US20200005565A1 - System and method to control access to hazardous machines - Google Patents
System and method to control access to hazardous machines Download PDFInfo
- Publication number
- US20200005565A1 US20200005565A1 US16/564,323 US201916564323A US2020005565A1 US 20200005565 A1 US20200005565 A1 US 20200005565A1 US 201916564323 A US201916564323 A US 201916564323A US 2020005565 A1 US2020005565 A1 US 2020005565A1
- Authority
- US
- United States
- Prior art keywords
- access control
- machine
- identity information
- control device
- human operator
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G07C9/00087—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Definitions
- the present disclosure relates to safety devices for controlling access to and use of hazardous machinery and equipment. More specifically, the disclosure relates to hazardous machinery access controls activated by access control cards issued to users of such machinery and equipment.
- Equipment and machinery located can be hazardous to personnel in the area proximate the equipment and machinery.
- Using machinery or equipment with inadequate training or with inadequate control over access to the equipment can result in injury to the user or other personnel, damage to the equipment, harm to business reputation of the equipment's owner or controlling entity, non-productive time due to incident investigation or equipment damage, and, in extreme cases, loss of life.
- the disclosure is generally related to a system for controlling usage of a machine by a human operator.
- the system includes an access control card containing identity information related to the operator, an access control device in signal communication with an operating control of a selected machine and selectively in communication with the access control card and an access control computer in communication with the access control device.
- the identity information is communicated from the access control card to the access control device.
- the access control computer include identity information for at least one human operator. Identity information from the access control card is communicated to the access control card from the access control device and then to the access control computer.
- the access control computer compares the identity information from the access control card to stored identity information to identify whether the human operator identity information is consistent with the required qualifications to operate the selected machine.
- the access control computer communicates to the access control device that the human operator is or is not authorized to operate the selected machine.
- the access control device permits control instruction from the human operator to the machine when the operator is determined to be qualified to operate the selected machine.
- the present disclosure is related to a method for restricting usage of a machine to authorized human operator(s).
- the method includes entering into or placing proximate an access control device associated with a selected machine an access control card including identity information for a human operator.
- the method further includes communicating the identity information from the access control card to the access control device and from the access control device to an access control computer.
- Identity information for the operator stored on the server is compared to the identity information communicated from the access control card. The result of the comparison is communicated to the access control device.
- the access control device permits the operator to operate the selected machine when the comparison communicated indicates the operator is currently authorized to operate the selected machine or restricts the operator from operating the selected machine when the comparison indicates the operator is not currently authorized to operate the machine.
- FIG. 1 is a schematic view of an example system according to the present disclosure.
- FIGS. 2A and 2B show an example embodiment of a remote control for a machine having an access control device and an access control card according to the present disclosure.
- FIG. 3 shows an example embodiment of a display showing machines in use and the operators have access thereto.
- FIG. 4 shows an example data input display to enable calculation of relevant usage information for each of a plurality of operated machines.
- FIG. 5 shows an example embodiment of a display screen for accumulated operating data for a specific machine and is operators.
- the present disclosure relates to a system 100 for controlling or restricting usage of or access to one or more machines 120 by one or more human operators.
- Each human operator who is authorized use a particular machine 120 may have assigned to him an access control card ( 102 A in FIG. 2A ), such as a smart card (having, for example, an embedded electrically erasable programmable read-only memory chip—EEPROM), a magnetic data recording strip, a bar code or a radio frequency identification (RFID) element.
- EEPROM electrically erasable programmable read-only memory chip
- RFID radio frequency identification
- the access control card ( 102 A in FIG. 2A ) contains certain identifying information related to the particular human operator.
- the access control card ( 102 A in FIG. 2A ) may, for example, be embedded in or be part of an employee identification badge or similar instrument.
- Information encoded on the access control card ( 102 A in FIG. 2A ) relates to the human operator by including information such as, for example and without limitation, the name of the person and a unique identifier, such as an employee number, for example, as well as data concerning any machine or equipment operation training and/or qualification and the effective dates of such training and/or qualification. Such information will hereafter be referred to as “identity information.”
- the access control card ( 102 A in FIG. 2 ) may include the identity information in such a way that it is electronically readable by another device, to be explained further with reference to FIG. 2A .
- Example devices for reading the identity information from the access control card may include an access control module 102 B in signal communication with an operator control device 102 .
- the operator control device 102 may be a control for operating an associated machine 120 .
- the operator control device is in signal communication with a respective machine 120 or equipment to be controlled by a human operator.
- Signal communication between the operator control device 102 and the machine 120 or equipment may be wireless as shown in FIG. 1 , e.g., using communication protocol such as IEEE standard 802.11n or 802.11ac or other radio communication channel.
- the operator control device 102 may communicate with the machine 120 using a low power radio frequency communication, for example and without limitation a multichannel 433 MHz bi-directional radio system.
- communication between the operator control device 102 and the machine 120 may be conducted over wires, e.g., a CATS or CAT6 Ethernet cable.
- a human operator attempting to gain access to a particular machine 120 for use in the operator's job duties will cause the access control card ( 102 A in FIG. 2A ) to communicate with the access control device 102 B associated with or in signal communication with a respective operator control device 102 to enable control of the specific machine 120 .
- the access control device 102 B may be in signal communication directly with an access control computer 104 , to be explained further below.
- the access control device 102 B may comprise a card reader 103 C which is configured to interrogate information stored on the access control card ( 102 A in FIG. 2A ) inserted into or placed proximate the card reader 103 C.
- a controller 103 B decodes and communicates information from the interrogated access control card ( 102 A in FIG. 2A ) to a radio modem 103 A.
- the radio modem 103 A may be in communication with a corresponding radio modem 104 A in an access control computer 104 (which may be a server or other general purpose programmable computer).
- interrogation of the access control card 102 A may be performed, for example, by inserting or placing the access control card 102 A into or in proximity to the access control device 102 B or similar interface that may be associated with the machine or equipment operator control device 102 .
- the access control device 102 B may include an electronic mechanism (see 103 A, 103 B, 103 C in FIG. 1 ) for reading the access control card 102 A presented by the human operator. The structure of such mechanism will be related to the type of identity information stored on the access control card 102 A.
- FIG. 2B shows a human operator using the operator control device 102 having its access control device 102 B attached thereto.
- the access control device 102 B may include the above described card reader 103 C, e.g., a receiver for receiving (e.g., magnetic data strip reader or RFID interrogation element) or a reader for reading (e.g., a barcode reader) the identity information from the access control card ( 102 A in FIG. 1 ) and a transmitter for transmitting the information obtained from the access control card ( 102 A in FIG. 1 ) to the access control computer 104 , e.g., a first server. Transmission of the identity information may be made wirelessly using any suitable form of radio communication, including, without limitation, a 433 MHz multichannel two-way radio channel, or may be made using a wired communication channel.
- a receiver for receiving e.g., magnetic data strip reader or RFID interrogation element
- a reader for reading e.g., a barcode reader
- Transmission of the identity information may be made wirelessly using any suitable form of radio communication, including, without limitation, a 433 MHz multichannel two-way radio
- the access control device 102 B if so configured may require little power to operate, such as between about 1.5 and 3.6 V and may be powered using, for example, a local battery for wireless communication embodiments.
- communication between the access control device 102 B, the operator control device 102 and the machine 120 may be performed by hard wiring, for example, into the particular machine 120 or equipment to be operated.
- the access control computer (first server) 104 may comprise access to externally stored or internally stored identity information for at least one human operator, or for a plurality of specific human operators at a particular equipment or machinery physical location.
- the identity information included on the access control computer (first server) 104 may comprise information related to the training status for each human operator.
- training status may include each machine 120 that a particular human operator has certified training to operate and the start and end dates for which such certified training is valid. Training status for each human operator may comprise corresponding training information for more than one machine 120 .
- the access control computer 104 may comprise a clock 104 E for timing operations performed by the central processor 104 B.
- the access control computer (first server) 104 may include any form of data storage and retrieval device 104 D, e.g., an external memory or hard drive where the identity information for each human operator is stored and can be interrogated by the access control computer (first server) 104 .
- the processor 104 B in the data storage and access control computer 104 is operable to interrogate stored training information on request from the access control computer 104 for each human operator who presents an access control card ( 102 A in FIG. 2 ) to an access control device 102 B.
- an access approval signal or message may be communicated from access control computer (first server) 104 to the particular access control device 102 B using, for example and without limitation, a radio modem 104 A in wireless communication with the access control device 102 B.
- the access control device 102 B may receive an access approval signal or message from the access control computer 104 and then enables operation of the specific machine 120 by the specific human operator using the relevant operator control device 102 .
- enabling control of the specific machine 120 may comprise the specific machine 120 being connected to an electric power supply by the access control device 102 B or by the access control computer (first server) 104 .
- the particular access control device 102 B associated with the corresponding operator control device 102 may be activated to enable control of the particular machine 120 by the particular human operator or any other human operator having valid stored identity information by causing the access control device 102 B to enable or activate the machine operator control device 102 .
- the access control computer (first server) 104 may not send any approval signal or message and the machine 120 and/or the associated operator control device 102 will not be activated
- the access control device 102 B will be activated by the access control computer (first server) 104 to permit the human operator to use the particular machine 120 .
- the access control device 102 B prevents operation of the particular machine 120 , e.g., by not enabling the machine operator control 102 or the access control computer 104 may not send a power-up command to the machine or an activation signal to the machine operator control. Such denial of operation may also be effected by having the access control computer (first server) 104 not send an actuation signal or message to the relevant access control device 102 B or machine operator control 102 .
- the processor 104 B associated with the access control computer (first server) 104 may monitor at least one parameter of the selected machine 120 .
- machine parameters to be monitored include operating hours, the identity of the human operator who operated the particular machine, machine loads, machine temperatures, etc. Such parameters may be measured by one or more sensors 121 associated with each machine 120 .
- the sensors 121 may be in signal communication with the processor 104 B either by a wired signal channel (e.g., Ethernet, RS-232 serial connection, USB connection) or by a wireless channel, e.g., IEEE 802.11n or 802.11ac standard wireless channel.
- a computer display or monitor 106 B may also be in signal communication with a monitoring computer 106 .
- the monitoring computer 106 may be in signal communication with the access control computer, for example, by serial connection such as RS-232 or USB.
- the monitor 106 B may display some or all of the identity information, such as an operator name, and the particular machine when that operator is permitted to operate the particular machine 120 .
- the display 106 B may also display the one or more measured parameters for one or more specific machines 120 .
- the machine(s) 120 may be, for example, any machine used in manufacturing. Examples of such machines include, without limiting the scope of the present disclosure, a heating oven, a forklift, an overhead crane, a break out machine, grinding machine, shock machine, and/or a key box. Other examples of machines may include presses, lathes, injection molding machines, fastening equipment, etc.
- the monitoring computer 106 may be in signal communication with a remote data storage computer or server 105 .
- Machine parameters and identity information may be communicated to the remote data storage server 105 from the monitoring computer 106 , e.g., using wireless communication devices 105 A, 106 A, respectively.
- the wireless communication devices may be radio communication devices using, for example, IEEE standard 802.11n or 802.11ac communication protocol.
- the remote server 105 may include a processor (not shown separately) that can perform analysis, e.g., statistical analysis, on the measured machine parameters and communicate the analysis results to a computer in or associated with the monitoring computer 106 . Communication may also be performed using Ethernet cable, RS-232 serial cable, USB connection wired channel or otherwise communicated using any form of wired or wireless signal communication channel.
- Signal output from the various sensors 121 associated with each machine 120 may be input to the access control computer 104 for local processing therein or for communication to the monitoring computer 106 and/or remote server 105 .
- a method for restricting usage of a machine by a human operator includes initiating signal communication between an access control device 102 B on a selected machine 120 and an access control card 102 A in the possession of any human operator intending to use the selected machine 120 .
- the access control card 102 A includes identity information related to the human operator, such as a name and/or employee number.
- the human operator selectively presents the access control card 102 A to the access device 102 B on the selected machine 120 when the human operator is ready to use the machine 120 .
- the human operator will place the access control card 102 A on or near the access control device 102 B such that the access control card 102 A may be interrogated by the access control device 102 B.
- Identity information stored on the access control card 102 A presented by the human operator is communicated to the access control device 102 B.
- the identity information is then communicated from the access control device 102 B to an access control computer (first server) 106 .
- the identity information may be communicated using any suitable wired or wireless communication technique, including, without limitation, radio frequency such as multichannel 433 MHz radio.
- Identity information related to the training status of each operator for each machine in a particular location may be provided to the access control computer (first server) 104 .
- the first server 104 may include a processor 104 B capable of interrogating identity information and determining whether the identity information is valid for the selected machine 120 and the particular human operator. While the above described embodiment has identity information stored on a local data storage device 104 D, some or all of the same identity information may be stored on the access control card 102 A.
- the access control computer (first server) 104 communicates via wired or wireless connection to the access control device 102 B that the operator may use the selected machine or equipment. If the operator's identity information is invalid, e.g., the human operator has not successfully completed training for the specific machine 120 or the training is out-of-date, then the access control computer (first server) 104 may communicate an access authorization signal using wired or wireless communication to the access control device 102 B that the human operator is not authorized to operate the selected machine 120 and access to such machine 120 is not enabled by the access control device 102 B. In other embodiments, an access approval signal may simply not be communicated to the access control device 102 B by the first server 106 when the identity information on the access control card 102 A is not valid to enable operation of the specific machine.
- Information including certain identity information of the operator, such as an operator name, and the selected machine may be displayed by a monitor 106 B in signal communication with the monitoring computer 106 .
- Selected equipment may include a control device 102 configured to operate an associated machine 120 .
- the identity information stored on the access control card 102 A may be sent to the access control computer (first server) 104 e.g., by radio communication or wired communication.
- the access control computer (first server) 104 validates the identity information by interrogating the data storage and retrieval device 104 D to enable activating the machine or equipment by the specific human operator. If the identity information is valid, the access control computer (first server) 104 may send an activation signal or message e.g., through the radio or wired signal communication channel to enable the human operator to activate the specific machine or equipment.
- Some of the identity information and machine operating parameters may be displayed on the monitor 106 B and sent to the remote server 105 for analysis, e.g., times of use of each machine 120 , name of operator of each machine 120 , and any of a number of sensor-derived machine operating parameters.
- the functions of the access control computer 104 and the monitoring computer 106 may be performed by the same computer and/or processor.
- the described system 100 may facilitate confirming training statuses of individual human operators on all machines or equipment through the identity information associated with each access control card 102 A, making it unnecessary for the human operator to surrender the access control card 102 A when, for example, training has expired or the human operator is no longer provided access to the physical location of the machine(s) such as on termination of employment or transfer of the human operator to a different facility.
- Parameters that may be monitored for the machine(s) or equipment may include the equipment name or identification number, location, time in use, human operators using such equipment, as well as operational data. Such data may be communicated to the remote server 105 and real time analysis may be performed. Such analysis may include how efficiently each human operator operates each respective machine 120 , and the amount of time each operator uses each machine 120 .
- Attempts to gain access to a specific machine 120 by an operator not having correct identifying information may be recorded and communicated (e.g., wirelessly) to a remote system operator to identify inappropriate human operator behavior, or the presence of an unauthorized person attempting to gain access to operation of a specific machine 120 .
- the system 100 may be programmed (e.g., in access control computer 106 ) such that any initial safety controls are satisfied prior to permitting a human operator to operate a selected machine. 120
- any initial safety controls are satisfied prior to permitting a human operator to operate a selected machine.
- One such example of this type of restricted access is that the system 100 would confirm that a daily crane check operation was performed prior to permitting any operator to use a crane.
- a priori safety or pre-use inspection records may be associated with enabling operation of any other machine 120 in a similar manner.
- the system 100 may display the selected machine 120 and the operator's name using such selected machine on the monitor 106 B. Such operation can prevent attempts by another operator to activate a selected machine 120 without an access control card 102 A.
- FIG. 3 shows an example of the display 106 B.
- the display in FIG. 3 shows each machine 110 , the operator 112 who has gained access to any one or more machines including an image 114 of the particular operator. In this way, a system supervisor can readily determine which machines are in use and by which human operators.
- FIG. 4 shows an example input display 116 to the data analysis computer ( 105 in FIG. 1 ) wherein specific machines, times of operation and other calculated operating information may be requested in certain forms, e.g., histograms or graphs.
- FIG. 5 shows example machine operation parameters obtained from the remote server ( 105 in FIG. 1 ) that may be displayed 118 in bar graph and histogram forms, as non-limiting examples. Any of the measurements made by the respective sensors ( 121 in FIG. 1 ) may displayed in correspondence with the times at which each authorized human operator uses the specific machine ( 120 in FIG. 1 ) so that how well each human operator controls each respective machine ( 120 in FIG. 1 ) may be displayed. Identity information, for example, imminent expiration of a certain human operator's qualifying training, may be displayed by the analysis computer or the access control computer so that the system supervisor may be able to take corrective action (e.g., scheduling qualifying training) with respect to such human operator.
- corrective action e.g., scheduling qualifying training
Abstract
Description
- This application claims priority as a continuation application of U.S. patent Ser. No. 10/410,443 with the same title and a filing date of Mar. 30, 2018 which claims priority to PCT Patent Application Number PCT/US2016/054612 with the same title and a filing date of Sep. 30, 2016 which claims priority to Russian Federation Patent Application Number 2015141877 filed on Oct. 1, 2015. All three applications in their entirety are incorporated by reference herein.
- The present disclosure relates to safety devices for controlling access to and use of hazardous machinery and equipment. More specifically, the disclosure relates to hazardous machinery access controls activated by access control cards issued to users of such machinery and equipment.
- Equipment and machinery located, e.g., in a manufacturing facility, can be hazardous to personnel in the area proximate the equipment and machinery. Using machinery or equipment with inadequate training or with inadequate control over access to the equipment can result in injury to the user or other personnel, damage to the equipment, harm to business reputation of the equipment's owner or controlling entity, non-productive time due to incident investigation or equipment damage, and, in extreme cases, loss of life.
- It would be helpful to have a system for controlling access to and use of hazardous equipment and machinery so that only suitably trained individuals are able to use the equipment and machinery.
- In one aspect, the disclosure is generally related to a system for controlling usage of a machine by a human operator. The system includes an access control card containing identity information related to the operator, an access control device in signal communication with an operating control of a selected machine and selectively in communication with the access control card and an access control computer in communication with the access control device. The identity information is communicated from the access control card to the access control device. The access control computer include identity information for at least one human operator. Identity information from the access control card is communicated to the access control card from the access control device and then to the access control computer. The access control computer compares the identity information from the access control card to stored identity information to identify whether the human operator identity information is consistent with the required qualifications to operate the selected machine. The access control computer communicates to the access control device that the human operator is or is not authorized to operate the selected machine. The access control device permits control instruction from the human operator to the machine when the operator is determined to be qualified to operate the selected machine.
- In another aspect, the present disclosure is related to a method for restricting usage of a machine to authorized human operator(s). The method includes entering into or placing proximate an access control device associated with a selected machine an access control card including identity information for a human operator. The method further includes communicating the identity information from the access control card to the access control device and from the access control device to an access control computer. Identity information for the operator stored on the server is compared to the identity information communicated from the access control card. The result of the comparison is communicated to the access control device. The access control device permits the operator to operate the selected machine when the comparison communicated indicates the operator is currently authorized to operate the selected machine or restricts the operator from operating the selected machine when the comparison indicates the operator is not currently authorized to operate the machine.
- Other aspects and advantages will be apparent from the following description and the appended claims.
-
FIG. 1 is a schematic view of an example system according to the present disclosure. -
FIGS. 2A and 2B show an example embodiment of a remote control for a machine having an access control device and an access control card according to the present disclosure. -
FIG. 3 shows an example embodiment of a display showing machines in use and the operators have access thereto. -
FIG. 4 shows an example data input display to enable calculation of relevant usage information for each of a plurality of operated machines. -
FIG. 5 shows an example embodiment of a display screen for accumulated operating data for a specific machine and is operators. - Referring to
FIG. 1 , the present disclosure relates to asystem 100 for controlling or restricting usage of or access to one ormore machines 120 by one or more human operators. Each human operator who is authorized use aparticular machine 120 may have assigned to him an access control card (102A inFIG. 2A ), such as a smart card (having, for example, an embedded electrically erasable programmable read-only memory chip—EEPROM), a magnetic data recording strip, a bar code or a radio frequency identification (RFID) element. The access control card (102A inFIG. 2A ) contains certain identifying information related to the particular human operator. The access control card (102A inFIG. 2A ) may, for example, be embedded in or be part of an employee identification badge or similar instrument. Information encoded on the access control card (102A inFIG. 2A ) relates to the human operator by including information such as, for example and without limitation, the name of the person and a unique identifier, such as an employee number, for example, as well as data concerning any machine or equipment operation training and/or qualification and the effective dates of such training and/or qualification. Such information will hereafter be referred to as “identity information.” The access control card (102A inFIG. 2 ) may include the identity information in such a way that it is electronically readable by another device, to be explained further with reference toFIG. 2A . - Example devices for reading the identity information from the access control card (102A in
FIG. 2 ) may include anaccess control module 102B in signal communication with anoperator control device 102. Theoperator control device 102 may be a control for operating anassociated machine 120. The operator control device is in signal communication with arespective machine 120 or equipment to be controlled by a human operator. Signal communication between theoperator control device 102 and themachine 120 or equipment may be wireless as shown inFIG. 1 , e.g., using communication protocol such as IEEE standard 802.11n or 802.11ac or other radio communication channel. In some embodiments, theoperator control device 102 may communicate with themachine 120 using a low power radio frequency communication, for example and without limitation a multichannel 433 MHz bi-directional radio system. In other embodiments, communication between theoperator control device 102 and themachine 120 may be conducted over wires, e.g., a CATS or CAT6 Ethernet cable. - A human operator attempting to gain access to a
particular machine 120 for use in the operator's job duties will cause the access control card (102A inFIG. 2A ) to communicate with theaccess control device 102B associated with or in signal communication with a respectiveoperator control device 102 to enable control of thespecific machine 120. In some embodiments, theaccess control device 102B may be in signal communication directly with anaccess control computer 104, to be explained further below. - In an example embodiment, the
access control device 102B may comprise acard reader 103C which is configured to interrogate information stored on the access control card (102A inFIG. 2A ) inserted into or placed proximate thecard reader 103C. Acontroller 103B decodes and communicates information from the interrogated access control card (102A inFIG. 2A ) to aradio modem 103A. Theradio modem 103A may be in communication with acorresponding radio modem 104A in an access control computer 104 (which may be a server or other general purpose programmable computer). - Referring to
FIG. 2A , interrogation of theaccess control card 102A may be performed, for example, by inserting or placing theaccess control card 102A into or in proximity to theaccess control device 102B or similar interface that may be associated with the machine or equipmentoperator control device 102. Theaccess control device 102B may include an electronic mechanism (see 103A, 103B, 103C inFIG. 1 ) for reading theaccess control card 102A presented by the human operator. The structure of such mechanism will be related to the type of identity information stored on theaccess control card 102A.FIG. 2B shows a human operator using theoperator control device 102 having itsaccess control device 102B attached thereto. - Referring once again to
FIG. 1 , theaccess control device 102B may include the above describedcard reader 103C, e.g., a receiver for receiving (e.g., magnetic data strip reader or RFID interrogation element) or a reader for reading (e.g., a barcode reader) the identity information from the access control card (102A inFIG. 1 ) and a transmitter for transmitting the information obtained from the access control card (102A inFIG. 1 ) to theaccess control computer 104, e.g., a first server. Transmission of the identity information may be made wirelessly using any suitable form of radio communication, including, without limitation, a 433 MHz multichannel two-way radio channel, or may be made using a wired communication channel. Theaccess control device 102B if so configured may require little power to operate, such as between about 1.5 and 3.6 V and may be powered using, for example, a local battery for wireless communication embodiments. In some embodiments, communication between theaccess control device 102B, theoperator control device 102 and themachine 120 may be performed by hard wiring, for example, into theparticular machine 120 or equipment to be operated. - Referring once again to
FIG. 1 , the access control computer (first server) 104 may comprise access to externally stored or internally stored identity information for at least one human operator, or for a plurality of specific human operators at a particular equipment or machinery physical location. The identity information included on the access control computer (first server) 104 may comprise information related to the training status for each human operator. For example, training status may include eachmachine 120 that a particular human operator has certified training to operate and the start and end dates for which such certified training is valid. Training status for each human operator may comprise corresponding training information for more than onemachine 120. Theaccess control computer 104 may comprise aclock 104E for timing operations performed by thecentral processor 104B. The access control computer (first server) 104 may include any form of data storage andretrieval device 104D, e.g., an external memory or hard drive where the identity information for each human operator is stored and can be interrogated by the access control computer (first server) 104. Theprocessor 104B in the data storage andaccess control computer 104 is operable to interrogate stored training information on request from theaccess control computer 104 for each human operator who presents an access control card (102A inFIG. 2 ) to anaccess control device 102B. If the human operator identity information is valid with respect to operation of theparticular machine 120, an access approval signal or message may be communicated from access control computer (first server) 104 to the particularaccess control device 102B using, for example and without limitation, aradio modem 104A in wireless communication with theaccess control device 102B. Theaccess control device 102B may receive an access approval signal or message from theaccess control computer 104 and then enables operation of thespecific machine 120 by the specific human operator using the relevantoperator control device 102. - In some embodiments, enabling control of the
specific machine 120 may comprise thespecific machine 120 being connected to an electric power supply by theaccess control device 102B or by the access control computer (first server) 104. In some embodiments, the particularaccess control device 102B associated with the correspondingoperator control device 102 may be activated to enable control of theparticular machine 120 by the particular human operator or any other human operator having valid stored identity information by causing theaccess control device 102B to enable or activate the machineoperator control device 102. If the identity information is not valid with respect to theparticular machine 120, the access control computer (first server) 104 may not send any approval signal or message and themachine 120 and/or the associatedoperator control device 102 will not be activated Thus, if the human operator'saccess control card 102A has valid identity information to authorize use of theparticular machine 120, then theaccess control device 102B will be activated by the access control computer (first server) 104 to permit the human operator to use theparticular machine 120. If, on the other hand, the human operator'saccess control card 102A does not have valid identity information to enable the human operator to use theparticular machine 120, then theaccess control device 102B prevents operation of theparticular machine 120, e.g., by not enabling themachine operator control 102 or theaccess control computer 104 may not send a power-up command to the machine or an activation signal to the machine operator control. Such denial of operation may also be effected by having the access control computer (first server) 104 not send an actuation signal or message to the relevantaccess control device 102B ormachine operator control 102. - The
processor 104B associated with the access control computer (first server) 104 may monitor at least one parameter of the selectedmachine 120. Examples of machine parameters to be monitored include operating hours, the identity of the human operator who operated the particular machine, machine loads, machine temperatures, etc. Such parameters may be measured by one ormore sensors 121 associated with eachmachine 120. Thesensors 121 may be in signal communication with theprocessor 104B either by a wired signal channel (e.g., Ethernet, RS-232 serial connection, USB connection) or by a wireless channel, e.g., IEEE 802.11n or 802.11ac standard wireless channel. - A computer display or monitor 106B may also be in signal communication with a
monitoring computer 106. Themonitoring computer 106 may be in signal communication with the access control computer, for example, by serial connection such as RS-232 or USB. Themonitor 106B may display some or all of the identity information, such as an operator name, and the particular machine when that operator is permitted to operate theparticular machine 120. Thedisplay 106B may also display the one or more measured parameters for one or morespecific machines 120. - The machine(s) 120 may be, for example, any machine used in manufacturing. Examples of such machines include, without limiting the scope of the present disclosure, a heating oven, a forklift, an overhead crane, a break out machine, grinding machine, shock machine, and/or a key box. Other examples of machines may include presses, lathes, injection molding machines, fastening equipment, etc.
- The
monitoring computer 106 may be in signal communication with a remote data storage computer orserver 105. Machine parameters and identity information may be communicated to the remotedata storage server 105 from themonitoring computer 106, e.g., usingwireless communication devices remote server 105 may include a processor (not shown separately) that can perform analysis, e.g., statistical analysis, on the measured machine parameters and communicate the analysis results to a computer in or associated with themonitoring computer 106. Communication may also be performed using Ethernet cable, RS-232 serial cable, USB connection wired channel or otherwise communicated using any form of wired or wireless signal communication channel. - Signal output from the
various sensors 121 associated with eachmachine 120 may be input to theaccess control computer 104 for local processing therein or for communication to themonitoring computer 106 and/orremote server 105. - A method for restricting usage of a machine by a human operator includes initiating signal communication between an
access control device 102B on a selectedmachine 120 and anaccess control card 102A in the possession of any human operator intending to use the selectedmachine 120. Theaccess control card 102A includes identity information related to the human operator, such as a name and/or employee number. The human operator selectively presents theaccess control card 102A to theaccess device 102B on the selectedmachine 120 when the human operator is ready to use themachine 120. The human operator will place theaccess control card 102A on or near theaccess control device 102B such that theaccess control card 102A may be interrogated by theaccess control device 102B. - Identity information stored on the
access control card 102A presented by the human operator is communicated to theaccess control device 102B. The identity information is then communicated from theaccess control device 102B to an access control computer (first server) 106. The identity information may be communicated using any suitable wired or wireless communication technique, including, without limitation, radio frequency such as multichannel 433 MHz radio. - Identity information related to the training status of each operator for each machine in a particular location may be provided to the access control computer (first server) 104. The
first server 104 may include aprocessor 104B capable of interrogating identity information and determining whether the identity information is valid for the selectedmachine 120 and the particular human operator. While the above described embodiment has identity information stored on a localdata storage device 104D, some or all of the same identity information may be stored on theaccess control card 102A. - If the operator has identity information that is valid, then the access control computer (first server) 104 communicates via wired or wireless connection to the
access control device 102B that the operator may use the selected machine or equipment. If the operator's identity information is invalid, e.g., the human operator has not successfully completed training for thespecific machine 120 or the training is out-of-date, then the access control computer (first server) 104 may communicate an access authorization signal using wired or wireless communication to theaccess control device 102B that the human operator is not authorized to operate the selectedmachine 120 and access tosuch machine 120 is not enabled by theaccess control device 102B. In other embodiments, an access approval signal may simply not be communicated to theaccess control device 102B by thefirst server 106 when the identity information on theaccess control card 102A is not valid to enable operation of the specific machine. - Information including certain identity information of the operator, such as an operator name, and the selected machine may be displayed by a
monitor 106B in signal communication with themonitoring computer 106. - Selected equipment may include a
control device 102 configured to operate an associatedmachine 120. When a human operator activates thecontrol device 102 of the selected machine by using theaccess control card 102A, the identity information stored on theaccess control card 102A may be sent to the access control computer (first server) 104 e.g., by radio communication or wired communication. The access control computer (first server) 104 validates the identity information by interrogating the data storage andretrieval device 104D to enable activating the machine or equipment by the specific human operator. If the identity information is valid, the access control computer (first server) 104 may send an activation signal or message e.g., through the radio or wired signal communication channel to enable the human operator to activate the specific machine or equipment. Some of the identity information and machine operating parameters may be displayed on themonitor 106B and sent to theremote server 105 for analysis, e.g., times of use of eachmachine 120, name of operator of eachmachine 120, and any of a number of sensor-derived machine operating parameters. In some embodiments, the functions of theaccess control computer 104 and themonitoring computer 106 may be performed by the same computer and/or processor. - The described
system 100 may facilitate confirming training statuses of individual human operators on all machines or equipment through the identity information associated with eachaccess control card 102A, making it unnecessary for the human operator to surrender theaccess control card 102A when, for example, training has expired or the human operator is no longer provided access to the physical location of the machine(s) such as on termination of employment or transfer of the human operator to a different facility. Parameters that may be monitored for the machine(s) or equipment may include the equipment name or identification number, location, time in use, human operators using such equipment, as well as operational data. Such data may be communicated to theremote server 105 and real time analysis may be performed. Such analysis may include how efficiently each human operator operates eachrespective machine 120, and the amount of time each operator uses eachmachine 120. Attempts to gain access to aspecific machine 120 by an operator not having correct identifying information may be recorded and communicated (e.g., wirelessly) to a remote system operator to identify inappropriate human operator behavior, or the presence of an unauthorized person attempting to gain access to operation of aspecific machine 120. - The
system 100 may be programmed (e.g., in access control computer 106) such that any initial safety controls are satisfied prior to permitting a human operator to operate a selected machine. 120 One such example of this type of restricted access is that thesystem 100 would confirm that a daily crane check operation was performed prior to permitting any operator to use a crane. A priori safety or pre-use inspection records may be associated with enabling operation of anyother machine 120 in a similar manner. - The
system 100 may display the selectedmachine 120 and the operator's name using such selected machine on themonitor 106B. Such operation can prevent attempts by another operator to activate a selectedmachine 120 without anaccess control card 102A. -
FIG. 3 shows an example of thedisplay 106B. The display inFIG. 3 shows eachmachine 110, theoperator 112 who has gained access to any one or more machines including animage 114 of the particular operator. In this way, a system supervisor can readily determine which machines are in use and by which human operators. -
FIG. 4 shows anexample input display 116 to the data analysis computer (105 inFIG. 1 ) wherein specific machines, times of operation and other calculated operating information may be requested in certain forms, e.g., histograms or graphs. -
FIG. 5 shows example machine operation parameters obtained from the remote server (105 inFIG. 1 ) that may be displayed 118 in bar graph and histogram forms, as non-limiting examples. Any of the measurements made by the respective sensors (121 inFIG. 1 ) may displayed in correspondence with the times at which each authorized human operator uses the specific machine (120 inFIG. 1 ) so that how well each human operator controls each respective machine (120 inFIG. 1 ) may be displayed. Identity information, for example, imminent expiration of a certain human operator's qualifying training, may be displayed by the analysis computer or the access control computer so that the system supervisor may be able to take corrective action (e.g., scheduling qualifying training) with respect to such human operator. - While the claimed subject matter has been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this disclosure, will appreciate that other embodiments can be devised which do not depart from the scope of the claimed subject matter as disclosed herein. Accordingly, the scope of the claimed subject matter should be limited only by the attached claims.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/564,323 US20200005565A1 (en) | 2015-10-01 | 2019-09-09 | System and method to control access to hazardous machines |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU2015141877A RU2718414C2 (en) | 2015-10-01 | 2015-10-01 | System and method for controlling access to potentially hazardous equipment |
RU2015141877 | 2015-10-01 | ||
PCT/US2016/054612 WO2017059174A1 (en) | 2015-10-01 | 2016-09-30 | System and method to control access to hazardous machines |
US201815765164A | 2018-03-30 | 2018-03-30 | |
US16/564,323 US20200005565A1 (en) | 2015-10-01 | 2019-09-09 | System and method to control access to hazardous machines |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/765,164 Continuation US10410443B2 (en) | 2015-10-01 | 2016-09-30 | System and method to control access to hazardous machines |
PCT/US2016/054612 Continuation WO2017059174A1 (en) | 2015-10-01 | 2016-09-30 | System and method to control access to hazardous machines |
Publications (1)
Publication Number | Publication Date |
---|---|
US20200005565A1 true US20200005565A1 (en) | 2020-01-02 |
Family
ID=58424326
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/765,164 Expired - Fee Related US10410443B2 (en) | 2015-10-01 | 2016-09-30 | System and method to control access to hazardous machines |
US16/564,323 Abandoned US20200005565A1 (en) | 2015-10-01 | 2019-09-09 | System and method to control access to hazardous machines |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/765,164 Expired - Fee Related US10410443B2 (en) | 2015-10-01 | 2016-09-30 | System and method to control access to hazardous machines |
Country Status (3)
Country | Link |
---|---|
US (2) | US10410443B2 (en) |
RU (2) | RU2718414C2 (en) |
WO (1) | WO2017059174A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2718414C2 (en) * | 2015-10-01 | 2020-04-02 | Шлюмбергер Текнолоджи Б.В. | System and method for controlling access to potentially hazardous equipment |
WO2020186319A1 (en) * | 2019-03-21 | 2020-09-24 | Mizer Rogerio Hess | Access control and electronic locking method for hazardous areas, and related equipment |
EP3842978A1 (en) * | 2019-12-24 | 2021-06-30 | Danfoss Power Solutions Inc. | Controlled units security system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050125661A1 (en) * | 2003-11-07 | 2005-06-09 | Nokia Corporation | Operator root cetificates |
US7032816B2 (en) * | 2001-12-28 | 2006-04-25 | Kimberly-Clark Worldwide, Inc. | Communication between machines and feed-forward control in event-based product manufacturing |
US20070078536A1 (en) * | 2005-09-30 | 2007-04-05 | Rockwell Automation Technologies, Inc. | Production monitoring and control system having organizational structure-based presentation layer |
US20080191845A1 (en) * | 2007-02-09 | 2008-08-14 | Symbol Technologies, Inc. | Location-Based Power Management in RFID Applications |
US20140218169A1 (en) * | 2013-02-07 | 2014-08-07 | Claridy Solutions, Inc. | Security device for equipment information and the operation method thereof |
US8941464B2 (en) * | 2005-10-21 | 2015-01-27 | Honeywell International Inc. | Authorization system and a method of authorization |
US20150287253A1 (en) * | 2014-04-03 | 2015-10-08 | Panasonic Intellectual Property Management Co., Ltd. | Method for managing information |
US20150324072A1 (en) * | 2012-01-06 | 2015-11-12 | Lg Electronics Inc. | Mobile terminal |
US20180293822A1 (en) * | 2015-10-01 | 2018-10-11 | Schlumberger Technology Corporation | System and method to control access to hazardous machines |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CZ290839B6 (en) | 1999-05-10 | 2002-10-16 | Zdeněk Ing. Procházka | Circuit arrangement of entry units into protected rooms |
US6850153B1 (en) * | 1999-07-07 | 2005-02-01 | The Regents Of The University Of California | Vehicle sharing system and method for controlling or securing vehicle access and/or enablement |
US6964024B2 (en) | 2001-02-07 | 2005-11-08 | Xerox Corporation | Operator-defined visitation sequence of client user interface controls |
US20090062950A1 (en) | 2007-08-27 | 2009-03-05 | Ren An Information Technology Co., Ltd. | System and method for monitoring production of cnc machines |
US20090143878A1 (en) * | 2007-12-04 | 2009-06-04 | Caterpillar Inc. | Operator profile control system for a machine |
WO2009114940A1 (en) * | 2008-03-17 | 2009-09-24 | Intelligent Mechatronic Systems Inc. | Roadside and emergency assistance system |
US20100289616A1 (en) | 2009-05-18 | 2010-11-18 | Ali Tehranchi | Movable barrier system adapted to utilize biometric technology to identify and authorize access to premises |
DE102013200777A1 (en) * | 2013-01-18 | 2014-07-24 | Ford Global Technologies, Llc | Method and device for vehicle access control |
-
2015
- 2015-10-01 RU RU2015141877A patent/RU2718414C2/en active
-
2016
- 2016-09-30 RU RU2018115807A patent/RU2720443C1/en active
- 2016-09-30 WO PCT/US2016/054612 patent/WO2017059174A1/en active Application Filing
- 2016-09-30 US US15/765,164 patent/US10410443B2/en not_active Expired - Fee Related
-
2019
- 2019-09-09 US US16/564,323 patent/US20200005565A1/en not_active Abandoned
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7032816B2 (en) * | 2001-12-28 | 2006-04-25 | Kimberly-Clark Worldwide, Inc. | Communication between machines and feed-forward control in event-based product manufacturing |
US20050125661A1 (en) * | 2003-11-07 | 2005-06-09 | Nokia Corporation | Operator root cetificates |
US20070078536A1 (en) * | 2005-09-30 | 2007-04-05 | Rockwell Automation Technologies, Inc. | Production monitoring and control system having organizational structure-based presentation layer |
US8941464B2 (en) * | 2005-10-21 | 2015-01-27 | Honeywell International Inc. | Authorization system and a method of authorization |
US20080191845A1 (en) * | 2007-02-09 | 2008-08-14 | Symbol Technologies, Inc. | Location-Based Power Management in RFID Applications |
US20150324072A1 (en) * | 2012-01-06 | 2015-11-12 | Lg Electronics Inc. | Mobile terminal |
US20140218169A1 (en) * | 2013-02-07 | 2014-08-07 | Claridy Solutions, Inc. | Security device for equipment information and the operation method thereof |
US20150287253A1 (en) * | 2014-04-03 | 2015-10-08 | Panasonic Intellectual Property Management Co., Ltd. | Method for managing information |
US20180293822A1 (en) * | 2015-10-01 | 2018-10-11 | Schlumberger Technology Corporation | System and method to control access to hazardous machines |
Also Published As
Publication number | Publication date |
---|---|
RU2015141877A (en) | 2017-04-06 |
US20180293822A1 (en) | 2018-10-11 |
WO2017059174A1 (en) | 2017-04-06 |
RU2015141877A3 (en) | 2019-04-15 |
US10410443B2 (en) | 2019-09-10 |
RU2720443C1 (en) | 2020-04-29 |
RU2718414C2 (en) | 2020-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200005565A1 (en) | System and method to control access to hazardous machines | |
JP5129857B2 (en) | Dynamically programmable RFID transponder | |
EP2770482B1 (en) | Access control systems and method using a smart phone | |
EP1973055B1 (en) | Read unit and method for low energy detection of a transponder | |
EP3188082B1 (en) | Safety lockout systems and methods | |
JP2004528655A (en) | Frequency method | |
CN101923677B (en) | Data storage system and data storage method | |
EP3061040B1 (en) | Document with a contactless chip card interface and electronic system | |
CN106575107A (en) | Security control system for granting access and security control method thereof | |
KR20200057778A (en) | Fluid distribution meter permit | |
DE102004061452A1 (en) | Multiple RFID anti-collision polling method | |
WO2007093580A1 (en) | Smart card with identity checking | |
CN110688551A (en) | RFID-based security file whole-process management system and method | |
US20100079250A1 (en) | Information-Processing Device and System For Restricting Use of the Device | |
CN109426719B (en) | Equipment verification management method and verification management system | |
EP3062294A1 (en) | Method and devices for upgrading an existing access control system | |
GB2428116A (en) | Controlling access to a workstation via wireless communication | |
JP6592937B2 (en) | Authentication system, authentication control device program | |
CN212990225U (en) | Intelligent tool cabinet and tool management system | |
CN113379952B (en) | Sharing management method and sharing management device for house key | |
KR101608384B1 (en) | Smart card with E-Ink Display | |
EP3017433B1 (en) | Secure mode for electronic access control readers | |
JP2022510589A (en) | Energy supply devices, energy supply systems, and methods of operating energy supply systems | |
EP3193312B1 (en) | Key device with an integrated wireless data reader | |
CN112272160B (en) | Host security information calling method, system, intelligent terminal and computer storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |