WO2001040929A1 - Method of linking authorized users to a plurality of devices - Google Patents
Method of linking authorized users to a plurality of devices Download PDFInfo
- Publication number
- WO2001040929A1 WO2001040929A1 PCT/US2000/032580 US0032580W WO0140929A1 WO 2001040929 A1 WO2001040929 A1 WO 2001040929A1 US 0032580 W US0032580 W US 0032580W WO 0140929 A1 WO0140929 A1 WO 0140929A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- code
- database
- linking
- operating space
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3089—Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3058—Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component, e.g. monitoring of power, currents, temperature, humidity, position, vibrations
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0205—Specific application combined with child monitoring using a transmitter-receiver system
- G08B21/0213—System disabling if a separation threshold is exceeded
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0261—System arrangements wherein the object is to detect trespassing over a fixed physical boundary, e.g. the end of a garden
Definitions
- a method of monitonng a plurality of electi onic devices e.g , computers, positioned in an operating space and accessible by a plurality of users
- Various methods of monitoring an operating space include the steps of compiling a user database comprising a plurality of usei codes for authorized users or compiling a device database comprising a pluiahty of device codes identifying each one of the devices.
- a user enters the operating space having a user token which is emitting a user code.
- the user code is detected and compared to the user database.
- Each device positioned within the operating space has a device token which also emits a device code.
- the device code is being detected and compared to the device database.
- a logging database is created which logs which user was present in the operating space or which device was removed from the operating space
- the invention provides a method of monitoring a plurality of electronic devices positioned in an operating space which are accessible by a plurality of users.
- the method includes the steps of compiling a user database comprising a plurality of user codes for authorized users and compiling a device database comprising a plurality of device codes identifying each one of the devices.
- Each user has a user token for emitting a user code and each device has a device token for emitting a device code.
- the user code and the device code are then detected
- the method is characterized by compiling a linking database linking each user code to at least one of the device codes to indicate that the user code is authorized to remove the device from the operating space in response to detecting the user code linked to the device code.
- the subject invention provides a method of monitoring devices which are accessible by a plurality of users by simultaneously registering which user is within the operating space and which device the user is removing. Certain users may be allowed to remove any and all devices while other users are only granted access to specific devices.
- Figure 1A & IB is a flowchart showing the steps of monitoring a plurality of electronic devices positioned in an operating space and accessible by a plurality of users;
- Figuie 2 is a schematic view of a system capable of monitoring the operating space which includes a host computer;
- Figure 3 is a schematic view of the operating space having a plurality of devices and a user disposed therein; and Figure 4 is a representation of one embodiment of a linking database which links the plurality of users to the plurality of devices.
- DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT Referring to the Figures, wherein like numerals indicate like or corresponding parts throughout the several views, a method of monitoring a plurality of electronic devices positioned in an operating space and accessible by a plurality of users is shown generally in Figure 1A & IB.
- a first step in the method includes compiling a user database 10 comprising a plurality of user codes for authorized users and compiling a device database 12 comprising a plurality of device codes for identifying each one of the devices.
- the independent operating system 52 may be a computer spaced apart from the operating space or a database kept on a local or shared network.
- the operating space as shown in Figure 3, may be defined by any area having an egress 34 or an ingress.
- the system administrator can add or delete user and device information from their respective databases, as necessary
- the plurality of devices may include any electronic equipment such as laptop computers, printers, scannei s, oi cellular phones.
- the second step includes emitting a user code 14 from a user token 16 which is carried by a user 22.
- the emitting of the user code 14 may include generating a signal which is received or a field which is disturbed, such as a magnetic field.
- a host computer 26 is disposed within or adjacent the operating space for detecting the usei code 14.
- the host computer 26 seaiches the user database 10 for the detected user code 14.
- the user database 10 includes any personal information about the usei 22 which may have been input by the system administrator.
- the next step involves emitting a device code 18 from a device token 20 which is attached to a device 24.
- the emitting of the device code 18 may include generating a signal which is received or a field which is disturbed, such as a magnetic field
- the host computer 26 detects the device code 18 and searches the device database 12 for that device 24.
- the device database 12 includes information about the device 24 such as the serial number, the model number, type of device, and any other information that is input by the system administrator.
- the user token 16 and the device token 20 each include a power source 36, a controller 38, and a token radio transceiver 40.
- the token radio transceiver 40 transmits and receives signals from the host computer 26
- the controller 38 sends a signal to the token radio transceiver 40 to emit the user code 14
- the user token 16 is also able to receive a signal from the host computer 26 and transmit the signal to the controller 38.
- the controller 38 responds to the action requested by the host computer 26
- the device token 20 is also able to receive signals from the host computer 26 in the same manner as the user token 16.
- the user token 16 or device token 20 may include an RFID tag, as is known in the art, having a chip mounted within the user token 16 or device token 20 containing the user code 14 or device code 18.
- the step of detecting the user code 14 and the device code 18 is further defined by connecting the host computer 26 to a circuit 28 which may be integrated into the host computer 26 or positioned adjacent to the host computer 26.
- the circuit 28, as shown in Figure 2 includes a first radio transceiver 46, an antenna 30, a signal measurement device 48 and controller 50
- the step of detecting the user code 14 and device code 18 includes a host computer 26 emitting a magnetic or an electric field The field is broken by the user token 16 entering the field and the chip becoming excited The computei 26 is then able to detect the user code 14.
- the device token 20 operates in the same manner when present in the field
- a signal is sent to the signal measurement device 48 to measure the strength of the usei code 14 and the device code 18.
- the strength of the user code 14 would increase pioportionally with the strength of the device code 18 which would indicate which device 24 was selected by the user 22.
- the signal measurement device 48 then transmits the user code 14 and the device code 18 to the controller 50.
- the controller 50 tiansmits the codes to the host computer 26 which is connected to the independent operating system 52 for retrieving information from the databases for the user code 14 and the device code 18.
- the user code 14 and device code 18 may be detected simultaneously when present together in the magnetic or electric field.
- the host computer 26 also monitors the plurality of devices which were not selected by the user 22.
- the host computer 26 compares the device database 12 to the device codes which are being detected by the circuit 28. If the device code 18 maintains a consistent code strength measurement, then the device is not being selected by the user 22. If the strength of the device code 18 increases without the user code 14 being detected in the operating space, the host computei 26 transmits an alarm signal to the system administrator.
- the host computer 26 could transmit a signal to the controller 50 requesting the user token 16 or the device token 20 to transmit the user code 12 or the device code 18.
- the controller 50 sends the signal to the radio transceiver 46 and emits the signal through the antenna 30.
- the radio transceiver 46 enters a detection mode. In the detection mode, the radio transceiver waits for a return signal to be received by the plurality of antennas 30.
- the next step involves compiling a linking database 42 which is accessible by the host computer 26
- the linking database 42 links each user code 14 to a plurality of device codes as shown in Figure 4. For instance, User A is authorized to remove Devices 1 through 9, whereas User D in only authorized for Devices 3 through 7.
- Usei B can only remove the even numbered devices and User C can only remove the odd numbered devices
- the host computer 26 leceives the user code 14 and the device code 18, the host computer 26 recognizes the user 22 and the device 24 from then respective databases
- the host computer 26 searches the linking database 42 to determine if the user 22 is authorized to remove the device 24 If the user 22 is linked to the device 24, the host computer 26 creates a log of which device 24 was removed and by which user.
- the host computer 26 also registers the linked device code 18 into the logging database in response to each linked device 24 re-ente ⁇ ng the operating space. However, if the user 22 and the device 24 are not linked, the host computer 26 enters an alarm mode.
- the host computer 26 may transmit a disabling signal, a prevention signal, or a security signal. If the host computer 26 transmits the disabling signal, the device 24 will not be operable. If the host computer 26 transmits the prevention signal, then the user 22 will only be able to operate certain functions or programs contained within the device 24.
- the security signal would notify the system administrator that the device 24 was being removed from the operating space by the user 22 and that the user 22 was not linked to the device 24 in the linking database 42.
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MXPA02005420A MXPA02005420A (en) | 1999-12-01 | 2000-11-30 | Method of linking authorized users to a plurality of devices. |
CA002393131A CA2393131A1 (en) | 1999-12-01 | 2000-11-30 | Method of linking authorized users to a plurality of devices |
JP2001541925A JP2003515840A (en) | 1999-12-01 | 2000-11-30 | How to link authorized users to multiple devices |
EP00982301A EP1236085A4 (en) | 1999-12-01 | 2000-11-30 | Method of linking authorized users to a plurality of devices |
AU19352/01A AU1935201A (en) | 1999-12-01 | 2000-11-30 | Method of linking authorized users to a plurality of devices |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16840699P | 1999-12-01 | 1999-12-01 | |
US60/168,406 | 1999-12-01 | ||
US67100400A | 2000-09-27 | 2000-09-27 | |
US09/671,004 | 2000-09-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001040929A1 true WO2001040929A1 (en) | 2001-06-07 |
Family
ID=26864094
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/032580 WO2001040929A1 (en) | 1999-12-01 | 2000-11-30 | Method of linking authorized users to a plurality of devices |
Country Status (7)
Country | Link |
---|---|
EP (1) | EP1236085A4 (en) |
JP (1) | JP2003515840A (en) |
CN (1) | CN1413323A (en) |
AU (1) | AU1935201A (en) |
CA (1) | CA2393131A1 (en) |
MX (1) | MXPA02005420A (en) |
WO (1) | WO2001040929A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5935244A (en) * | 1997-01-21 | 1999-08-10 | Dell Usa, L.P. | Detachable I/O device for computer data security |
US5960085A (en) * | 1997-04-14 | 1999-09-28 | De La Huerga; Carlos | Security badge for automated access control and secure data gathering |
US6032257A (en) * | 1997-08-29 | 2000-02-29 | Compaq Computer Corporation | Hardware theft-protection architecture |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6058374A (en) * | 1996-06-20 | 2000-05-02 | Northrop Grumman Corporation | Inventorying method and system for monitoring items using tags |
US5963134A (en) * | 1997-07-24 | 1999-10-05 | Checkpoint Systems, Inc. | Inventory system using articles with RFID tags |
US6070240A (en) * | 1997-08-27 | 2000-05-30 | Ensure Technologies Incorporated | Computer access control |
US6148291A (en) * | 1998-01-26 | 2000-11-14 | K & T Of Lorain, Ltd. | Container and inventory monitoring methods and systems |
KR20010041561A (en) * | 1998-03-02 | 2001-05-25 | 코니사 리미티드 | Monitoring system |
-
2000
- 2000-11-30 CA CA002393131A patent/CA2393131A1/en not_active Abandoned
- 2000-11-30 WO PCT/US2000/032580 patent/WO2001040929A1/en not_active Application Discontinuation
- 2000-11-30 MX MXPA02005420A patent/MXPA02005420A/en unknown
- 2000-11-30 JP JP2001541925A patent/JP2003515840A/en active Pending
- 2000-11-30 EP EP00982301A patent/EP1236085A4/en not_active Withdrawn
- 2000-11-30 AU AU19352/01A patent/AU1935201A/en not_active Abandoned
- 2000-11-30 CN CN00817569.1A patent/CN1413323A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5935244A (en) * | 1997-01-21 | 1999-08-10 | Dell Usa, L.P. | Detachable I/O device for computer data security |
US5960085A (en) * | 1997-04-14 | 1999-09-28 | De La Huerga; Carlos | Security badge for automated access control and secure data gathering |
US6032257A (en) * | 1997-08-29 | 2000-02-29 | Compaq Computer Corporation | Hardware theft-protection architecture |
Non-Patent Citations (1)
Title |
---|
See also references of EP1236085A4 * |
Also Published As
Publication number | Publication date |
---|---|
AU1935201A (en) | 2001-06-12 |
JP2003515840A (en) | 2003-05-07 |
EP1236085A1 (en) | 2002-09-04 |
CN1413323A (en) | 2003-04-23 |
MXPA02005420A (en) | 2004-04-21 |
EP1236085A4 (en) | 2004-11-10 |
CA2393131A1 (en) | 2001-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7071825B2 (en) | Self-monitored active rack | |
CA2392834C (en) | Radio based proximity token with multiple antennas | |
US7755490B2 (en) | Systems and methods for identifying missing items | |
US6025780A (en) | RFID tags which are virtually activated and/or deactivated and apparatus and methods of using same in an electronic security system | |
US20090102665A1 (en) | Wireless Tracking System And Method With Optical tag Removal Detection | |
US20080252419A1 (en) | Wireless access control system and method | |
US20050225427A1 (en) | Finding location and ranging explorer | |
US20050253714A1 (en) | Location-based anti-theft and security system and method | |
JP4691384B2 (en) | Security device, security method, security program | |
EP1236085A1 (en) | Method of linking authorized users to a plurality of devices | |
US20050003845A1 (en) | Fire detection system | |
GB2387744A (en) | Transponder alarm system | |
EP0850441A1 (en) | Method of monitoring a computer system | |
KR101004488B1 (en) | Middleware System for Book Management of Library, and Book Location Display System | |
CN111886634B (en) | Wireless communication device and entry/exit management system | |
JP5083594B2 (en) | Key information management system | |
KR100791054B1 (en) | Impropriety employment prevention system of individual fixtures using radio frequency identification | |
JP2004240733A (en) | Monitoring system | |
GB2360610A (en) | Computer access control and security system | |
MXPA00000927A (en) | Electrically, physically or virtually reactivating rfid tags | |
JPH10241066A (en) | Security terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: PA/a/2002/005420 Country of ref document: MX Ref document number: 2393131 Country of ref document: CA |
|
ENP | Entry into the national phase |
Ref document number: 2001 541925 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 19352/01 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000982301 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 008175691 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 2000982301 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000982301 Country of ref document: EP |