This invention relates generally to access systems for restricting access to controlled areas, and more specifically to an access system that restricts access to otherwise credentialed secure areas based on prior location.
Pork is the most consumed meat in the world. In United States, it is a $23 billion industry with more than 60,000 pork producers. In the U.S. most pigs are raised by producers with over 5,000 swine and most are owned by firms that each own over 50,000 swine.
The typical hog production cycle lasts about 4 years. This is a function of the biological cycle of the hog, which consists of four basic phases: (1) breeding and gestation, (2) farrowing, (3) feeding, and (4) finishing. During these phases, pigs are raised in confinement buildings where environmental conditions can be carefully managed. The pigs are carefully maneuvered from location to location following each phase keeping them separate from other separated groups of pigs to manage disease outbreaks.
Despite advancements in vaccines and other medications, pigs in confinement buildings may still be exposed to or spread diseases among each other and among confinement buildings. Disease outbreaks, such as swine flu, can lead to the eradication of an entire farm's supply and quarantining of all neighboring facilities. This can be disastrous for farm.
No matter how carefully environmental conditions are controlled or how secure the confinement buildings are, the weak point in a farms' production is its staff. By simply moving from building to building among a single farm or among other farms, people can carry harmful viruses and bacteria into the enclosed environments of confinement building. Many systems have been designed to control or inhibit the spread of diseases in confinement buildings, including access control systems, but all of these systems are rendered useless by accidental mistakes of staff.
Accordingly, there is a need for an access control system that restricts access to otherwise credentialed secure areas based on prior location. While the foregoing need is presented in the context of livestock confinement operations, this need is applicable to any environment where access control to a particular location can be instantaneously revoked or suspended based on a person's prior location.
Disclosed is a system for controlling access to a secured destination location to a holder of a security token. The system comprises of a database for storing access credentials and rules for entering the secured destination location; and an access controller in communication with the database over a communication channel. The access controller comprises of a reader for receiving the security token and providing the security token to the database to authenticate an identity of the holder of the security token. The security token is associated with the rules in the database for entering the secured destination location. The rules comprise a time field and a prior location information of the security token where entrance to the secured destination location is denied pending a lapse of a predetermined amount of time since the prior location information of the security token was associated in the database. An access control device for allowing access to the secured destination location upon receipt of an access control signal from the access controller once the predetermined amount of time has lapsed.
In an embodiment, the communication channel can be wired or wireless. The access control device can be any type of physical or virtual lock to a secured location. The access controller can also comprise a clock for providing timing information to the time field.
In an embodiment, the database further comprises a site table comprising a site ID to uniquely identify the secured destination location and a site category to assign a security level to the site ID. A rules table comprising an entrance category, a destination category, and a time rule can be provided, wherein the time rule restricts access to the secured destination location based on the site category of the prior location information and the site category of the secured destination location and a predetermined amount of time in the time rule. The predetermined amount of time in the time rule can be increased based on an increased level of security of the site category. The database can also comprise an employee table to associate a person with the holder of the security token. An employee time table can be provided and comprise a time remaining field for each site category to provide time remaining information before the person associated with the holder of the security token may enter the secured destination location associated with each site category. The database can comprise a device table to associate the access controller at the site ID with last updated timing information.
In another embodiment, a method for controlling access to a secure destination location is provided. The method comprises receiving a security token; authenticating an identity of a holder of the security token; and denying entrance to the secured destination location pending a lapse of a predetermined amount of time based on a prior location of the holder of the security token.
In an embodiment, the method comprises of assigning a security level to a site category field in a database and a time rule for the site category field and associating the site category field and the time rule with a site ID field in the database, wherein the time rule comprises the predetermined amount of time. The method can include restricting access to the secured destination location based on the site category field of the prior location and the predetermined amount of time in the time rule. The method can also include increasing the predetermined amount of time for each time rule based on an increased level of security for the corresponding site category field. The method can include creating an employee table in the database and associating a person with the holder of the security token. The method can include providing time remaining information for the person associated with the holder of the security token to enter the destination secured location associated with each site category.
These and other features and advantages of the present invention will be better understood by reading the following detailed description, taken together with the drawings wherein:
Referring to
More specifically, central database 106 stores the authentication and permissions for system 100 and pushes and pulls data to and from access controllers 104 over a communication channel 108. Database 106 can be any type of authentication and rules-based database implemented in or in connection with one or more servers. In the illustrated embodiment, each access controller 104 and/or database 106 pushes and pulls data to and from each other for local credentials and rules storage. This way if communication is lost, access controllers 104 still operates. In other embodiments, access controller can require constant connection with central database 106 for operation.
Communication channel 108 can be any type of wired or wireless communication network, including the public internet or a local area network. In a wireless implementation, there is no need for a dedicated wire connection between each of access controllers 104 and central database 106. As such, a wireless implementation can reduce implementation complexity and the number of points of potential failure that can exist in conventional systems. A wireless communication channel 108 can operate with a number of communication protocols, including, without limitation, transmission control protocol/Internet protocol (TCP/IP).
Referring to
A microprocessor 114 comprises the hardware and software necessary to store and execute cryptographic applications, to read/write data from/to security token 102, and transmit data to and receive data from database 106. Microprocessor 114 may include any type of general purpose processor or computer, controller, or application specific integrated circuit.
Following authentication of security token 102 and permission in accordance with the rules discussed below, microprocessor 114 provides an output to an access control device 116, which secures the location, device, or information being protected. In one embodiment, access control device 116 can be an output to a mechanical actuator 115 that unlocks a door 117 to a secured location. Examples of a typical access control device 116 include, without limitation, an electronic lock, a magnetic lock, or an electric strike for a door, a lock for a computer system, a lock for a database, a lock on a financial account, or a lock on a computer application.
Microprocessor 114 also comprises a network interface card 118 to communicate with database 106 over communication channel 108. In addition, microprocessor 114 comprises a memory 120 to store application data, host unique ID, and other functionality. Memory 120 may comprise volatile and/or non-volatile memory. Examples of non-volatile memory include Read Only Memory (ROM), Erasable Programmable ROM (EPROM), Electronically Erasable PROM (EEPROM), Flash memory, and the like. Examples of volatile memory include Random Access Memory (RAM), Dynamic RAM (DRAM), Static RAM (SRAM), or buffer memory.
Access controller 104 may also comprise a clock 122 that tracks the current time to provide the time to microprocessor 114 to determine if the holder of security token 102 is permitted access to the location protected by access control device 116. This way, if communication with database 106 is lost, the current time and count-down for permissions can be retained.
Referring now to
Beginning with the site table of
Continuing with the rules table of
The period of time tg, ty, and tr can be set to any period of time with more or less variables being provided. Preferably, a longer period of time before entering the location with the highest level of security is set to ensure the highest level of safety. It could be, for example, that the restricted area with the highest level of security is most susceptible to harm from outside containments, diseases, pathogens, viruses and bacteria or, alternatively, the most likely to transmit the same. By restricting access with rules to locations based on prior locations, transmissions of diseases, pathogens, viruses and bacteria can be reduced.
Employee table of
The foregoing can be implemented according to the method shown in
While the principles of the invention have been described herein, it is to be understood by those skilled in the art that this description is made only by way of example and not as a limitation as to the scope of the invention. Other embodiments are contemplated within the scope of the present invention in addition to the exemplary embodiments shown and described herein. Modifications and substitutions by one of ordinary skill in the art are considered to be within the scope of the present invention, which is not to be limited except by the following claims.
The present application claims the benefit of U.S. Provisional Patent Application No. 63/322,778 filed Mar. 23, 2022, the contents of which are hereby incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
7010691 | Wheeler | Mar 2006 | B2 |
7376839 | Carta et al. | May 2008 | B2 |
7616091 | Libin | Nov 2009 | B2 |
7752652 | Prokupets et al. | Jul 2010 | B2 |
7937669 | Zhang et al. | May 2011 | B2 |
8505488 | Pratt | Aug 2013 | B2 |
8598982 | Bhandari et al. | Dec 2013 | B2 |
8604903 | Bowen | Dec 2013 | B2 |
8836470 | Pineau et al. | Sep 2014 | B2 |
9336633 | Radicella et al. | May 2016 | B2 |
9761071 | Woodard | Sep 2017 | B2 |
10043325 | Friedli | Aug 2018 | B2 |
10332325 | Lee | Jun 2019 | B2 |
10629019 | Neely | Apr 2020 | B2 |
11903680 | Frank | Feb 2024 | B2 |
20080163361 | Davis et al. | Jul 2008 | A1 |
20240038011 | Studerus | Feb 2024 | A1 |
Number | Date | Country | |
---|---|---|---|
63322778 | Mar 2022 | US |