iAmSafe asset marking solution

August 2010 Integrated Solutions

The iAmSafe concept was borne due to the fact that there exists such high rates of theft within the country. The concept creates a complete audit trail of assets purchased by an individual or company. Should an asset be registered and a would-be criminal choose to steal and resell it, the purchaser of the asset can immediately verify if the asset has been stolen and who the asset belongs to by logging on to the Internet or via mobile phone.

When users subscribe to the Web-based iAmSafe Asset Management Portal and register their assets, it will be difficult for criminals to sell any goods that do not belong to them as the owner of the goods will have to have given verification that he or she has given permission for those specific goods or assets to be sold.

What this will achieve is that owners can now be contacted directly should their goods be found and unscrupulous purchasers of stolen goods can be held directly accountable for purchasing stolen goods, as a medium now exists for all individuals to first verify whether goods or assets are legitimate or stolen, therefore making it very difficult for would-be thieves to sell the illegitimate goods to anyone.

It is also envisaged that all assets will have a non-removable unique ultraviolet number that is unique to the asset owner and always traceable back to the current owner of the asset. The current asset owner will have his unique iris captured which will be linked to his or her unique asset numbers. The ultraviolet numbers are not transferable and are unique to its owner for life; the new owner will be able to transfer the goods to his own unique barcode once the original owner has verified that he has sold the asset in question to the new owner.

Therefore an entire history of the assets will be carried within these new unique ultraviolet asset identifiers as items can be traced back to the original or secondary owners should any discrepancies arise about said assets. Other benefits include:

* Police can verify stolen goods immediately.

* Police can verify crime statistics in areas with information received.

* Insurance fraud such as multiple policy claims on the same assets can be prevented.

* Companies can monitor warranty claims by marking their electronic goods to prevent false warranty claims on grey imports.

* Stolen items can now be traced back to original owners.

* Selling stolen goods on the legitimate market will be impossible for criminals to resell as the original owners can now be contacted.

For more information contact JRJ Consultants, +27 (0)82 776 9990, sj@jrjconsultants.co.za, www.jrjconsultants.co.za

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Building a nervous system for smart cities
Issue 1 2020, Pinnacle Instruments SA , Integrated Solutions
Build a central nervous system for smart cities, by employing real-time situation reporting and analysis that unites the powers of cloud computing, AI, IoT and big data.

The secret to 5G security? Turn the network into a sensor
Issue 1 2020 , Integrated Solutions
We are about to make the leap from being a civilisation that uses networks to one that runs on them in a fundamental and inextricable way.

The move to services and RMR
Issue 1 2020, Merchant West, G4S South Africa, Technews Publishing , Integrated Solutions
Project work used to be the staple diet for system integrators, but that was before the services model changed the way businesses buy and use their security systems.

Global security industry adopts servistisation models
Issue 1 2020 , Integrated Solutions
New as-a-service business models are gaining traction because they reduce capital expenditure and cost of ownership, finds Frost & Sullivan.

Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Scalable access solution
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Integrated Solutions
Bosch Building Technologies makes access management simple, scalable and always available with Access Management System 2.0.

Securing perimeters of secure locations
November 2019, Axis Communications SA, Modular Communications, Hikvision South Africa, Nemtek Electric Fencing Products, Technews Publishing, Stafix , Government and Parastatal (Industry), Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
Hi-Tech Security Solutions asked a number of companies offering perimeter security solutions for their insights into protecting the boundaries of national key points.

The safe city and its need for interoperability
November 2019 , Integrated Solutions, CCTV, Surveillance & Remote Monitoring
Interoperability continues to present one of the greatest challenges, particularly with video management systems, video recording devices and cameras.

Analytics-driven solutions for smart infrastructure
November 2019, Bosch Building Technologies , Integrated Solutions
Video analytics technology can bring intelligence to infrastructure by delivering solutions for traffic flow, improved safety, smart parking, and data collection.

A platform approach to innovation and value
CCTV Handbook 2019, Technews Publishing , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure
Moving to the platform model of doing business holds tremendous advantages for end users and smaller developers, but also for the whole technology supply chain.