Home Internet of Things Aerospace Apparel Energy Defense Health Care Logistics Manufacturing Retail

Using Wireless Technologies to Fight Camera Theft

If every digital camera contained a SIM or RFID module, it could log into its manufacturer's product-authentication database when switched on and, if stolen, report its whereabouts and disable itself until returned to its rightful owner.
By Dieter Uckelmann, with contributions from Mark Harrison
Executive authorities. The police would be granted access to the database behind services such as immobilise.com to trace and contact the current legitimate owner, by querying with the device's unique ID number and their own police authentication credentials. The stolen goods would be returned to the legitimate owner, who could then use the blocking key to unlock and reactivate the equipment. A purchaser of stolen goods could present those items, along with proof of purchase, to the police, who would instruct the auction site, online retailer or payment operator to perform a chargeback/reverse transaction that would fully reimburse the purchaser and debit the seller's account, so that nobody would be able to profit from selling stolen goods. Sellers could also be levied an additional penalty for trading in such items, provided that all sellers were granted limited access to the product identifier authentication database so they could check whether goods had been marked as stolen. They would receive an electronic time-stamped receipt as confirmation of their check (such checking should be performed before selling goods). If the items were already sold before being reported as stolen, then the selling party would still be liable for the chargeback, but possibly not for the additional penalty.

The business case. Some manufacturers might not see an advantage in supporting a corresponding system. Most likely, any stolen device would result in new sales. Identical replacements would be unlikely, though, and buying a new device would offer the possibility of switching to another brand. In the described camera burglary, the camera manufacturer did not offer any discount for replacing the camera—and as a result, that company may lose a customer who had invested a considerable amount of money in cameras, lenses and accessories over the years. However, there is also a business case in the security service itself. Potential buyers could base their buying decisions on the availability of this service. Additionally, optional charges (an annual fee, for instance) could be offered to compensate for the necessary infrastructure. Moreover, insurance policies could offer correspondingly reduced rate.

Remote locking mechanisms for digital goods through an Internet of Things may help to cut down on crime. The necessary technologies are available, and as the use of radio frequency identification read points becomes more widespread, RFID tags could be employed in addition to—or instead of—SIM modules.

Dieter Uckelmann is a manager at the University of Bremen's LogDynamics Lab, which serves as a research center for the use of RFID, sensors and other mobile technologies within logistics. Mark Harrison, the director of the Cambridge Auto-ID Lab, provides expertise in information architectures and technologies. Harrison is deeply involved in standardization activities at EPCglobal, and has cochaired the Tag Data Translation Work Group and the Data Discovery Joint Requirements Group. He currently co-chairs the Discovery Services Work Group, and also participates in EPCglobal's Architecture Review Committee and GS1's Architecture Group.

USER COMMENTS

Antione Borg 2011-05-29 01:22:55 AM
Great Idea but what if .... I like the idea of having a device turn itself off but the problem there is that it needs a good connection to 'home' before it can tell if it needs to deactivate itself. If I steal your equipment and then connect it to a closed network which is fully under my control, your device will never call home. Of course, devices that can't call home can choose to deactivate themselves as a precaution - but what if the Internet is unavailable (as happens regularly in the developing world and on islands which are dependent on a single Internet connection at times)? Would you really want to use a mechanism that renders your device useless even when it should be fine? Another alternative would be precise positioning. Have you heard of the EU funded TIGER project (http://gsa.europa.eu/index.cfm?objectid=A30D434B-0DF6-460F-CDBB523C6E79CB5E) From what I can tell, these guys are building the necessary hw/sw to allow a mobile device to work provided it is within a pre-established geographical area - and this is all obtained by a satellite feed. It strikes me that combining this GNSS-based approach and your idea would allow for a superior solution.

Login and post your comment!

Not a member?

Signup for an account now to access all of the features of RFIDJournal.com!

PREMIUM CONTENT
Case Studies Features Best Practices How-Tos
RFID JOURNAL EVENTS
Live Events Virtual Events Webinars
ASK THE EXPERTS
Simply enter a question for our experts.
TAKE THE POLL
JOIN THE CONVERSATION ON TWITTER
Loading
RFID Journal LIVE! RFID in Health Care LIVE! LatAm LIVE! Brasil LIVE! Europe RFID Connect Virtual Events RFID Journal Awards Webinars Presentations