CN1413323A - Method of linking authorized users to plurality of devices - Google Patents

Method of linking authorized users to plurality of devices Download PDF

Info

Publication number
CN1413323A
CN1413323A CN00817569.1A CN00817569A CN1413323A CN 1413323 A CN1413323 A CN 1413323A CN 00817569 A CN00817569 A CN 00817569A CN 1413323 A CN1413323 A CN 1413323A
Authority
CN
China
Prior art keywords
code
user
equipment
operating space
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN00817569.1A
Other languages
Chinese (zh)
Inventor
托马斯·艾克西迪斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ensure Technologies Inc
Original Assignee
Ensure Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ensure Technologies Inc filed Critical Ensure Technologies Inc
Publication of CN1413323A publication Critical patent/CN1413323A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3058Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component, e.g. monitoring of power, currents, temperature, humidity, position, vibrations
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0205Specific application combined with child monitoring using a transmitter-receiver system
    • G08B21/0213System disabling if a separation threshold is exceeded
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0261System arrangements wherein the object is to detect trespassing over a fixed physical boundary, e.g. the end of a garden

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Burglar Alarm Systems (AREA)
  • Storage Device Security (AREA)

Abstract

A method of monitoring a plurality of electronic devices positioned in an operating space and accessible by a plurality of users includes the steps of compiling a user database (10) comprising a plurality of user codes for authorized users, compiling a device database (12) comprising a plurality of device codes for identifying each one of the devices, and characterized by compiling a linking database (42) linking each user to a plurality of devices. Each of these databases is accessible by a host computer (26). A user (22) has a user token (16) which is emitting a user code (14) and a device (24) has a device token (20) which is emitting a device code (18). The host computer (26) detects the user code (14) and the device code (18) and measures the strength of the user code (14) and the device code (18). The host computer (26) links the user (22) to the device (24) by linking the user code (14) to the device code (16) in the linking database (42). The host computer (26) transmits a disabling signal, a prevention signal, or a security signals in response to detecting the device code (18) which is not linked to the user code (14).

