AU1935201A - Method of linking authorized users to a plurality of devices - Google Patents

Method of linking authorized users to a plurality of devices Download PDF

Info

Publication number
AU1935201A
AU1935201A AU19352/01A AU1935201A AU1935201A AU 1935201 A AU1935201 A AU 1935201A AU 19352/01 A AU19352/01 A AU 19352/01A AU 1935201 A AU1935201 A AU 1935201A AU 1935201 A AU1935201 A AU 1935201A
Authority
AU
Australia
Prior art keywords
code
user
operating space
database
set forth
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU19352/01A
Inventor
Thomas Xydis
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ensure Technologies Inc
Original Assignee
Ensure Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ensure Technologies Inc filed Critical Ensure Technologies Inc
Publication of AU1935201A publication Critical patent/AU1935201A/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3058Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component, e.g. monitoring of power, currents, temperature, humidity, position, vibrations
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0205Specific application combined with child monitoring using a transmitter-receiver system
    • G08B21/0213System disabling if a separation threshold is exceeded
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0261System arrangements wherein the object is to detect trespassing over a fixed physical boundary, e.g. the end of a garden

Description

WO 01/40929 PCT/USOO/32580 -1 METHOD OF LINKING AUTHORIZED USERS TO A PLURALITY OF DEVICES BACKGROUND OF THE INVENTION 5 1. Field of the Invention A method of monitoring a plurality of electronic devices, e.g., computers, positioned in an operating space and accessible by a plurality of users 2. Description of the Prior Art 10 Various methods of monitoring an operating space include the steps of compiling a user database comprising a plurality of user codes for authorized users or compiling a device database comprising a plurality of device codes identifying each one of the devices. A user enters the operating space having a user token which is emitting a user code. The user code is detected and compared to the user database. Each device 15 positioned within the operating space has a device token which also emits a device code. The device code is being detected and compared to the device database. A logging database is created which logs which user was present in the operating space or which device was removed from the operating space. One method as shown in United States Patents No. 5,970,227 allows a host 20 computer to disable a device upon unauthorized removal from the operating space. However, this operating system only monitors unauthorized removal of the devices. The operating system fails to monitor which user is present in the operating space simultaneously while monitoring the devices. It does not prevent the unauthorized users from removing authorized devices from the operating space. 25 SUMMARY OF THE INVENTION AND ADVANTAGES The invention provides a method of monitoring a plurality of electronic devices positioned in an operating space which are accessible by a plurality of users. The method includes the steps of compiling a user database comprising a plurality of user WO 01/40929 PCTIUSOO/32580 -2 codes for authorized users and compiling a device database comprising a plurality of device codes identifying each one of the devices. Each user has a user token for emitting a user code and each device has a device token for emitting a device code. The user code and the device code are then detected. The method is characterized by 5 compiling a linking database linking each user code to at least one of the device codes to indicate that the user code is authorized to remove the device from the operating space in response to detecting the user code linked to the device code. Accordingly, the subject invention provides a method of monitoring devices which are accessible by a plurality of users by simultaneously registering which user is 10 within the operating space and which device the user is removing. Certain users may be allowed to remove any and all devices while other users are only granted access to specific devices. BRIEF DESCRIPTION OF THE DRAWINGS 15 Other advantages of the present invention will be readily appreciated as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings wherein: Figure 1A & 1B is a flowchart showing the steps of monitoring a plurality of electronic devices positioned in an operating space and accessible by a plurality of 20 users; Figure 2 is a schematic view of a system capable of monitoring the operating space which includes a host computer; Figure 3 is a schematic view of the operating space having a plurality of devices and a user disposed therein; and 25 Figure 4 is a representation of one embodiment of a linking database which links the plurality of users to the plurality of devices.
WO 01/40929 PCT/US00/32580 -3 DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT Referring to the Figures, wherein like numerals indicate like or corresponding parts throughout the several views, a method of monitoring a plurality of electronic devices positioned in an operating space and accessible by a plurality of users is shown 5 generally in Figure 1A & 1B. A first step in the method includes compiling a user database 10 comprising a plurality of user codes for authorized users and compiling a device database 12 comprising a plurality of device codes for identifying each one of the devices. These databases are accessible by an independent operating system 52 which can only be 10 altered by a system administrator. The independent operating system 52 may be a computer spaced apart from the operating space or a database kept on a local or shared network. The operating space, as shown in Figure 3, may be defined by any area having an egress 34 or an ingress. The system administrator can add or delete user and device information from their respective databases, as necessary. The plurality of devices may 15 include any electronic equipment such as laptop computers, printers, scanners, or cellular phones. The second step includes emitting a user code 14 from a user token 16 which is carried by a user 22. The emitting of the user code 14 may include generating a signal which is received or a field which is disturbed, such as a magnetic field. A host 20 computer 26 is disposed within or adjacent the operating space for detecting the user code 14. The host computer 26 searches the user database 10 for the detected user code 14. The user database 10 includes any personal information about the user 22 which may have been input by the system administrator. The next step involves emitting a device code 18 from a device token 20 which 25 is attached to a device 24. The emitting of the device code 18 may include generating a signal which is received or a field which is disturbed, such as a magnetic field. There may be a plurality of devices disposed within the operating space and each may be emitting the device code that is unique to that device. The host computer 26 detects the WO 01/40929 PCTUSOO/32580 -4 device code 18 and searches the device database 12 for that device 24. The device database 12 includes information about the device 24 such as the serial number, the model number, type of device, and any other information that is input by the system administrator. 