (that is, within scan range), the threshold antenna 232 automatically reads (at block 602) the tag ID of each of the person tag 102 and the luggage tags 1 12. The tag reader (including the threshold antenna 232), under the control of the monitoring module 314, sends the readings, including the tag IDs, to the tag server 202 which correspondingly receives (at block 604) the readings and stores (at block 606) them in the tag database 204. The alert module 31 6 periodically or constantly monitors (at block 608) the tag readings against the initial tag record 330.1 and the alert criteria 31 8 to check that the person tag 102 is still proximate the linked luggage tags 1 12, which is indicative that the person 100 still has all of his items of luggage 1 10. If all is well and the alert criteria 318 are not violated, no alert is raised. A check-out operator can release the tags 1 02, 1 12 using his magnetic key 240. As the tags 102, 1 12 are re-usable, he collects them and places them in a container for re-use later. He may flag the tags, using his input arrangement 238, as "journey competed" so that tag record 330.1 can be updated and closed. Data on the tags 102, 1 12 themselves is usually not edited, but their unique identifiers are merely made available for reuse. In a different embodiment, the tags may be disposable and are then merely discarded.

As an optional extra feature, there may be a weigh-station at the check-out area where the person 100 can weigh his bags 1 10 and an operator can enter the weight using the input arrangement 238 which sends it to the tag server 202. The alert module 316 can compare this later measured weight against the earlier measured weight at the check- in counter 220 to ensure that they match. If the weights do not match, this may be evident of theft or tampering and the alert module 316 sends an alert message to the alert device 234 to trigger a minor alert. The operator at the check-out area could also have a communication device (e.g., coupled to the input arrangement 238) configured to receive alert messages, e.g., "Bag 1 1 0.2 weighed 1 1 .8 kg at check in but only 8.0 kg at check out. Possible tampering." The operator can then converse with the person 100 to resolve the issue.

If, however, the person tag 102 and the luggage tags 1 12 do not match, the alert module 316 sends (at block 61 0) an alert message to trigger the alert device 234 to raise the alarm (and the alert message may also be sent to the communication device of the check-out operator). Given the example alert criteria 318, there are two primary scenarios which would cause an alert to be raised. The first scenario is that the person 100 is missing some of his luggage 1 10. For example, if the person 1 00 (identified by the person tag 102) only had two of his suitcases 1 1 0.1 , 1 1 0.2 (as identified by the luggage tags 1 12.1 , 1 12.2), then this indicates that the bag 1 10.3 (with luggage tag 1 1 2.3) is missing. He may have forgotten about this bag 1 10.3 or may have taken somebody else's bag having a similar appearance.

The alert device 234 will automatically alert the person 100 and the check-out operator to this fact. This would remind the person in case he merely forgot his bag 1 10.3. However, if there was a more nefarious reason, e.g., sabotage or terrorism, and the person 100 had no explanation for his missing bag, the check-out operator could alert airport security. There could well be an innocent explanation for the missing bag, e.g., the person 100 gave it to his wife and they have become separated. He may be requested to remain while his wife arrives so that he can leave with all his bags.

The second scenario is that one of the items of luggage 1 10.3 is at the check-out area 230 without its owner 1 00. This may indicate that someone is trying to steal the bag 1 1 0.3, or perhaps has taken it accidentally. The alert device 234 sounds an alarm (e.g., red flashing light and siren) to alert the check-out operator to this bag 1 1 0.3 without its owner 1 00. There could be a reasonable explanation for this, e.g., the person's wife is wheeling the bag 1 10.3 out and she is some distance ahead of the person 100 so the person tag 102 and the luggage tag 1 12.3 are separate. However, if there is not a reasonable explanation, the check-out operator may alert airport security to investigate further.

There are naturally various other alert criteria which could be defined, depending on the nature of monitoring and tracking required. Also, threshold antennas 232 need not be installed only at check-out areas, but could be installed at intermediate areas, e.g., walkways and cargo holds, to monitor the wireless tags 1 02, 1 1 2 separately along their journey prior to exit.

FIG. 7 shows a diagrammatic representation of a computer 700 within which a set of instructions, for causing the computer 700 to perform any one or more of the methodologies described herein, may be executed. In a networked deployment, the computer 700 may operate in the capacity of a server or a client machine in server- client network environment, or as a peer machine in a peer-to-peer (or distributed) network environment. The computer 700 may be a personal computer (PC), a tablet PC, a set-top box (STB), a personal digital assistant (PDA), a cellular telephone, a web appliance, a network router, switch or bridge, or any computer 700 capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that computer 700. Further, while only a single computer 700 is illustrated, the term "computer" shall also be taken to include any collection of computers that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.

The example computer 700 includes a processor 702 (e.g., a central processing unit (CPU), a graphics processing unit (GPU) or both, a main memory 704 and a static memory 706, which communicate with each other via a bus 708. The computer 700 may further include a video display unit 710 (e.g., a display screen)). The computer 700 also includes an alphanumeric input device 71 2 (e.g., a keyboard), a graphical user interface (GUI) navigation device 714 (e.g., a mouse), a tactile input device (e.g., a touchscreen), a disk drive unit 71 6, a signal generation device 718 (e.g., a speaker) and a network interface device 720.

The disk drive unit 71 6 includes a computer-readable medium 722 on which is stored one or more sets of instructions and data structures (e.g., software 724) embodying or utilised by any one or more of the methodologies or functions described herein. The software 724 may also reside, completely or at least partially, within the main memory 704 and/or within the processor 702 during execution thereof by the computer system 700 and/or within the static memory 706, the main memory 704, the static memory 706, and the processor 702 also constituting computer-readable media.

The software 724 may further be transmitted or received over a network 726 via the network interface device 720 utilising any one of a number of well-known transfer protocols (e.g., HTTP, FTP). While the computer-readable medium 722 is shown in an example embodiment to be a single medium, the term "computer-readable medium" should be taken to include a single medium or multiple media (e.g., a centralised or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term "computer-readable medium" shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the computer 700 and that cause the computer 700 to perform any one or more of the methodologies of the present embodiments, or that is capable of storing, encoding or carrying data structures utilised by or associated with such a set of instructions. The term "computer-readable medium" shall accordingly be taken to include, but not be limited to, solid-state memories and optical and magnetic media.

The tag server 202 may include at least some of the components of the computer 700.

The Applicants believe that the invention as exemplified has a number of advantages. The system 200 and method 400-600 can assist in ensuring that a traveller is successfully reunited with their luggage - all of their luggage and only their luggage - at the end of the journey. Incidences of theft can be reduced as can incidences of "suspicious" baggage. In an air travel scenario, the invention provides seamless tracking and monitoring of luggage. The application can naturally be extended beyond air travel and could find application whenever a person moves from one point to another with associated articles or items which may become separated from the person during the movement.