Description

Authorized user is connected to the method for a plurality of equipment
Technical field
A kind of supervision is placed on also can be by a plurality of electronic equipments such as the computer method of a plurality of user captures in the operating space.
Background technology
The whole bag of tricks that monitors an operating space comprises compiling one customer data base, this customer data base comprises a plurality of personal code works that are used for authorized user, perhaps compile a device databases, this device databases comprises the step of a plurality of device codes of discerning each equipment.The user enters the operating space of the User Token with emission one personal code work.This personal code work detected and with customer data base relatively.Each equipment that is placed in this operating space has a device token of same emission one device code.This device code detected and with device databases relatively.Be created in the database of record that has which user in this operating environment or remove which equipment from this operating environment.
A kind of method has been shown in U.S. Patent No. 5970227, has allowed main frame under the situation that unauthorized is removed from this operating space, to forbid an equipment.Yet the unauthorized of this operating system surveillance equipment moves.This operating system monitors these equipment when can not monitor and have which user in the operating space.It can not prevent that unauthorized user from removing authorisation device from the operating space.
Summary of the invention
The invention provides a kind of supervision be arranged in the operating space can be by the method for a plurality of electronic equipments of a plurality of user captures.This method comprises that compiling comprises that a customer data base of a plurality of personal code works that are used for authorized user and compiling comprise a device databases of discerning per unit a plurality of device codes.Each user has a User Token, is used to launch a personal code work and each equipment has a device token, is used to launch a device code.Detect personal code work and device code then.The method is characterized in that compiling one connects data, each personal code work and at least one device code are coupled together the personal code work that is connected to this device code with the response detection, indicate this personal code work to be authorized to remove this equipment from this operating space.
Therefore, the present invention by write down simultaneously which user in this operating space and the user removing which equipment, provide a kind of supervision can be by the method for the equipment of a plurality of user captures.The certain user may be allowed to remove any and all devices and other users some particular device of granted access only.
Description of drawings
Also be readily appreciated that other advantages of the present invention in conjunction with the accompanying drawings with reference to following detailed description.
Figure 1A and 1B are that expression monitors and to be arranged in an operating space and can be by the process flow diagram of the step of a plurality of electronic equipments of a plurality of user captures;
Fig. 2 is the synoptic diagram that can monitor a system of the operating space that comprises a main frame;
Fig. 3 has a plurality of equipment and the synoptic diagram of the user's that settles therein operating space;
Fig. 4 is an embodiment who a plurality of users is connected to the connection database of a plurality of equipment.
Preferred implementation
With reference to the accompanying drawings, in whole several views wherein same numbers represent identical or corresponding parts, monitor to be arranged in an operating space and to be usually displayed on Figure 1A and 1B by the method for a plurality of electronic equipments of a plurality of user-accessibles.
The first step comprises that compiling the customer data base 10 and the compiling that comprise a plurality of personal code works that are used for authorized user comprises a device databases 12 that is used to discern per unit a plurality of device codes in the method.These databases can only be visited by the independently operating system 52 that a system manager changes by one.Independently operating system 52 may be away from a computing machine of this operating space be kept at this locality or shared network on a database.This operating space, as shown in Figure 3, may be by any zone definitions with an outlet 34 or one inlet.If necessary, the system manager can add or deletion user and facility information from they databases separately.A plurality of equipment may comprise any electronic installation such as laptop computer, printer, scanner or portable phone.
Second step comprised from a User Token 16 emissions one personal code work 14 that is carried by user 22.The emission of personal code work 14 comprises and generates a received signal or disturbed one, as a magnetic field.Be to detect personal code work 14, main frame 26 is configured in the operating space or near the operating space.Main frame 26 is personal code work 14 query subscriber database 10 that detected.Customer data base 10 comprises any personal information that may have been imported by the system manager of relevant user 22.
Next step comprises a device token 20 emissions one device code 18 from the equipment of being connected in 24.The emission of device code 18 may comprise and produces a received signal or disturbed one, as a magnetic field.May to launch that equipment be unique device code for a plurality of equipment of possible configuration and each equipment in the operating space.Main frame 26 checkout equipment codes 18 and be these equipment 24 retrieval facility databases 12.Device databases 12 comprises the information of relevant this equipment 24 such as sequence number, model, device type and can be by any other information of system manager's input.
Each comprises a power supply 36, a controller 38 and a token wireless set 40 User Token 16 and device token 20.Token wireless set 40 sends and receives the signal from main frame 26.Controller 38 sends a signal and gives token wireless set 40 with emission personal code work 14.User Token 16 also can receive from the signal of main frame 26 and send this signal to controller 38.Controller 38 responses are by the action of main frame 26 requests.Device token 20 also can receive the signal from main frame 26 in the mode identical with User Token 16.In addition, User Token 16 or device token 20 may comprise a RFID label, as known in the art, a chip are installed in User Token 16 that comprises personal code work 14 or device code 18 or device token 20.
The step that detects personal code work 14 and device code 18 is further defined to main frame 26 is connected to a circuit 28, and this circuit 28 may be integrated in the main frame 26 or be positioned near the main frame 26.In the preferred embodiment, circuit 28 as shown in Figure 2, comprises one first wireless set 46, an antenna 30, a signal measurement device 48 and controller 50.In another embodiment, the step of detection personal code work 14 and device code 18 comprises a main frame 26 of emission one magnetic or an electric field.This is broken by the User Token 16 that enters this and chip is excited.Computing machine 26 can detect personal code work 14 then.When device token 20 appears at this when middle, device token 20 is operated in an identical manner.
Be sent to signal measurement device 48 to measure the intensity of personal code work 14 and device code 18 in case detect personal code work 14 or device code 18, one signals.The proportional increase of the intensity of the intensity of personal code work 14 and device code 18, the intensity of device code represent which equipment 24 selected by the user.Signal measurement device 48 transmission personal code works 14 and device code 18 are to controller 50 then.For from the information of database retrieval about personal code work 14 and device code 18, controller 50 sends these codes to the main frame 26 that is connected to SOS 52.In addition, when occurring in magnetic field or electric field simultaneously, personal code work 14 and device code 18 may be simultaneously detected.
Main frame 26 also monitors a plurality of equipment of not selected by user 22.Main frame 26 compares with device databases 12 and by circuit 28 detected device codes.If the code intensity measurements that device code 18 is consistent, this equipment is not selected by user 22 so.If the intensity of device code 18 increases and do not detect personal code work 14 in this operating space, main frame 26 sends an alerting signal to the system manager.
In addition, main frame 26 can send a signal to the controller 50 of request User Token 16 or device token 20 to send this personal code work 12 or device code 18.Controller 50 sends this signal to wireless set 46 and by antenna 30 these signals of emission.Wireless set 46 inputs one detection mode.In this detection mode, wireless set is waited for will be by a return signal of a plurality of antennas 30 receptions.
Next step comprises that compiling one connects database 42, and this connects database 42 can be by main frame 16 visits.Connect database 42 each personal code work 14 is coupled together with a plurality of device codes, as shown in Figure 4.For example, user A is authorized to mobile device 1 to 9, and user D only authorizes mobile device 3 to 7, the equipment that equipment that user B only can mobile even-numbered and user C only can mobile odd-numbereds.When main frame 26 received personal code work 14 and device code 18, main frame 26 was from they database identification user 22 and equipment 24 separately.Main frame 26 inquiries connect database 42 and determine whether user 22 is authorized to come mobile device 24.If user 22 is connected to equipment 24, the record that main frame 26 is created which equipment is moved and moved by which user.Response reenters each connection device 24 of operating space, and main frame 26 also is registered in the device code 18 that connects in this database of record.
Yet if user 22 and equipment 24 are not connected, main frame 26 enters an alarm mode.In this pattern, main frame 26 may send a disable signal, a prevention signal or a safety signal.If main frame 26 sends disable signal, equipment 24 can not be worked.If main frame 26 sends the prevention signal, user 22 can only operate some function or program in the equipment of being included in 24 so.Safety signal reporting system keeper equipment 24 just from the operating space, removing by user 22 and in this connection database 42 user 22 be not connected to equipment 24.
Obviously, be possible according to top instruction a plurality of improvement of the present invention or variation.The present invention may be implemented except that specifying in the scope of accessory claim book, wherein has stating in " feature " statement of novelty concerning prior art.Novelty should be unique and be clearly stated in " feature " statement, and preamble is only stated the old and known combination that is present among the present invention.Any combination that these preorders should be interpreted as wherein bringing out novelty and be covered has practicality.In addition, the Reference numeral in claims only is for convenience and under any circumstance can not thinks mistakenly to limit.