5 The user token 16 and the device token 20 each include a power source 36, a controller 38, and a token radio transceiver 40. The token radio transceiver 40 transmits and receives signals from the host computer 26. The controller 38 sends a signal to the token radio transceiver 40 to emit the user code 14. The user token 16 is also able to receive a signal from the host computer 26 and transmit the signal to the controller 38. 10 The controller 38 responds to the action requested by the host computer 26. The device token 20 is also able to receive signals from the host computer 26 in the same manner as the user token 16. Alternately, the user token 16 or device token 20 may include an RFIID tag, as is known in the art, having a chip mounted within the user token 16 or device token 20 containing the user code 14 or device code 18. 15 The step of detecting the user code 14 and the device code 18 is further defined by connecting the host computer 26 to a circuit 28 which may be integrated into the host computer 26 or positioned adjacent to the host computer 26. In the preferred embodiment, the circuit 28, as shown in Figure 2, includes a first radio transceiver 46, an antenna 30, a signal measurement device 48 and controller 50. In an alternative 20 embodiment, the step of detecting the user code 14 and device code 18 includes a host computer 26 emitting a magnetic or an electric field. The field is broken by the user token 16 entering the field and the chip becoming excited. The computer 26 is then able to detect the user code 14. The device token 20 operates in the same manner when present in the field. 25 Once the user code 14 or the device code 18 is detected, a signal is sent to the signal measurement device 48 to measure the strength of the user code 14 and the device code 18. The strength of the user code 14 would increase proportionally with the strength of the device code 18 which would indicate which device 24 was selected WO 01/40929 PCT/USOO/32580 -5 by the user 22. The signal measurement device 48 then transmits the user code 14 and the device code 18 to the controller 50. The controller 50 transmits the codes to the host computer 26 which is connected to the independent operating system 52 for retrieving information from the databases for the user code 14 and the device code 18. 5 Alternately, the user code 14 and device code 18 may be detected simultaneously when present together in the magnetic or electric field. The host computer 26 also monitors the plurality of devices which were not selected by the user 22. The host computer 26 compares the device database 12 to the device codes which are being detected by the circuit 28. If the device code 18 10 maintains a consistent code strength measurement, then the device is not being selected by the user 22. If the strength of the device code 18 increases without the user code 14 being detected in the operating space, the host computer 26 transmits an alarm signal to the system administrator. Alternately, the host computer 26 could transmit a signal to the controller 50 15 requesting the user token 16 or the device token 20 to transmit the user code 12 or the device code 18. The controller 50 sends the signal to the radio transceiver 46 and emits the signal through the antenna 30. The radio transceiver 46 enters a detection mode. In the detection mode, the radio transceiver waits for a return signal to be received by the plurality of antennas 30. 20 The next step involves compiling a linking database 42 which is accessible by the host computer 26. The linking database 42 links each user code 14 to a plurality of device codes as shown in Figure 4. For instance, User A is authorized to remove Devices 1 through 9, whereas User D in only authorized for Devices 3 through 7. User B can only remove the even numbered devices and User C can only remove the odd 25 numbered devices. When the host computer 26 receives the user code 14 and the device code 18, the host computer 26 recognizes the user 22 and the device 24 from their respective databases. The host computer 26 searches the linking database 42 to determine if the user 22 is authorized to remove the device 24. If the user 22 is linked WO 01/40929 PCT/USOO/32580 -6 to the device 24, the host computer 26 creates a log of which device 24 was removed and by which user. The host computer 26 also registers the linked device code 18 into the logging database in response to each linked device 24 re-entering the operating space. 5 However, if the user 22 and the device 24 are not linked, the host computer 26 enters an alarm mode. In this mode, the host computer 26 may transmit a disabling signal, a prevention signal, or a security signal. If the host computer 26 transmits the disabling signal, the device 24 will not be operable. If the host computer 26 transmits the prevention signal, then the user 22 will only be able to operate certain functions or 10 programs contained within the device 24. The security signal would notify the system administrator that the device 24 was being removed from the operating space by the user 22 and that the user 22 was not linked to the device 24 in the linking database 42. Obviously, many modifications and variations of the present invention are possible in light of the above teachings. The invention may be practiced otherwise than 15 as specifically described within the scope of the appended claims, wherein that which is prior art is antecedent to the novelty set forth in the "characterized by" clause. The novelty is meant to be particularly and distinctly recited in the "characterized by" clause whereas the antecedent recitations merely set forth the old and well-known combination in which the invention resides. These antecedent recitations should be interpreted to 20 cover any combination in which the incentive novelty has utility. In addition, the reference numerals in the claims are merely for convenience and are not to be read in any way as limiting.

