Abstract:
A system is disclosed in which the operation of service station fore-court equipment, such as a fuel pump (6), is controlled in dependence on an image captured from the vehicle (4) desiring to use the equipment. A camera (8), for example, captures the number plate of the vehicle while at the pump (6), or upon entry into the fore-court area, and compares the number plate with a database of registered vehicle information to determine the type of fuel the vehicle requires. The operation of the pump is inhibited if the wrong fuel is selected, thereby avoiding mis-fuelling of the vehicle and the ensuing damage to the engine. Instead of the number plate, a sticker or other visible identifier may be used.
Abstract:
A method for authenticating a workflow that has one or more designated steps that require authentication of associated resources, the method comprising: using a reader instrument to read at least one security feature uniquely associated resources involved in the workflow; authenticating the security feature, thereby to authenticate its associated resource, and recording authentication information for each designated workflow step.
Abstract:
A system is disclosed in which the operation of service station fore-court equipment, such as a fuel pump (6), is controlled in dependence on an image captured from the vehicle (4) desiring to use the equipment. A camera (8), for example, captures the number plate of the vehicle while at the pump (6), or upon entry into the fore-court area, and compares the number plate with a database of registered vehicle information to determine the type of fuel the vehicle requires. The operation of the pump is inhibited if the wrong fuel is selected, thereby avoiding mis-fuelling of the vehicle and the ensuing damage to the engine. Instead of the number plate, a sticker or other visible identifier may be used.
Abstract:
A method for authenticating a workflow that has one or more designated steps that require authentication of associated resources, the method comprising: using a reader instrument to read at least one security feature uniquely associated resources involved in the workflow; authenticating the security feature, thereby to authenticate its associated resource, and recording authentication information for each designated workflow step.
Abstract:
Item identifying apparatus comprises one or more detectors (50) for obtaining data defining characteristics of items; and a processor (50) for monitoring the data obtained by the detector(s) and for performing a first identification process (510) using the data to identify an item, wherein when the first identification process does not identify the item with sufficient confidence, the processor performs at least one second identification process (550) using the said data from the detector(s), the item being identified if the identity generated by the second identification process or processes has a sufficient level of confidence.
Abstract:
A detection device for mounting on a vehicle (10) to provide a signal indicative of an object (13) in the path of the vehicle includes a microwave transmitter/receiver (16), a lens (21) through which radiation transmitted and received by the transmitter/receiver (16) pass and means (20, 24) for modifying the divergence of the beam (11) of the radiation. Preferably the degree of divergence is varied in accordance with the vehicle speed.
Abstract:
A product management system for monitoring the movement of products through a supply chain, the system being adapted to receive data from reader devices that capture data associated with the products as they move through the chain. The captured data is used to generate an event record for each product, at each stage in the supply chain. These records are used, together with at least one model of the supply chain, to detect anomalous events.
Abstract:
A system for authenticating articles comprising: an authentication manager (40) for managing authentication information associated with the articles; a plurality of secure taggant reader instruments (20, 22, 23) for reading machine readable taggants associated with the articles, the taggants including the authentication or related information, and an instrument configuration manager (25) for secure on-line configuration of the instruments (20, 22, 23). Each taggant reader instrument (20, 22, 23) is operable to securely process and send authentication information derived from a taggant to the authentication manager (40). The authentication manager uses the received authentication information to identify suspicious events. When suspicious events are detected, the instrument configuration manager (25) is able to reconfigure at least some of the taggant reader instruments (20, 22, 23). Reconfiguration may also happen in the event of a product recall and/or taggant security compromise.