Claims (11)

1. a supervision is positioned at an operating space and by the method for a plurality of electronic equipments of a plurality of user-accessibles, described method comprises step:
Compile a customer data base (10), this customer data base comprises a plurality of personal code works that are used for authorized user,
Compile a device databases (12), this device databases comprises the per unit a plurality of device codes of identification,
From a User Token (16) emission one personal code work (14),
In an operating space, detect the existence of personal code work (14),
From a device token (20) emission one device code (18),
The existence of checkout equipment code (18) in this operating space,
Described method is characterised in that, compiling one connects database (42), this connection database couples together each personal code work and at least one device code and detects the personal code work (14) that is connected to device code (18) with response, and indication personal code work (14) is authorized to remove from this operating space equipment (24).
2. the method for claim 1 is further defined to by more than first device code being connected to one first personal code work and more than second device code that will be different with described more than first device code and is connected to one second personal code work.
3. method as claimed in claim 2 is further defined to the intensity of measuring personal code work (14) and device code (18) and is connected to which equipment with definite user (22).
4. the method for claim 1 is further defined to the personal code work (14) that response is not connected to device code (18), provides the inoperable disable signal of reflection equipment (24) to give equipment (24).
5. the method for claim 1, being further defined to provides a safety signal not to be connected to device code (18) to a system manager with system for prompting administrator code (14).
6. method as claimed in claim 3 is further defined to each equipment that response is removed from this operating space, compiles the database of record of each personal code work and the device code that is connected.
7. method as claimed in claim 6 is further defined to each equipment that response reenters the operating space, and the device code that is connected is registered in the database of record.
8. method as claimed in claim 7, being further defined to provides an outlet (34) or an inlet to be used to define this operating space.
9. method as claimed in claim 8 is further defined in the operating space configuration one main frame (26) and is used to detect personal code work (14) and device code (18).
10. method as claimed in claim 9 is further defined to and main frame (26) is connected to a SOS (52) is used for visit and connects database (42).
11. method as claimed in claim 10 further limits and allows a system manager to visit to connect database (42) to add or to delete in one or more equipment among a plurality of users one.
CN00817569.1A 1999-12-01 2000-11-30 Method of linking authorized users to plurality of devices Pending CN1413323A (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US16840699P 1999-12-01 1999-12-01
US60/168,406 1999-12-01
US67100400A 2000-09-27 2000-09-27
US09/671,004 2000-09-27