Claims (11)

1. A method of monitoring a plurality of electronic devices positioned in an 5 operating space and accessible by a plurality of users, said method comprising the steps of: compiling a user database (10) comprising a plurality of user codes for authorized users, compiling a device database (12) comprising a plurality of device codes 10 identifying each one of the devices, emitting a user code (14) from a user token (16), detecting the presence of the user code (14) in a operating space, emitting a device code (18) from a device token (20), detecting the presence of the device code (18) in the operating space, 15 said method characterized by compiling a linking database (42) linking each user code to at least one of the device codes to indicate that the user code (14) is authorized to remove the device (24) from the operating space in response to detecting the user code (14) linked to the device code (18). 20
2. A method as set forth in claim I further defined by linking a first plurality of device codes to a first user code and linking a second plurality of device codes different than the first plurality of device codes to a second user code.
3. A method as set forth in claim 2 further defined by measuring the strength 25 of the user code (14) and the device code (18) to determine which device the user (22) is to be linked thereto. WO 01/40929 PCT/USOO/32580 -8
4. A method as set forth in claim 1 further defined by providing a disabling signal to the device (24) rendering the device (24) inoperable in response to the user code (14) not being linked to the device code (18).
5 5. A method as set forth in claim 1 further defined by providing a security signal to a system administrator to alert the system administrator that the user code (14) is not linked to the device code (18).
6. A method as set forth in claim 3 further defined by compiling a logging 10 database of each user code and linked device code in response to each device being removed from the operating space.
7. A method as set forth in claim 6 further defined by registering the linked device code into the logging database in response to each device re-entering the 15 operating space.
8. A method as set forth in claim 7 further defined by providing an egress (34) or an ingress for defining the operating space. 20
9. A method as set forth in claim 8 further defined by disposing a host computer (26) within the operating space for detecting the user code (14) and the device code (18).
10. A method as set forth in claim 9 further defined by connecting the host 25 computer (26) to an independent operating system (52) for accessing the linking database (42). WO 01/40929 PCT/USOO/32580 -9
11. A method as set forth in claim 10 further defined by permitting a system administrator access to the linking database (42) to add or delete one of the plurality of users or one of the plurality of devices. 5
AU19352/01A 1999-12-01 2000-11-30 Method of linking authorized users to a plurality of devices Abandoned AU1935201A (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US16840699P 1999-12-01 1999-12-01
US60168406 1999-12-01
US67100400A 2000-09-27 2000-09-27
US09671004 2000-09-27
PCT/US2000/032580 WO2001040929A1 (en) 1999-12-01 2000-11-30 Method of linking authorized users to a plurality of devices

Publications (1)

Publication Number Publication Date
AU1935201A true AU1935201A (en) 2001-06-12

Family

ID=26864094

Family Applications (1)

Application Number Title Priority Date Filing Date
AU19352/01A Abandoned AU1935201A (en) 1999-12-01 2000-11-30 Method of linking authorized users to a plurality of devices

Country Status (7)

Country Link
EP (1) EP1236085A4 (en)
JP (1) JP2003515840A (en)
CN (1) CN1413323A (en)
AU (1) AU1935201A (en)
CA (1) CA2393131A1 (en)
MX (1) MXPA02005420A (en)
WO (1) WO2001040929A1 (en)

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6058374A (en) * 1996-06-20 2000-05-02 Northrop Grumman Corporation Inventorying method and system for monitoring items using tags
US5935244A (en) * 1997-01-21 1999-08-10 Dell Usa, L.P. Detachable I/O device for computer data security
US5960085A (en) * 1997-04-14 1999-09-28 De La Huerga; Carlos Security badge for automated access control and secure data gathering
US5963134A (en) * 1997-07-24 1999-10-05 Checkpoint Systems, Inc. Inventory system using articles with RFID tags
US6070240A (en) * 1997-08-27 2000-05-30 Ensure Technologies Incorporated Computer access control
US6032257A (en) * 1997-08-29 2000-02-29 Compaq Computer Corporation Hardware theft-protection architecture
US6148291A (en) * 1998-01-26 2000-11-14 K & T Of Lorain, Ltd. Container and inventory monitoring methods and systems
CA2322864A1 (en) * 1998-03-02 1999-09-10 Konisa Limited Monitoring system

Also Published As

Publication number Publication date
CN1413323A (en) 2003-04-23
CA2393131A1 (en) 2001-06-07
EP1236085A1 (en) 2002-09-04
MXPA02005420A (en) 2004-04-21
EP1236085A4 (en) 2004-11-10
WO2001040929A1 (en) 2001-06-07
JP2003515840A (en) 2003-05-07

Similar Documents

Publication Publication Date Title
US7071825B2 (en) Self-monitored active rack
CA2392834C (en) Radio based proximity token with multiple antennas
US7639141B2 (en) Systems and methods for identifying lost or stolen devices
US7443297B1 (en) Wireless tracking system and method with optical tag removal detection
JP5410446B2 (en) System and method for object location and path identification based on RFID detection
US20050225427A1 (en) Finding location and ranging explorer
WO2008127507A1 (en) Wireless access control system and method
WO2006102704A1 (en) Apparatus and method of controlling access to restricted areas
AU1935201A (en) Method of linking authorized users to a plurality of devices
CA2458200A1 (en) Fire detection system
CN110708334A (en) Network security implementation system based on big data platform
US20080246611A1 (en) Method and apparatus for detecting the presence of rfid devices and modifying the same
KR100791054B1 (en) Impropriety employment prevention system of individual fixtures using radio frequency identification
JP2878157B2 (en) Personal identification detection device
US8295678B2 (en) Universal method of controlling the recording of audio-visual presentations by data processor controlled recording devices
CN111886634A (en) Radio communication device and entrance and exit management system
JP2004240733A (en) Monitoring system
KR20060046658A (en) A system and method for generation and tracking of documents printed with radio frequency identifications which indicate the content of the documnet and producing a real-time alert in case of security breach
GB2360610A (en) Computer access control and security system
MXPA00000927A (en) Electrically, physically or virtually reactivating rfid tags

Legal Events

Date Code Title Description
MK1 Application lapsed section 142(2)(a) - no request for examination in relevant period