EP1236085A1 - Procede de liaison d'utilisateurs autorises a plusieurs dispositifs - Google Patents

Procede de liaison d'utilisateurs autorises a plusieurs dispositifs

Info

Publication number
EP1236085A1
EP1236085A1 EP00982301A EP00982301A EP1236085A1 EP 1236085 A1 EP1236085 A1 EP 1236085A1 EP 00982301 A EP00982301 A EP 00982301A EP 00982301 A EP00982301 A EP 00982301A EP 1236085 A1 EP1236085 A1 EP 1236085A1
Authority
EP
European Patent Office
Prior art keywords
user
code
database
linking
operating space
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP00982301A
Other languages
German (de)
English (en)
Other versions
EP1236085A4 (fr
Inventor
Thomas Xydis
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ensure Technologies Inc
Original Assignee
Ensure Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ensure Technologies Inc filed Critical Ensure Technologies Inc
Publication of EP1236085A1 publication Critical patent/EP1236085A1/fr
Publication of EP1236085A4 publication Critical patent/EP1236085A4/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3058Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component, e.g. monitoring of power, currents, temperature, humidity, position, vibrations
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0205Specific application combined with child monitoring using a transmitter-receiver system
    • G08B21/0213System disabling if a separation threshold is exceeded
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0261System arrangements wherein the object is to detect trespassing over a fixed physical boundary, e.g. the end of a garden

Definitions

  • a method of monitonng a plurality of electi onic devices e.g , computers, positioned in an operating space and accessible by a plurality of users
  • Various methods of monitoring an operating space include the steps of compiling a user database comprising a plurality of usei codes for authorized users or compiling a device database comprising a pluiahty of device codes identifying each one of the devices.
  • a user enters the operating space having a user token which is emitting a user code.
  • the user code is detected and compared to the user database.
  • Each device positioned within the operating space has a device token which also emits a device code.
  • the device code is being detected and compared to the device database.
  • a logging database is created which logs which user was present in the operating space or which device was removed from the operating space
  • the invention provides a method of monitoring a plurality of electronic devices positioned in an operating space which are accessible by a plurality of users.
  • the method includes the steps of compiling a user database comprising a plurality of user codes for authorized users and compiling a device database comprising a plurality of device codes identifying each one of the devices.
  • Each user has a user token for emitting a user code and each device has a device token for emitting a device code.
  • the user code and the device code are then detected
  • the method is characterized by compiling a linking database linking each user code to at least one of the device codes to indicate that the user code is authorized to remove the device from the operating space in response to detecting the user code linked to the device code.
  • the subject invention provides a method of monitoring devices which are accessible by a plurality of users by simultaneously registering which user is within the operating space and which device the user is removing. Certain users may be allowed to remove any and all devices while other users are only granted access to specific devices.
  • Figure 1A & IB is a flowchart showing the steps of monitoring a plurality of electronic devices positioned in an operating space and accessible by a plurality of users;
  • Figuie 2 is a schematic view of a system capable of monitoring the operating space which includes a host computer;
  • Figure 3 is a schematic view of the operating space having a plurality of devices and a user disposed therein; and Figure 4 is a representation of one embodiment of a linking database which links the plurality of users to the plurality of devices.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT Referring to the Figures, wherein like numerals indicate like or corresponding parts throughout the several views, a method of monitoring a plurality of electronic devices positioned in an operating space and accessible by a plurality of users is shown generally in Figure 1A & IB.
  • a first step in the method includes compiling a user database 10 comprising a plurality of user codes for authorized users and compiling a device database 12 comprising a plurality of device codes for identifying each one of the devices.
  • the independent operating system 52 may be a computer spaced apart from the operating space or a database kept on a local or shared network.
  • the operating space as shown in Figure 3, may be defined by any area having an egress 34 or an ingress.
  • the system administrator can add or delete user and device information from their respective databases, as necessary
  • the plurality of devices may include any electronic equipment such as laptop computers, printers, scannei s, oi cellular phones.
  • the second step includes emitting a user code 14 from a user token 16 which is carried by a user 22.
  • the emitting of the user code 14 may include generating a signal which is received or a field which is disturbed, such as a magnetic field.
  • a host computer 26 is disposed within or adjacent the operating space for detecting the usei code 14.
  • the host computer 26 seaiches the user database 10 for the detected user code 14.
  • the user database 10 includes any personal information about the usei 22 which may have been input by the system administrator.
  • the next step involves emitting a device code 18 from a device token 20 which is attached to a device 24.
  • the emitting of the device code 18 may include generating a signal which is received or a field which is disturbed, such as a magnetic field
  • the host computer 26 detects the device code 18 and searches the device database 12 for that device 24.
  • the device database 12 includes information about the device 24 such as the serial number, the model number, type of device, and any other information that is input by the system administrator.
  • the user token 16 and the device token 20 each include a power source 36, a controller 38, and a token radio transceiver 40.
  • the token radio transceiver 40 transmits and receives signals from the host computer 26
  • the controller 38 sends a signal to the token radio transceiver 40 to emit the user code 14
  • the user token 16 is also able to receive a signal from the host computer 26 and transmit the signal to the controller 38.
  • the controller 38 responds to the action requested by the host computer 26
  • the device token 20 is also able to receive signals from the host computer 26 in the same manner as the user token 16.
  • the user token 16 or device token 20 may include an RFID tag, as is known in the art, having a chip mounted within the user token 16 or device token 20 containing the user code 14 or device code 18.
  • the step of detecting the user code 14 and the device code 18 is further defined by connecting the host computer 26 to a circuit 28 which may be integrated into the host computer 26 or positioned adjacent to the host computer 26.
  • the circuit 28, as shown in Figure 2 includes a first radio transceiver 46, an antenna 30, a signal measurement device 48 and controller 50
  • the step of detecting the user code 14 and device code 18 includes a host computer 26 emitting a magnetic or an electric field The field is broken by the user token 16 entering the field and the chip becoming excited The computei 26 is then able to detect the user code 14.
  • the device token 20 operates in the same manner when present in the field
  • a signal is sent to the signal measurement device 48 to measure the strength of the usei code 14 and the device code 18.
  • the strength of the user code 14 would increase pioportionally with the strength of the device code 18 which would indicate which device 24 was selected by the user 22.
  • the signal measurement device 48 then transmits the user code 14 and the device code 18 to the controller 50.
  • the controller 50 tiansmits the codes to the host computer 26 which is connected to the independent operating system 52 for retrieving information from the databases for the user code 14 and the device code 18.
  • the user code 14 and device code 18 may be detected simultaneously when present together in the magnetic or electric field.
  • the host computer 26 also monitors the plurality of devices which were not selected by the user 22.
  • the host computer 26 compares the device database 12 to the device codes which are being detected by the circuit 28. If the device code 18 maintains a consistent code strength measurement, then the device is not being selected by the user 22. If the strength of the device code 18 increases without the user code 14 being detected in the operating space, the host computei 26 transmits an alarm signal to the system administrator.
  • the host computer 26 could transmit a signal to the controller 50 requesting the user token 16 or the device token 20 to transmit the user code 12 or the device code 18.
  • the controller 50 sends the signal to the radio transceiver 46 and emits the signal through the antenna 30.
  • the radio transceiver 46 enters a detection mode. In the detection mode, the radio transceiver waits for a return signal to be received by the plurality of antennas 30.
  • the next step involves compiling a linking database 42 which is accessible by the host computer 26
  • the linking database 42 links each user code 14 to a plurality of device codes as shown in Figure 4. For instance, User A is authorized to remove Devices 1 through 9, whereas User D in only authorized for Devices 3 through 7.
  • Usei B can only remove the even numbered devices and User C can only remove the odd numbered devices
  • the host computer 26 leceives the user code 14 and the device code 18, the host computer 26 recognizes the user 22 and the device 24 from then respective databases
  • the host computer 26 searches the linking database 42 to determine if the user 22 is authorized to remove the device 24 If the user 22 is linked to the device 24, the host computer 26 creates a log of which device 24 was removed and by which user.
  • the host computer 26 also registers the linked device code 18 into the logging database in response to each linked device 24 re-ente ⁇ ng the operating space. However, if the user 22 and the device 24 are not linked, the host computer 26 enters an alarm mode.
  • the host computer 26 may transmit a disabling signal, a prevention signal, or a security signal. If the host computer 26 transmits the disabling signal, the device 24 will not be operable. If the host computer 26 transmits the prevention signal, then the user 22 will only be able to operate certain functions or programs contained within the device 24.
  • the security signal would notify the system administrator that the device 24 was being removed from the operating space by the user 22 and that the user 22 was not linked to the device 24 in the linking database 42.

Abstract

La présente invention concerne un procédé de suivi de plusieurs dispositifs électroniques, positionnés dans un espace de fonctionnement, accessibles par plusieurs utilisateurs, qui consiste à compiler une base de données utilisateurs (10), comprenant plusieurs codes d'utilisateurs autorisés, à compiler une base de données de dispositifs (12), comprenant plusieurs codes de dispositifs destinés à identifier chacun des dispositifs, et qui est caractérisé par la compilation d'une base de données de liaisons (42) liant chaque utilisateur à plusieurs dispositifs. Un ordinateur hôte (26) peut accéder à chacune de ces bases de données. Un utilisateur (22) possède un jeton utilisateur (16) qui émet un code utilisateur (14) et un dispositif (24) possède un jeton dispositif (20) qui émet un code dispositif (18). L'ordinateur hôte (26) détecte le code utilisateur (14) et le code dispositif (18), puis mesure la force du code utilisateur (14) et du code dispositif (18). Il (26) relie l'utilisateur (22) au dispositif (24) par liaison du code utilisateur (14) au code dispositif (16) dans la base de données de liaisons (42). Il (26) émet un signal de neutralisation, un signal de prévention ou des signaux de sécurité en réponse à une détection du code dispositif (18) non lié au code utilisateur (14).
EP00982301A 1999-12-01 2000-11-30 Procede de liaison d'utilisateurs autorises a plusieurs dispositifs Withdrawn EP1236085A4 (fr)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US16840699P 1999-12-01 1999-12-01
US168406P 1999-12-01
US67100400A 2000-09-27 2000-09-27
US671004 2000-09-27
PCT/US2000/032580 WO2001040929A1 (fr) 1999-12-01 2000-11-30 Procede de liaison d'utilisateurs autorises a plusieurs dispositifs

Publications (2)

Publication Number Publication Date
EP1236085A1 true EP1236085A1 (fr) 2002-09-04
EP1236085A4 EP1236085A4 (fr) 2004-11-10

Family

ID=26864094

Family Applications (1)

Application Number Title Priority Date Filing Date
EP00982301A Withdrawn EP1236085A4 (fr) 1999-12-01 2000-11-30 Procede de liaison d'utilisateurs autorises a plusieurs dispositifs

Country Status (7)

Country Link
EP (1) EP1236085A4 (fr)
JP (1) JP2003515840A (fr)
CN (1) CN1413323A (fr)
AU (1) AU1935201A (fr)
CA (1) CA2393131A1 (fr)
MX (1) MXPA02005420A (fr)
WO (1) WO2001040929A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998000945A2 (fr) * 1996-06-20 1998-01-08 Northrop Grumman Corporation Systeme d'inventaire a intervalles de temps aleatoires
WO1999011022A1 (fr) * 1997-08-27 1999-03-04 Xydis Thomas G Commande d'acces informatique
WO1999038136A2 (fr) * 1998-01-26 1999-07-29 K & T Of Lorain, Ltd. Procedes et systemes de controle de stocks et de conteneurs
WO1999045498A1 (fr) * 1998-03-02 1999-09-10 Konisa Limited Systeme de surveillance
US5963134A (en) * 1997-07-24 1999-10-05 Checkpoint Systems, Inc. Inventory system using articles with RFID tags

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5935244A (en) * 1997-01-21 1999-08-10 Dell Usa, L.P. Detachable I/O device for computer data security
US5960085A (en) * 1997-04-14 1999-09-28 De La Huerga; Carlos Security badge for automated access control and secure data gathering
US6032257A (en) * 1997-08-29 2000-02-29 Compaq Computer Corporation Hardware theft-protection architecture

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998000945A2 (fr) * 1996-06-20 1998-01-08 Northrop Grumman Corporation Systeme d'inventaire a intervalles de temps aleatoires
US5963134A (en) * 1997-07-24 1999-10-05 Checkpoint Systems, Inc. Inventory system using articles with RFID tags
WO1999011022A1 (fr) * 1997-08-27 1999-03-04 Xydis Thomas G Commande d'acces informatique
WO1999038136A2 (fr) * 1998-01-26 1999-07-29 K & T Of Lorain, Ltd. Procedes et systemes de controle de stocks et de conteneurs
WO1999045498A1 (fr) * 1998-03-02 1999-09-10 Konisa Limited Systeme de surveillance

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO0140929A1 *

Also Published As

Publication number Publication date
EP1236085A4 (fr) 2004-11-10
CA2393131A1 (fr) 2001-06-07
AU1935201A (en) 2001-06-12
WO2001040929A1 (fr) 2001-06-07
CN1413323A (zh) 2003-04-23
JP2003515840A (ja) 2003-05-07
MXPA02005420A (es) 2004-04-21

Similar Documents

Publication Publication Date Title
US6307471B1 (en) Radio based proximity token with multiple antennas
US7071825B2 (en) Self-monitored active rack
US7755490B2 (en) Systems and methods for identifying missing items
US6025780A (en) RFID tags which are virtually activated and/or deactivated and apparatus and methods of using same in an electronic security system
US20090102665A1 (en) Wireless Tracking System And Method With Optical tag Removal Detection
US20080252419A1 (en) Wireless access control system and method
US20050225427A1 (en) Finding location and ranging explorer
US20050253714A1 (en) Location-based anti-theft and security system and method
JP4691384B2 (ja) 警備装置、警備方法、警備プログラム
EP1236085A1 (fr) Procede de liaison d'utilisateurs autorises a plusieurs dispositifs
US20050003845A1 (en) Fire detection system
GB2387744A (en) Transponder alarm system
EP0850441A1 (fr) Procede de surveillance d'un systeme informatique
KR101004488B1 (ko) 도서관의 도서 관리를 위한 미들웨어 시스템 및 이를 이용한 도서 위치 표시 시스템
US20050287986A1 (en) System and method for securing mobile equipment
JP2006178591A (ja) 認証装置、セキュリティ装置およびセキュリティ装置における認証方法
JP6919763B2 (ja) 無線通信機及び入退室管理システム
JP5083594B2 (ja) 鍵情報管理システム
KR100791054B1 (ko) 알에프아이디를 이용한 개인이용물 부정사용 방지 시스템
JP2004240733A (ja) 監視システム
GB2360610A (en) Computer access control and security system
JP2006185024A (ja) 権限管理システム、及びこれに用いる携帯電話
MXPA00000927A (es) Etiquetas de identificación por radiofrecuencia virtualmente reactivadas

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20020617

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

A4 Supplementary search report drawn up and despatched

Effective date: 20040923

RIC1 Information provided on ipc code assigned before grant

Ipc: 7G 06F 17/60 B

Ipc: 7G 08B 29/00 B

Ipc: 7G 06F 1/00 A

Ipc: 7G 06K 7/10 B

Ipc: 7G 06F 12/14 B

Ipc: 7G 06F 7/04 B

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20030305