Publications (1)

Publication Number Publication Date
CN1413323A true CN1413323A (en) 2003-04-23

Family

ID=26864094

Family Applications (1)

Application Number Title Priority Date Filing Date
CN00817569.1A Pending CN1413323A (en) 1999-12-01 2000-11-30 Method of linking authorized users to plurality of devices

Country Status (7)

Country Link
EP (1) EP1236085A4 (en)
JP (1) JP2003515840A (en)
CN (1) CN1413323A (en)
AU (1) AU1935201A (en)
CA (1) CA2393131A1 (en)
MX (1) MXPA02005420A (en)
WO (1) WO2001040929A1 (en)

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6058374A (en) * 1996-06-20 2000-05-02 Northrop Grumman Corporation Inventorying method and system for monitoring items using tags
US5935244A (en) * 1997-01-21 1999-08-10 Dell Usa, L.P. Detachable I/O device for computer data security
US5960085A (en) * 1997-04-14 1999-09-28 De La Huerga; Carlos Security badge for automated access control and secure data gathering
US5963134A (en) * 1997-07-24 1999-10-05 Checkpoint Systems, Inc. Inventory system using articles with RFID tags
US6070240A (en) * 1997-08-27 2000-05-30 Ensure Technologies Incorporated Computer access control
US6032257A (en) * 1997-08-29 2000-02-29 Compaq Computer Corporation Hardware theft-protection architecture
US6148291A (en) * 1998-01-26 2000-11-14 K & T Of Lorain, Ltd. Container and inventory monitoring methods and systems
IL138224A0 (en) * 1998-03-02 2001-10-31 Konisa Ltd A security system

Also Published As

Publication number Publication date
WO2001040929A1 (en) 2001-06-07
AU1935201A (en) 2001-06-12
JP2003515840A (en) 2003-05-07
EP1236085A1 (en) 2002-09-04
CA2393131A1 (en) 2001-06-07
MXPA02005420A (en) 2004-04-21
EP1236085A4 (en) 2004-11-10

Similar Documents

Publication Publication Date Title
EP1010152B1 (en) Electrically, physically or virtually reactivating rfid tags
US4141078A (en) Library circulation control system
CN101965598B (en) Electronic article surveillance system neural network minimizing false alarms and failures to deactivate
AU723522B2 (en) Method for providing information relating to a mobile machine to a user
US8944332B2 (en) Testing automatic data collection devices, such as barcode, RFID and/or magnetic stripe readers
KR100582045B1 (en) Apparatus and method for the optical detection of multiple items on a platform
US6195006B1 (en) Inventory system using articles with RFID tags
CN102378989B (en) For the infosystem of industrial vehicle
US20030222792A1 (en) Method, system and storage medium for monitoring parking meters
CA2392834A1 (en) Radio based proximity token with multiple antennas
CN102171703A (en) Mobile terminal execution function managing system, method, and program
JP2004000429A (en) Chemicals storage system
Lenko Specifics of RFID based access control systems used in logistics centers
CN1413323A (en) Method of linking authorized users to plurality of devices
US20050128084A1 (en) Contactless data communication system, and contactless identification tag
CN106097551A (en) Inquiry system and method
JP3269573B2 (en) Article removal control device
CN1661380A (en) System and method for detecting static electricity
CN114897117A (en) Asset equipment positioning management system and method based on RFID
EP1419491A1 (en) Fire detection system
CN100343833C (en) Cord-less recognizing safeguard system and method
US20080094219A1 (en) Privacy Protection Cleanup Shop Station and Devices
EP1635274B1 (en) Device and method for checking printed circuit board power source isolation
MXPA00000927A (en) Electrically, physically or virtually reactivating rfid tags

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication