US20200005565A1 - System and method to control access to hazardous machines - Google Patents

System and method to control access to hazardous machines Download PDF

Info

Publication number
US20200005565A1
US20200005565A1 US16/564,323 US201916564323A US2020005565A1 US 20200005565 A1 US20200005565 A1 US 20200005565A1 US 201916564323 A US201916564323 A US 201916564323A US 2020005565 A1 US2020005565 A1 US 2020005565A1
Authority
US
United States
Prior art keywords
access control
machine
identity information
control device
human operator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/564,323
Inventor
James Peach
Pavel Mikhailovich Podgurskiy
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Schlumberger Technology Corp
Original Assignee
Schlumberger Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Schlumberger Technology Corp filed Critical Schlumberger Technology Corp
Priority to US16/564,323 priority Critical patent/US20200005565A1/en
Publication of US20200005565A1 publication Critical patent/US20200005565A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • G07C9/00087
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Definitions

  • the present disclosure relates to safety devices for controlling access to and use of hazardous machinery and equipment. More specifically, the disclosure relates to hazardous machinery access controls activated by access control cards issued to users of such machinery and equipment.
  • Equipment and machinery located can be hazardous to personnel in the area proximate the equipment and machinery.
  • Using machinery or equipment with inadequate training or with inadequate control over access to the equipment can result in injury to the user or other personnel, damage to the equipment, harm to business reputation of the equipment's owner or controlling entity, non-productive time due to incident investigation or equipment damage, and, in extreme cases, loss of life.
  • the disclosure is generally related to a system for controlling usage of a machine by a human operator.
  • the system includes an access control card containing identity information related to the operator, an access control device in signal communication with an operating control of a selected machine and selectively in communication with the access control card and an access control computer in communication with the access control device.
  • the identity information is communicated from the access control card to the access control device.
  • the access control computer include identity information for at least one human operator. Identity information from the access control card is communicated to the access control card from the access control device and then to the access control computer.
  • the access control computer compares the identity information from the access control card to stored identity information to identify whether the human operator identity information is consistent with the required qualifications to operate the selected machine.
  • the access control computer communicates to the access control device that the human operator is or is not authorized to operate the selected machine.
  • the access control device permits control instruction from the human operator to the machine when the operator is determined to be qualified to operate the selected machine.
  • the present disclosure is related to a method for restricting usage of a machine to authorized human operator(s).
  • the method includes entering into or placing proximate an access control device associated with a selected machine an access control card including identity information for a human operator.
  • the method further includes communicating the identity information from the access control card to the access control device and from the access control device to an access control computer.
  • Identity information for the operator stored on the server is compared to the identity information communicated from the access control card. The result of the comparison is communicated to the access control device.
  • the access control device permits the operator to operate the selected machine when the comparison communicated indicates the operator is currently authorized to operate the selected machine or restricts the operator from operating the selected machine when the comparison indicates the operator is not currently authorized to operate the machine.
  • FIG. 1 is a schematic view of an example system according to the present disclosure.
  • FIGS. 2A and 2B show an example embodiment of a remote control for a machine having an access control device and an access control card according to the present disclosure.
  • FIG. 3 shows an example embodiment of a display showing machines in use and the operators have access thereto.
  • FIG. 4 shows an example data input display to enable calculation of relevant usage information for each of a plurality of operated machines.
  • FIG. 5 shows an example embodiment of a display screen for accumulated operating data for a specific machine and is operators.
  • the present disclosure relates to a system 100 for controlling or restricting usage of or access to one or more machines 120 by one or more human operators.
  • Each human operator who is authorized use a particular machine 120 may have assigned to him an access control card ( 102 A in FIG. 2A ), such as a smart card (having, for example, an embedded electrically erasable programmable read-only memory chip—EEPROM), a magnetic data recording strip, a bar code or a radio frequency identification (RFID) element.
  • EEPROM electrically erasable programmable read-only memory chip
  • RFID radio frequency identification
  • the access control card ( 102 A in FIG. 2A ) contains certain identifying information related to the particular human operator.
  • the access control card ( 102 A in FIG. 2A ) may, for example, be embedded in or be part of an employee identification badge or similar instrument.
  • Information encoded on the access control card ( 102 A in FIG. 2A ) relates to the human operator by including information such as, for example and without limitation, the name of the person and a unique identifier, such as an employee number, for example, as well as data concerning any machine or equipment operation training and/or qualification and the effective dates of such training and/or qualification. Such information will hereafter be referred to as “identity information.”
  • the access control card ( 102 A in FIG. 2 ) may include the identity information in such a way that it is electronically readable by another device, to be explained further with reference to FIG. 2A .
  • Example devices for reading the identity information from the access control card may include an access control module 102 B in signal communication with an operator control device 102 .
  • the operator control device 102 may be a control for operating an associated machine 120 .
  • the operator control device is in signal communication with a respective machine 120 or equipment to be controlled by a human operator.
  • Signal communication between the operator control device 102 and the machine 120 or equipment may be wireless as shown in FIG. 1 , e.g., using communication protocol such as IEEE standard 802.11n or 802.11ac or other radio communication channel.
  • the operator control device 102 may communicate with the machine 120 using a low power radio frequency communication, for example and without limitation a multichannel 433 MHz bi-directional radio system.
  • communication between the operator control device 102 and the machine 120 may be conducted over wires, e.g., a CATS or CAT6 Ethernet cable.
  • a human operator attempting to gain access to a particular machine 120 for use in the operator's job duties will cause the access control card ( 102 A in FIG. 2A ) to communicate with the access control device 102 B associated with or in signal communication with a respective operator control device 102 to enable control of the specific machine 120 .
  • the access control device 102 B may be in signal communication directly with an access control computer 104 , to be explained further below.
  • the access control device 102 B may comprise a card reader 103 C which is configured to interrogate information stored on the access control card ( 102 A in FIG. 2A ) inserted into or placed proximate the card reader 103 C.
  • a controller 103 B decodes and communicates information from the interrogated access control card ( 102 A in FIG. 2A ) to a radio modem 103 A.
  • the radio modem 103 A may be in communication with a corresponding radio modem 104 A in an access control computer 104 (which may be a server or other general purpose programmable computer).
  • interrogation of the access control card 102 A may be performed, for example, by inserting or placing the access control card 102 A into or in proximity to the access control device 102 B or similar interface that may be associated with the machine or equipment operator control device 102 .
  • the access control device 102 B may include an electronic mechanism (see 103 A, 103 B, 103 C in FIG. 1 ) for reading the access control card 102 A presented by the human operator. The structure of such mechanism will be related to the type of identity information stored on the access control card 102 A.
  • FIG. 2B shows a human operator using the operator control device 102 having its access control device 102 B attached thereto.
  • the access control device 102 B may include the above described card reader 103 C, e.g., a receiver for receiving (e.g., magnetic data strip reader or RFID interrogation element) or a reader for reading (e.g., a barcode reader) the identity information from the access control card ( 102 A in FIG. 1 ) and a transmitter for transmitting the information obtained from the access control card ( 102 A in FIG. 1 ) to the access control computer 104 , e.g., a first server. Transmission of the identity information may be made wirelessly using any suitable form of radio communication, including, without limitation, a 433 MHz multichannel two-way radio channel, or may be made using a wired communication channel.
  • a receiver for receiving e.g., magnetic data strip reader or RFID interrogation element
  • a reader for reading e.g., a barcode reader
  • Transmission of the identity information may be made wirelessly using any suitable form of radio communication, including, without limitation, a 433 MHz multichannel two-way radio
  • the access control device 102 B if so configured may require little power to operate, such as between about 1.5 and 3.6 V and may be powered using, for example, a local battery for wireless communication embodiments.
  • communication between the access control device 102 B, the operator control device 102 and the machine 120 may be performed by hard wiring, for example, into the particular machine 120 or equipment to be operated.
  • the access control computer (first server) 104 may comprise access to externally stored or internally stored identity information for at least one human operator, or for a plurality of specific human operators at a particular equipment or machinery physical location.
  • the identity information included on the access control computer (first server) 104 may comprise information related to the training status for each human operator.
  • training status may include each machine 120 that a particular human operator has certified training to operate and the start and end dates for which such certified training is valid. Training status for each human operator may comprise corresponding training information for more than one machine 120 .
  • the access control computer 104 may comprise a clock 104 E for timing operations performed by the central processor 104 B.
  • the access control computer (first server) 104 may include any form of data storage and retrieval device 104 D, e.g., an external memory or hard drive where the identity information for each human operator is stored and can be interrogated by the access control computer (first server) 104 .
  • the processor 104 B in the data storage and access control computer 104 is operable to interrogate stored training information on request from the access control computer 104 for each human operator who presents an access control card ( 102 A in FIG. 2 ) to an access control device 102 B.
  • an access approval signal or message may be communicated from access control computer (first server) 104 to the particular access control device 102 B using, for example and without limitation, a radio modem 104 A in wireless communication with the access control device 102 B.
  • the access control device 102 B may receive an access approval signal or message from the access control computer 104 and then enables operation of the specific machine 120 by the specific human operator using the relevant operator control device 102 .
  • enabling control of the specific machine 120 may comprise the specific machine 120 being connected to an electric power supply by the access control device 102 B or by the access control computer (first server) 104 .
  • the particular access control device 102 B associated with the corresponding operator control device 102 may be activated to enable control of the particular machine 120 by the particular human operator or any other human operator having valid stored identity information by causing the access control device 102 B to enable or activate the machine operator control device 102 .
  • the access control computer (first server) 104 may not send any approval signal or message and the machine 120 and/or the associated operator control device 102 will not be activated
  • the access control device 102 B will be activated by the access control computer (first server) 104 to permit the human operator to use the particular machine 120 .
  • the access control device 102 B prevents operation of the particular machine 120 , e.g., by not enabling the machine operator control 102 or the access control computer 104 may not send a power-up command to the machine or an activation signal to the machine operator control. Such denial of operation may also be effected by having the access control computer (first server) 104 not send an actuation signal or message to the relevant access control device 102 B or machine operator control 102 .
  • the processor 104 B associated with the access control computer (first server) 104 may monitor at least one parameter of the selected machine 120 .
  • machine parameters to be monitored include operating hours, the identity of the human operator who operated the particular machine, machine loads, machine temperatures, etc. Such parameters may be measured by one or more sensors 121 associated with each machine 120 .
  • the sensors 121 may be in signal communication with the processor 104 B either by a wired signal channel (e.g., Ethernet, RS-232 serial connection, USB connection) or by a wireless channel, e.g., IEEE 802.11n or 802.11ac standard wireless channel.
  • a computer display or monitor 106 B may also be in signal communication with a monitoring computer 106 .
  • the monitoring computer 106 may be in signal communication with the access control computer, for example, by serial connection such as RS-232 or USB.
  • the monitor 106 B may display some or all of the identity information, such as an operator name, and the particular machine when that operator is permitted to operate the particular machine 120 .
  • the display 106 B may also display the one or more measured parameters for one or more specific machines 120 .
  • the machine(s) 120 may be, for example, any machine used in manufacturing. Examples of such machines include, without limiting the scope of the present disclosure, a heating oven, a forklift, an overhead crane, a break out machine, grinding machine, shock machine, and/or a key box. Other examples of machines may include presses, lathes, injection molding machines, fastening equipment, etc.
  • the monitoring computer 106 may be in signal communication with a remote data storage computer or server 105 .
  • Machine parameters and identity information may be communicated to the remote data storage server 105 from the monitoring computer 106 , e.g., using wireless communication devices 105 A, 106 A, respectively.
  • the wireless communication devices may be radio communication devices using, for example, IEEE standard 802.11n or 802.11ac communication protocol.
  • the remote server 105 may include a processor (not shown separately) that can perform analysis, e.g., statistical analysis, on the measured machine parameters and communicate the analysis results to a computer in or associated with the monitoring computer 106 . Communication may also be performed using Ethernet cable, RS-232 serial cable, USB connection wired channel or otherwise communicated using any form of wired or wireless signal communication channel.
  • Signal output from the various sensors 121 associated with each machine 120 may be input to the access control computer 104 for local processing therein or for communication to the monitoring computer 106 and/or remote server 105 .
  • a method for restricting usage of a machine by a human operator includes initiating signal communication between an access control device 102 B on a selected machine 120 and an access control card 102 A in the possession of any human operator intending to use the selected machine 120 .
  • the access control card 102 A includes identity information related to the human operator, such as a name and/or employee number.
  • the human operator selectively presents the access control card 102 A to the access device 102 B on the selected machine 120 when the human operator is ready to use the machine 120 .
  • the human operator will place the access control card 102 A on or near the access control device 102 B such that the access control card 102 A may be interrogated by the access control device 102 B.
  • Identity information stored on the access control card 102 A presented by the human operator is communicated to the access control device 102 B.
  • the identity information is then communicated from the access control device 102 B to an access control computer (first server) 106 .
  • the identity information may be communicated using any suitable wired or wireless communication technique, including, without limitation, radio frequency such as multichannel 433 MHz radio.
  • Identity information related to the training status of each operator for each machine in a particular location may be provided to the access control computer (first server) 104 .
  • the first server 104 may include a processor 104 B capable of interrogating identity information and determining whether the identity information is valid for the selected machine 120 and the particular human operator. While the above described embodiment has identity information stored on a local data storage device 104 D, some or all of the same identity information may be stored on the access control card 102 A.
  • the access control computer (first server) 104 communicates via wired or wireless connection to the access control device 102 B that the operator may use the selected machine or equipment. If the operator's identity information is invalid, e.g., the human operator has not successfully completed training for the specific machine 120 or the training is out-of-date, then the access control computer (first server) 104 may communicate an access authorization signal using wired or wireless communication to the access control device 102 B that the human operator is not authorized to operate the selected machine 120 and access to such machine 120 is not enabled by the access control device 102 B. In other embodiments, an access approval signal may simply not be communicated to the access control device 102 B by the first server 106 when the identity information on the access control card 102 A is not valid to enable operation of the specific machine.
  • Information including certain identity information of the operator, such as an operator name, and the selected machine may be displayed by a monitor 106 B in signal communication with the monitoring computer 106 .
  • Selected equipment may include a control device 102 configured to operate an associated machine 120 .
  • the identity information stored on the access control card 102 A may be sent to the access control computer (first server) 104 e.g., by radio communication or wired communication.
  • the access control computer (first server) 104 validates the identity information by interrogating the data storage and retrieval device 104 D to enable activating the machine or equipment by the specific human operator. If the identity information is valid, the access control computer (first server) 104 may send an activation signal or message e.g., through the radio or wired signal communication channel to enable the human operator to activate the specific machine or equipment.
  • Some of the identity information and machine operating parameters may be displayed on the monitor 106 B and sent to the remote server 105 for analysis, e.g., times of use of each machine 120 , name of operator of each machine 120 , and any of a number of sensor-derived machine operating parameters.
  • the functions of the access control computer 104 and the monitoring computer 106 may be performed by the same computer and/or processor.
  • the described system 100 may facilitate confirming training statuses of individual human operators on all machines or equipment through the identity information associated with each access control card 102 A, making it unnecessary for the human operator to surrender the access control card 102 A when, for example, training has expired or the human operator is no longer provided access to the physical location of the machine(s) such as on termination of employment or transfer of the human operator to a different facility.
  • Parameters that may be monitored for the machine(s) or equipment may include the equipment name or identification number, location, time in use, human operators using such equipment, as well as operational data. Such data may be communicated to the remote server 105 and real time analysis may be performed. Such analysis may include how efficiently each human operator operates each respective machine 120 , and the amount of time each operator uses each machine 120 .
  • Attempts to gain access to a specific machine 120 by an operator not having correct identifying information may be recorded and communicated (e.g., wirelessly) to a remote system operator to identify inappropriate human operator behavior, or the presence of an unauthorized person attempting to gain access to operation of a specific machine 120 .
  • the system 100 may be programmed (e.g., in access control computer 106 ) such that any initial safety controls are satisfied prior to permitting a human operator to operate a selected machine. 120
  • any initial safety controls are satisfied prior to permitting a human operator to operate a selected machine.
  • One such example of this type of restricted access is that the system 100 would confirm that a daily crane check operation was performed prior to permitting any operator to use a crane.
  • a priori safety or pre-use inspection records may be associated with enabling operation of any other machine 120 in a similar manner.
  • the system 100 may display the selected machine 120 and the operator's name using such selected machine on the monitor 106 B. Such operation can prevent attempts by another operator to activate a selected machine 120 without an access control card 102 A.
  • FIG. 3 shows an example of the display 106 B.
  • the display in FIG. 3 shows each machine 110 , the operator 112 who has gained access to any one or more machines including an image 114 of the particular operator. In this way, a system supervisor can readily determine which machines are in use and by which human operators.
  • FIG. 4 shows an example input display 116 to the data analysis computer ( 105 in FIG. 1 ) wherein specific machines, times of operation and other calculated operating information may be requested in certain forms, e.g., histograms or graphs.
  • FIG. 5 shows example machine operation parameters obtained from the remote server ( 105 in FIG. 1 ) that may be displayed 118 in bar graph and histogram forms, as non-limiting examples. Any of the measurements made by the respective sensors ( 121 in FIG. 1 ) may displayed in correspondence with the times at which each authorized human operator uses the specific machine ( 120 in FIG. 1 ) so that how well each human operator controls each respective machine ( 120 in FIG. 1 ) may be displayed. Identity information, for example, imminent expiration of a certain human operator's qualifying training, may be displayed by the analysis computer or the access control computer so that the system supervisor may be able to take corrective action (e.g., scheduling qualifying training) with respect to such human operator.
  • corrective action e.g., scheduling qualifying training

Abstract

A system and method for controlling usage of a machine by an operator includes a card containing identity information related to the operator selectively in communication with an access device and a first server is in communication with the access device. The identity information is communicated to the access device. The first server includes training information for at least one operator and at least one training certificate. Identity information is communicated to the first server from the access device and the first server compares the identity information to the training information to identify whether the operator has a training certificate for the selected machine. The first server communicates to the access device that the operator does or does not have a training certificate for the selected machine. The access device permits instruction from the operator to the machine when the operator does have a training certificate for the selected machine.

Description

    PRIORITY
  • This application claims priority as a continuation application of U.S. patent Ser. No. 10/410,443 with the same title and a filing date of Mar. 30, 2018 which claims priority to PCT Patent Application Number PCT/US2016/054612 with the same title and a filing date of Sep. 30, 2016 which claims priority to Russian Federation Patent Application Number 2015141877 filed on Oct. 1, 2015. All three applications in their entirety are incorporated by reference herein.
  • BACKGROUND
  • The present disclosure relates to safety devices for controlling access to and use of hazardous machinery and equipment. More specifically, the disclosure relates to hazardous machinery access controls activated by access control cards issued to users of such machinery and equipment.
  • Equipment and machinery located, e.g., in a manufacturing facility, can be hazardous to personnel in the area proximate the equipment and machinery. Using machinery or equipment with inadequate training or with inadequate control over access to the equipment can result in injury to the user or other personnel, damage to the equipment, harm to business reputation of the equipment's owner or controlling entity, non-productive time due to incident investigation or equipment damage, and, in extreme cases, loss of life.
  • It would be helpful to have a system for controlling access to and use of hazardous equipment and machinery so that only suitably trained individuals are able to use the equipment and machinery.
  • SUMMARY
  • In one aspect, the disclosure is generally related to a system for controlling usage of a machine by a human operator. The system includes an access control card containing identity information related to the operator, an access control device in signal communication with an operating control of a selected machine and selectively in communication with the access control card and an access control computer in communication with the access control device. The identity information is communicated from the access control card to the access control device. The access control computer include identity information for at least one human operator. Identity information from the access control card is communicated to the access control card from the access control device and then to the access control computer. The access control computer compares the identity information from the access control card to stored identity information to identify whether the human operator identity information is consistent with the required qualifications to operate the selected machine. The access control computer communicates to the access control device that the human operator is or is not authorized to operate the selected machine. The access control device permits control instruction from the human operator to the machine when the operator is determined to be qualified to operate the selected machine.
  • In another aspect, the present disclosure is related to a method for restricting usage of a machine to authorized human operator(s). The method includes entering into or placing proximate an access control device associated with a selected machine an access control card including identity information for a human operator. The method further includes communicating the identity information from the access control card to the access control device and from the access control device to an access control computer. Identity information for the operator stored on the server is compared to the identity information communicated from the access control card. The result of the comparison is communicated to the access control device. The access control device permits the operator to operate the selected machine when the comparison communicated indicates the operator is currently authorized to operate the selected machine or restricts the operator from operating the selected machine when the comparison indicates the operator is not currently authorized to operate the machine.
  • Other aspects and advantages will be apparent from the following description and the appended claims.
  • DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a schematic view of an example system according to the present disclosure.
  • FIGS. 2A and 2B show an example embodiment of a remote control for a machine having an access control device and an access control card according to the present disclosure.
  • FIG. 3 shows an example embodiment of a display showing machines in use and the operators have access thereto.
  • FIG. 4 shows an example data input display to enable calculation of relevant usage information for each of a plurality of operated machines.
  • FIG. 5 shows an example embodiment of a display screen for accumulated operating data for a specific machine and is operators.
  • DETAILED DESCRIPTION
  • Referring to FIG. 1, the present disclosure relates to a system 100 for controlling or restricting usage of or access to one or more machines 120 by one or more human operators. Each human operator who is authorized use a particular machine 120 may have assigned to him an access control card (102A in FIG. 2A), such as a smart card (having, for example, an embedded electrically erasable programmable read-only memory chip—EEPROM), a magnetic data recording strip, a bar code or a radio frequency identification (RFID) element. The access control card (102A in FIG. 2A) contains certain identifying information related to the particular human operator. The access control card (102A in FIG. 2A) may, for example, be embedded in or be part of an employee identification badge or similar instrument. Information encoded on the access control card (102A in FIG. 2A) relates to the human operator by including information such as, for example and without limitation, the name of the person and a unique identifier, such as an employee number, for example, as well as data concerning any machine or equipment operation training and/or qualification and the effective dates of such training and/or qualification. Such information will hereafter be referred to as “identity information.” The access control card (102A in FIG. 2) may include the identity information in such a way that it is electronically readable by another device, to be explained further with reference to FIG. 2A.
  • Example devices for reading the identity information from the access control card (102A in FIG. 2) may include an access control module 102B in signal communication with an operator control device 102. The operator control device 102 may be a control for operating an associated machine 120. The operator control device is in signal communication with a respective machine 120 or equipment to be controlled by a human operator. Signal communication between the operator control device 102 and the machine 120 or equipment may be wireless as shown in FIG. 1, e.g., using communication protocol such as IEEE standard 802.11n or 802.11ac or other radio communication channel. In some embodiments, the operator control device 102 may communicate with the machine 120 using a low power radio frequency communication, for example and without limitation a multichannel 433 MHz bi-directional radio system. In other embodiments, communication between the operator control device 102 and the machine 120 may be conducted over wires, e.g., a CATS or CAT6 Ethernet cable.
  • A human operator attempting to gain access to a particular machine 120 for use in the operator's job duties will cause the access control card (102A in FIG. 2A) to communicate with the access control device 102B associated with or in signal communication with a respective operator control device 102 to enable control of the specific machine 120. In some embodiments, the access control device 102B may be in signal communication directly with an access control computer 104, to be explained further below.
  • In an example embodiment, the access control device 102B may comprise a card reader 103C which is configured to interrogate information stored on the access control card (102A in FIG. 2A) inserted into or placed proximate the card reader 103C. A controller 103B decodes and communicates information from the interrogated access control card (102A in FIG. 2A) to a radio modem 103A. The radio modem 103A may be in communication with a corresponding radio modem 104A in an access control computer 104 (which may be a server or other general purpose programmable computer).
  • Referring to FIG. 2A, interrogation of the access control card 102A may be performed, for example, by inserting or placing the access control card 102A into or in proximity to the access control device 102B or similar interface that may be associated with the machine or equipment operator control device 102. The access control device 102B may include an electronic mechanism (see 103A, 103B, 103C in FIG. 1) for reading the access control card 102A presented by the human operator. The structure of such mechanism will be related to the type of identity information stored on the access control card 102A. FIG. 2B shows a human operator using the operator control device 102 having its access control device 102B attached thereto.
  • Referring once again to FIG. 1, the access control device 102B may include the above described card reader 103C, e.g., a receiver for receiving (e.g., magnetic data strip reader or RFID interrogation element) or a reader for reading (e.g., a barcode reader) the identity information from the access control card (102A in FIG. 1) and a transmitter for transmitting the information obtained from the access control card (102A in FIG. 1) to the access control computer 104, e.g., a first server. Transmission of the identity information may be made wirelessly using any suitable form of radio communication, including, without limitation, a 433 MHz multichannel two-way radio channel, or may be made using a wired communication channel. The access control device 102B if so configured may require little power to operate, such as between about 1.5 and 3.6 V and may be powered using, for example, a local battery for wireless communication embodiments. In some embodiments, communication between the access control device 102B, the operator control device 102 and the machine 120 may be performed by hard wiring, for example, into the particular machine 120 or equipment to be operated.
  • Referring once again to FIG. 1, the access control computer (first server) 104 may comprise access to externally stored or internally stored identity information for at least one human operator, or for a plurality of specific human operators at a particular equipment or machinery physical location. The identity information included on the access control computer (first server) 104 may comprise information related to the training status for each human operator. For example, training status may include each machine 120 that a particular human operator has certified training to operate and the start and end dates for which such certified training is valid. Training status for each human operator may comprise corresponding training information for more than one machine 120. The access control computer 104 may comprise a clock 104E for timing operations performed by the central processor 104B. The access control computer (first server) 104 may include any form of data storage and retrieval device 104D, e.g., an external memory or hard drive where the identity information for each human operator is stored and can be interrogated by the access control computer (first server) 104. The processor 104B in the data storage and access control computer 104 is operable to interrogate stored training information on request from the access control computer 104 for each human operator who presents an access control card (102A in FIG. 2) to an access control device 102B. If the human operator identity information is valid with respect to operation of the particular machine 120, an access approval signal or message may be communicated from access control computer (first server) 104 to the particular access control device 102B using, for example and without limitation, a radio modem 104A in wireless communication with the access control device 102B. The access control device 102B may receive an access approval signal or message from the access control computer 104 and then enables operation of the specific machine 120 by the specific human operator using the relevant operator control device 102.
  • In some embodiments, enabling control of the specific machine 120 may comprise the specific machine 120 being connected to an electric power supply by the access control device 102B or by the access control computer (first server) 104. In some embodiments, the particular access control device 102B associated with the corresponding operator control device 102 may be activated to enable control of the particular machine 120 by the particular human operator or any other human operator having valid stored identity information by causing the access control device 102B to enable or activate the machine operator control device 102. If the identity information is not valid with respect to the particular machine 120, the access control computer (first server) 104 may not send any approval signal or message and the machine 120 and/or the associated operator control device 102 will not be activated Thus, if the human operator's access control card 102A has valid identity information to authorize use of the particular machine 120, then the access control device 102B will be activated by the access control computer (first server) 104 to permit the human operator to use the particular machine 120. If, on the other hand, the human operator's access control card 102A does not have valid identity information to enable the human operator to use the particular machine 120, then the access control device 102B prevents operation of the particular machine 120, e.g., by not enabling the machine operator control 102 or the access control computer 104 may not send a power-up command to the machine or an activation signal to the machine operator control. Such denial of operation may also be effected by having the access control computer (first server) 104 not send an actuation signal or message to the relevant access control device 102B or machine operator control 102.
  • The processor 104B associated with the access control computer (first server) 104 may monitor at least one parameter of the selected machine 120. Examples of machine parameters to be monitored include operating hours, the identity of the human operator who operated the particular machine, machine loads, machine temperatures, etc. Such parameters may be measured by one or more sensors 121 associated with each machine 120. The sensors 121 may be in signal communication with the processor 104B either by a wired signal channel (e.g., Ethernet, RS-232 serial connection, USB connection) or by a wireless channel, e.g., IEEE 802.11n or 802.11ac standard wireless channel.
  • A computer display or monitor 106B may also be in signal communication with a monitoring computer 106. The monitoring computer 106 may be in signal communication with the access control computer, for example, by serial connection such as RS-232 or USB. The monitor 106B may display some or all of the identity information, such as an operator name, and the particular machine when that operator is permitted to operate the particular machine 120. The display 106B may also display the one or more measured parameters for one or more specific machines 120.
  • The machine(s) 120 may be, for example, any machine used in manufacturing. Examples of such machines include, without limiting the scope of the present disclosure, a heating oven, a forklift, an overhead crane, a break out machine, grinding machine, shock machine, and/or a key box. Other examples of machines may include presses, lathes, injection molding machines, fastening equipment, etc.
  • The monitoring computer 106 may be in signal communication with a remote data storage computer or server 105. Machine parameters and identity information may be communicated to the remote data storage server 105 from the monitoring computer 106, e.g., using wireless communication devices 105A, 106A, respectively. The wireless communication devices may be radio communication devices using, for example, IEEE standard 802.11n or 802.11ac communication protocol. The remote server 105 may include a processor (not shown separately) that can perform analysis, e.g., statistical analysis, on the measured machine parameters and communicate the analysis results to a computer in or associated with the monitoring computer 106. Communication may also be performed using Ethernet cable, RS-232 serial cable, USB connection wired channel or otherwise communicated using any form of wired or wireless signal communication channel.
  • Signal output from the various sensors 121 associated with each machine 120 may be input to the access control computer 104 for local processing therein or for communication to the monitoring computer 106 and/or remote server 105.
  • A method for restricting usage of a machine by a human operator includes initiating signal communication between an access control device 102B on a selected machine 120 and an access control card 102A in the possession of any human operator intending to use the selected machine 120. The access control card 102A includes identity information related to the human operator, such as a name and/or employee number. The human operator selectively presents the access control card 102A to the access device 102B on the selected machine 120 when the human operator is ready to use the machine 120. The human operator will place the access control card 102A on or near the access control device 102B such that the access control card 102A may be interrogated by the access control device 102B.
  • Identity information stored on the access control card 102A presented by the human operator is communicated to the access control device 102B. The identity information is then communicated from the access control device 102B to an access control computer (first server) 106. The identity information may be communicated using any suitable wired or wireless communication technique, including, without limitation, radio frequency such as multichannel 433 MHz radio.
  • Identity information related to the training status of each operator for each machine in a particular location may be provided to the access control computer (first server) 104. The first server 104 may include a processor 104B capable of interrogating identity information and determining whether the identity information is valid for the selected machine 120 and the particular human operator. While the above described embodiment has identity information stored on a local data storage device 104D, some or all of the same identity information may be stored on the access control card 102A.
  • If the operator has identity information that is valid, then the access control computer (first server) 104 communicates via wired or wireless connection to the access control device 102B that the operator may use the selected machine or equipment. If the operator's identity information is invalid, e.g., the human operator has not successfully completed training for the specific machine 120 or the training is out-of-date, then the access control computer (first server) 104 may communicate an access authorization signal using wired or wireless communication to the access control device 102B that the human operator is not authorized to operate the selected machine 120 and access to such machine 120 is not enabled by the access control device 102B. In other embodiments, an access approval signal may simply not be communicated to the access control device 102B by the first server 106 when the identity information on the access control card 102A is not valid to enable operation of the specific machine.
  • Information including certain identity information of the operator, such as an operator name, and the selected machine may be displayed by a monitor 106B in signal communication with the monitoring computer 106.
  • Selected equipment may include a control device 102 configured to operate an associated machine 120. When a human operator activates the control device 102 of the selected machine by using the access control card 102A, the identity information stored on the access control card 102A may be sent to the access control computer (first server) 104 e.g., by radio communication or wired communication. The access control computer (first server) 104 validates the identity information by interrogating the data storage and retrieval device 104D to enable activating the machine or equipment by the specific human operator. If the identity information is valid, the access control computer (first server) 104 may send an activation signal or message e.g., through the radio or wired signal communication channel to enable the human operator to activate the specific machine or equipment. Some of the identity information and machine operating parameters may be displayed on the monitor 106B and sent to the remote server 105 for analysis, e.g., times of use of each machine 120, name of operator of each machine 120, and any of a number of sensor-derived machine operating parameters. In some embodiments, the functions of the access control computer 104 and the monitoring computer 106 may be performed by the same computer and/or processor.
  • The described system 100 may facilitate confirming training statuses of individual human operators on all machines or equipment through the identity information associated with each access control card 102A, making it unnecessary for the human operator to surrender the access control card 102A when, for example, training has expired or the human operator is no longer provided access to the physical location of the machine(s) such as on termination of employment or transfer of the human operator to a different facility. Parameters that may be monitored for the machine(s) or equipment may include the equipment name or identification number, location, time in use, human operators using such equipment, as well as operational data. Such data may be communicated to the remote server 105 and real time analysis may be performed. Such analysis may include how efficiently each human operator operates each respective machine 120, and the amount of time each operator uses each machine 120. Attempts to gain access to a specific machine 120 by an operator not having correct identifying information may be recorded and communicated (e.g., wirelessly) to a remote system operator to identify inappropriate human operator behavior, or the presence of an unauthorized person attempting to gain access to operation of a specific machine 120.
  • The system 100 may be programmed (e.g., in access control computer 106) such that any initial safety controls are satisfied prior to permitting a human operator to operate a selected machine. 120 One such example of this type of restricted access is that the system 100 would confirm that a daily crane check operation was performed prior to permitting any operator to use a crane. A priori safety or pre-use inspection records may be associated with enabling operation of any other machine 120 in a similar manner.
  • The system 100 may display the selected machine 120 and the operator's name using such selected machine on the monitor 106B. Such operation can prevent attempts by another operator to activate a selected machine 120 without an access control card 102A.
  • FIG. 3 shows an example of the display 106B. The display in FIG. 3 shows each machine 110, the operator 112 who has gained access to any one or more machines including an image 114 of the particular operator. In this way, a system supervisor can readily determine which machines are in use and by which human operators.
  • FIG. 4 shows an example input display 116 to the data analysis computer (105 in FIG. 1) wherein specific machines, times of operation and other calculated operating information may be requested in certain forms, e.g., histograms or graphs.
  • FIG. 5 shows example machine operation parameters obtained from the remote server (105 in FIG. 1) that may be displayed 118 in bar graph and histogram forms, as non-limiting examples. Any of the measurements made by the respective sensors (121 in FIG. 1) may displayed in correspondence with the times at which each authorized human operator uses the specific machine (120 in FIG. 1) so that how well each human operator controls each respective machine (120 in FIG. 1) may be displayed. Identity information, for example, imminent expiration of a certain human operator's qualifying training, may be displayed by the analysis computer or the access control computer so that the system supervisor may be able to take corrective action (e.g., scheduling qualifying training) with respect to such human operator.
  • While the claimed subject matter has been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this disclosure, will appreciate that other embodiments can be devised which do not depart from the scope of the claimed subject matter as disclosed herein. Accordingly, the scope of the claimed subject matter should be limited only by the attached claims.

Claims (20)

What is claimed is:
1. A system for controlling usage of a machine by a human operator comprising:
a card containing identity information related to the human operator;
an access control device in communication with the card, wherein the access control device communicates with the identity information and is in signal communication with a machine comprising operator control;
an access control computer in communication with the access control device, wherein the access control computer is in signal communication with a data storage device having human operator machine operation control information;
wherein identity information is communicated to the access control computer from the access control device and the access control computer compares the identity information to the machine operation control information;
wherein the access control computer performs at least one of (i) communicates to the access control device that the human operator is enabled to operate the machine, (ii) communicates to the access control device that the human operator is denied access to operate the machine and (iii) does not communicate to the access control device wherein the human operator is denied access to operate the machine.
2. The system of claim 1, further comprising a computer display to display the identity information and a machine identifier when the human operator is enabled to operate the machine.
3. The system of claim 1, wherein the access control device comprises a battery, wherein the battery is used to power the access control device.
4. The system of claim 1, wherein the card comprises at least one of a smart card having at least one of an embedded electrically erasable programmable read-only memory chip, a magnetic data recording strip, a bar code, and a radio frequency identification (RFID) element and wherein the access control device comprises a data reader corresponding to and configured to extract identity information from the at least one of an embedded electrically erasable programmable read-only memory chip, a magnetic data recording strip, a bar code, and a radio frequency identification (RFID) element.
5. The system of claim 1, wherein the access control computer monitors at least one machine operating parameter during operation of the machine.
6. The system of claim 5, further comprising a data analysis computer in signal communication with the access control computer, wherein the access control computer communicates identity information and the monitored machine operating parameter to the data analysis computer.
7. The system of claim 6, wherein the data analysis computer calculates an analysis based on the at least one monitored parameter.
8. The system of claim 7, wherein the calculated analysis is correlated with the identity information.
9. The system of claim 8, wherein the access control computer is in signal communication with a plurality of access control devices, each access control device in signal communication with a respective machine operating control.
10. The system of claim 1, wherein the machine comprises at least one of a heating oven, a forklift, an overhead crane, a break out machine, and a key box.
11. A method for controlling use of a machine by a human operator comprising:
the human operator presenting a card to an access control device associated with a machine operator control configured to operate a respective machine, the card comprising identity information thereon corresponding to the human operator;
communicating the identity information from the card to the access control device;
communicating the identity information from the access control device to an access control computer;
comparing the identity information to qualification criteria accessible by the access control computer, the qualification criteria related to operating the machine; and
at least one of (i) communicating from the access control computer to the machine that the human operator is enabled to operate the machine, (ii) communicating from the access control computer to the machine that the human operator is denied access to operate the machine and (iii) not communicating to the machine wherein the human operator is denied access to operate the machine.
12. The method of claim 11, wherein the card comprises at least one of a smart card having at least one of an embedded electrically erasable programmable read-only memory chip, a magnetic data recording strip, a bar code, and a radio frequency identification (RFID) element and wherein the access control device comprises a data reader corresponding to and configured to extract identity information from the at least one of an embedded electrically erasable programmable read-only memory chip, a magnetic data recording strip, a bar code, and a radio frequency identification (RFID) element.
13. The method of claim 11, further comprising monitoring at least one machine operating parameter during operation of the machine.
14. The method of claim 13, further comprising causing the monitored machine operating parameter to be correlated to the human operator.
15. The method of claim 13, further comprising analyzing the at least one machine operating parameter.
16. The method of claim 15, wherein the calculated analysis is correlated with the identity information.
17. The system of claim 11, wherein the respective machine comprises at least one of a heating oven, a forklift, an overhead crane, a break out machine, and a key box.
18. The method of claim 11, further comprising:
each of a plurality of human operators presenting a respective card to one of a plurality of access control devices each associated with a respective machine operator control configured to operate a respective machine, each card comprising identity information thereon corresponding to one of the plurality of human operators;
communicating the identity information from each card to the respective access control device;
communicating the identity information from the respective access control device to an access control computer;
comparing the identity information from each card to qualification criteria accessible by the access control computer, the qualification criteria related to required qualifications to operate each machine; and
at least one of (i) communicating from the access control computer to the respective access control device that the respective human operator is enabled to operate the respective machine, (ii) communicating from the access control computer to the respective machine that the respective human operator is denied access to operate the respective machine and (iii) not communicating to the access control device wherein the respective human operator is denied access to operate the respective machine.
19. The method of claim 11, further comprising analyzing at least one machine operating parameter.
20. The method of claim 19, wherein the analysis is correlated with the identity information.
US16/564,323 2015-10-01 2019-09-09 System and method to control access to hazardous machines Abandoned US20200005565A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/564,323 US20200005565A1 (en) 2015-10-01 2019-09-09 System and method to control access to hazardous machines

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
RU2015141877A RU2718414C2 (en) 2015-10-01 2015-10-01 System and method for controlling access to potentially hazardous equipment
RU2015141877 2015-10-01
PCT/US2016/054612 WO2017059174A1 (en) 2015-10-01 2016-09-30 System and method to control access to hazardous machines
US201815765164A 2018-03-30 2018-03-30
US16/564,323 US20200005565A1 (en) 2015-10-01 2019-09-09 System and method to control access to hazardous machines

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
US15/765,164 Continuation US10410443B2 (en) 2015-10-01 2016-09-30 System and method to control access to hazardous machines
PCT/US2016/054612 Continuation WO2017059174A1 (en) 2015-10-01 2016-09-30 System and method to control access to hazardous machines

Publications (1)

Publication Number Publication Date
US20200005565A1 true US20200005565A1 (en) 2020-01-02

Family

ID=58424326

Family Applications (2)

Application Number Title Priority Date Filing Date
US15/765,164 Expired - Fee Related US10410443B2 (en) 2015-10-01 2016-09-30 System and method to control access to hazardous machines
US16/564,323 Abandoned US20200005565A1 (en) 2015-10-01 2019-09-09 System and method to control access to hazardous machines

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US15/765,164 Expired - Fee Related US10410443B2 (en) 2015-10-01 2016-09-30 System and method to control access to hazardous machines

Country Status (3)

Country Link
US (2) US10410443B2 (en)
RU (2) RU2718414C2 (en)
WO (1) WO2017059174A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2718414C2 (en) * 2015-10-01 2020-04-02 Шлюмбергер Текнолоджи Б.В. System and method for controlling access to potentially hazardous equipment
WO2020186319A1 (en) * 2019-03-21 2020-09-24 Mizer Rogerio Hess Access control and electronic locking method for hazardous areas, and related equipment
EP3842978A1 (en) * 2019-12-24 2021-06-30 Danfoss Power Solutions Inc. Controlled units security system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050125661A1 (en) * 2003-11-07 2005-06-09 Nokia Corporation Operator root cetificates
US7032816B2 (en) * 2001-12-28 2006-04-25 Kimberly-Clark Worldwide, Inc. Communication between machines and feed-forward control in event-based product manufacturing
US20070078536A1 (en) * 2005-09-30 2007-04-05 Rockwell Automation Technologies, Inc. Production monitoring and control system having organizational structure-based presentation layer
US20080191845A1 (en) * 2007-02-09 2008-08-14 Symbol Technologies, Inc. Location-Based Power Management in RFID Applications
US20140218169A1 (en) * 2013-02-07 2014-08-07 Claridy Solutions, Inc. Security device for equipment information and the operation method thereof
US8941464B2 (en) * 2005-10-21 2015-01-27 Honeywell International Inc. Authorization system and a method of authorization
US20150287253A1 (en) * 2014-04-03 2015-10-08 Panasonic Intellectual Property Management Co., Ltd. Method for managing information
US20150324072A1 (en) * 2012-01-06 2015-11-12 Lg Electronics Inc. Mobile terminal
US20180293822A1 (en) * 2015-10-01 2018-10-11 Schlumberger Technology Corporation System and method to control access to hazardous machines

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CZ290839B6 (en) 1999-05-10 2002-10-16 Zdeněk Ing. Procházka Circuit arrangement of entry units into protected rooms
US6850153B1 (en) * 1999-07-07 2005-02-01 The Regents Of The University Of California Vehicle sharing system and method for controlling or securing vehicle access and/or enablement
US6964024B2 (en) 2001-02-07 2005-11-08 Xerox Corporation Operator-defined visitation sequence of client user interface controls
US20090062950A1 (en) 2007-08-27 2009-03-05 Ren An Information Technology Co., Ltd. System and method for monitoring production of cnc machines
US20090143878A1 (en) * 2007-12-04 2009-06-04 Caterpillar Inc. Operator profile control system for a machine
WO2009114940A1 (en) * 2008-03-17 2009-09-24 Intelligent Mechatronic Systems Inc. Roadside and emergency assistance system
US20100289616A1 (en) 2009-05-18 2010-11-18 Ali Tehranchi Movable barrier system adapted to utilize biometric technology to identify and authorize access to premises
DE102013200777A1 (en) * 2013-01-18 2014-07-24 Ford Global Technologies, Llc Method and device for vehicle access control

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7032816B2 (en) * 2001-12-28 2006-04-25 Kimberly-Clark Worldwide, Inc. Communication between machines and feed-forward control in event-based product manufacturing
US20050125661A1 (en) * 2003-11-07 2005-06-09 Nokia Corporation Operator root cetificates
US20070078536A1 (en) * 2005-09-30 2007-04-05 Rockwell Automation Technologies, Inc. Production monitoring and control system having organizational structure-based presentation layer
US8941464B2 (en) * 2005-10-21 2015-01-27 Honeywell International Inc. Authorization system and a method of authorization
US20080191845A1 (en) * 2007-02-09 2008-08-14 Symbol Technologies, Inc. Location-Based Power Management in RFID Applications
US20150324072A1 (en) * 2012-01-06 2015-11-12 Lg Electronics Inc. Mobile terminal
US20140218169A1 (en) * 2013-02-07 2014-08-07 Claridy Solutions, Inc. Security device for equipment information and the operation method thereof
US20150287253A1 (en) * 2014-04-03 2015-10-08 Panasonic Intellectual Property Management Co., Ltd. Method for managing information
US20180293822A1 (en) * 2015-10-01 2018-10-11 Schlumberger Technology Corporation System and method to control access to hazardous machines

Also Published As

Publication number Publication date
RU2015141877A (en) 2017-04-06
US20180293822A1 (en) 2018-10-11
WO2017059174A1 (en) 2017-04-06
RU2015141877A3 (en) 2019-04-15
US10410443B2 (en) 2019-09-10
RU2720443C1 (en) 2020-04-29
RU2718414C2 (en) 2020-04-02

Similar Documents

Publication Publication Date Title
US20200005565A1 (en) System and method to control access to hazardous machines
JP5129857B2 (en) Dynamically programmable RFID transponder
EP2770482B1 (en) Access control systems and method using a smart phone
EP1973055B1 (en) Read unit and method for low energy detection of a transponder
EP3188082B1 (en) Safety lockout systems and methods
JP2004528655A (en) Frequency method
CN101923677B (en) Data storage system and data storage method
EP3061040B1 (en) Document with a contactless chip card interface and electronic system
CN106575107A (en) Security control system for granting access and security control method thereof
KR20200057778A (en) Fluid distribution meter permit
DE102004061452A1 (en) Multiple RFID anti-collision polling method
WO2007093580A1 (en) Smart card with identity checking
CN110688551A (en) RFID-based security file whole-process management system and method
US20100079250A1 (en) Information-Processing Device and System For Restricting Use of the Device
CN109426719B (en) Equipment verification management method and verification management system
EP3062294A1 (en) Method and devices for upgrading an existing access control system
GB2428116A (en) Controlling access to a workstation via wireless communication
JP6592937B2 (en) Authentication system, authentication control device program
CN212990225U (en) Intelligent tool cabinet and tool management system
CN113379952B (en) Sharing management method and sharing management device for house key
KR101608384B1 (en) Smart card with E-Ink Display
EP3017433B1 (en) Secure mode for electronic access control readers
JP2022510589A (en) Energy supply devices, energy supply systems, and methods of operating energy supply systems
EP3193312B1 (en) Key device with an integrated wireless data reader
CN112272160B (en) Host security information calling method, system, intelligent terminal and computer storage medium

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION