Portions of this patent application include materials that are subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document itself, or of the patent application, as it appears in the files of the United States Patent and Trademark Office, but otherwise reserves all copyright rights whatsoever in such included copyrighted materials. Copyright© 2014-5 Twin Harbor Labs, All Rights Reserved.
2.1 Related Applications
This application is based upon and draws its priority from U.S. Provisional Patent Application 62/043,580, “Methods, Software, and Systems for Providing Policy-Based Access”, filed on Aug. 29, 2015, hereby incorporated by reference. This application also incorporates by reference U.S. Provisional Patent Application 62/170,668, “Travel Safety Control”, filed on Jun. 3, 2015.
2.2 Field of the Invention
The present invention provides systems, apparatus, software, and methods for providing policy-based access to various user resources, such as, but not limited to restricted areas and devices (e.g., machines and vehicles). The present invention has application in the fields of security systems, computer science, and electronic communications.
2.3 The Related Art
Many situations in industry, business, and other aspects of modern life require controlled access to particular locations, machines, or other equipment. Often such situations arise because personnel and other individuals can safely or securely access such locations and devices when in possession of one or more devices, such as hard-hats, reinforced foot protection, breathing apparatus, safety harnesses, protective clothing, fire ground safety and rescue gear, and the like. In order to establish such controlled access, a management function, e.g., a safety or security committee, establishes policies setting forth the various requirements and rules to allow individuals access to the locations and devices that fall within the scope of the policy. Establishing and enforcing such policies is often important to protect businesses from theft and insurance claims arising from accidents.
Enforcing these policies, however, is not easy. Often personnel trained in the policy and its enforcement must be provided to watch the location or device to detect violators, which necessitates expensive training and outfitting. The personnel must also have authority to intercept potential violators and stop possibly violating actions. Such requirements can create conditions that create further risks by putting employees in conflict, which can create strains in an organization. Moreover, the enforcement process is itself often inefficient, with gaps in coverage or errors in observation of personnel causing violations of access policies.
It would thus be useful to have a more automated system of enforcing policy-based access to resources. The benefits of such a system would be the removal, or reduction, of human error in enforcement; the removal of potential conflicting situations between employees; and the reduction in cost to provide needed oversight. But the availability of these systems is severely limited by the need to provide specialized equipment and the limited scope of enforcement.
In particular, current systems cannot reliably determine, if at all, whether personnel have necessary equipment (e.g., safety equipment like hard-hats) when seeking access to a policy controlled resource like a construction site or heavy machinery. The present invention meets these and other needs.
The present invention provides solutions to the above-described limitations of the prior art. More particularly, the present invention provides methods, systems, apparatus, and software that enable the efficient control of policy-based access to resources.
In one aspect, the present invention provides a self-identifying device. In one embodiment, the self-identifying device comprises a device having a device identifier attached thereto, the device identifier including: a power source; communications means for receiving and sending signals; a data processor; and data storage containing encoded information about the identity and properties of the device.
In a more specific embodiment, the data storage further contains information about the user of the equipment. In a still more specific embodiment, additionally the communications means is configured to send and receive Bluetooth signals.
In one aspect, the present invention provides methods for providing policy-based access control. In one embodiment, a method for providing policy-based access to a policy-controlled resource for a user, comprising: detecting an electronically encoded signal from a computer-controlled electronic access control service at a user-controlled computer-controlled electronic communications device proximate to the user; receiving an electronically encoded compliance query from the computer-controlled electronic access control service at the computer-controlled electronic communications device; determining an electronically encoded response to the electronically encoded compliance query using an electronically encoded, computer-controlled process on the computer-controlled computation device; and returning the electronically encoded response to the computer-controlled electronic access control service using the computer-controlled computation device.
One embodiment of the method just described further includes starting an electronically encoded computer-controlled compliance determination process on the computer-controlled electronic communications device. A more specific embodiment further includes sending under computer control an electronically encoded response from the computer-controlled electronic communications device to the computer-controlled electronic access service in response to the electronically encoded signal. A still more specific embodiment still further includes searching under computer control for at least one electronically encoded signal corresponding to at least one aspect of the electronically encoded compliance query. In a yet more specific embodiment, the electronically encoded signal is a Bluetooth-encoded signal. A more specific embodiment, further comprises in addition to the foregoing receiving an electronically encoded compliance answer from the computer-controlled electronic access control service at the computer-controlled electronic communications device.
In another aspect, the present invention provides a method for providing policy-based access to a policy-controlled resource for a user, comprising: sending an electronically encoded signal from a computer-controlled electronic access control service to a user-controlled computer-controlled electronic communications device proximate to the user; sending an electronically encoded compliance query from the computer-controlled electronic access control service to the computer-controlled electronic communications device; receiving an electronically encoded response to the electronically encoded compliance query from the computer-controlled electronic communications device; and processing the electronically encoded response under an electronically en-coded computer-controlled process, the process being configured to determine whether to grant access to the policy-controlled resource.
In one embodiment of this aspect of the invention, the electronically encoded signal is configured to start an electronically encoded computer-controlled compliance determination process on the computer-controlled electronic communications device. A more specific embodiment of this method further includes receiving under computer control an electronically encoded response from the computer-controlled electronic communications device in response to the electronically encoded signal. In a still more specific embodiment, additionally the electronically encoded query is configured to enable the computer-controlled access control service to determine using an electronically encoded process under computer control whether the conditions of a policy controlling access to the resource are met.
In still another aspect, the present invention provides a computer-controlled, electronic system for providing policy-based access to a policy-controlled resource for a user, comprising: a computer-controlled electronic access control service configured to send an electronically encoded query to a user-controlled computer-controlled electronic communications device proximate to the user, the electronically encoded query being configured to enable the computer-controlled access control service to determine using an electronically encoded process under computer control whether the conditions of a policy controlling access to the resource are met; and process an electronically encoded response to the query from the computer-controlled electronic communications device using an electronically encoded computer-controlled process configured to determine whether to grant access to the policy-controlled resource to determine whether the conditions for the policy-based access have been satisfied.
These details, and still further aspects and advantages, will become apparent to those having ordinary skill in the art when the following Detailed Description is read in conjunction with the accompanying Drawings.
Exemplary embodiments of the present invention are described herein with reference to the following drawings, in which:
User 116 represents anyone seeking access to the controlled area via door 104, such as a worker, manager, or visitor. The user carries a device 120, which is necessary for the user to meet the requirements of the policy and pass through door 104. Device 120 can be anything required to be proximate to the user that is required by the policy governing access to the policy-controlled area as described above. The device further includes a device identifier 122 that identifies the device and, in some embodiments of the invention, provides information about the device and its status. In some embodiments, the device uses Bluetooth communications components and methods; in other embodiments, RFID or near-field communications are used instead of, or in addition, Bluetooth. In more specific embodiments, the device is a Bluetooth tag that is associated with the device. In some embodiments, the tag is detected by the user's computer-controlled electronic communications device (124), described in more detail herein below, one or more of the antennas 108 and 112, or both. In still other embodiments, the invention provides for the detection of unauthorized entry by the passing of unknown or unresponsive (or both) Bluetooth, RFID, near-field, Wi-Fi, cellular signals, or the like, passing an antenna. The provision of these elements and their operation will be familiar to those having ordinary skill in the art.
In some embodiments, the device identifier includes a power source, communications means for sending and receiving signals, a data processor, and data storage containing electronically encoded information about the identity and properties of said device. In more specific embodiments, the data storage further contains information about the user of said equipment. In still more specific embodiments, the communications device is configured to send and receive Bluetooth signals; in other embodiments, RFID or near-field communications are used instead of, or in addition, Bluetooth. The device identifier may be attached to the safety equipment using and attachment mechanism such as adhesive, zip tie, string, thread, tape, screws, nails, or other mechanical means. The device identifier could be built into the safety equipment.
In another embodiment the device identifier further includes an accelerometer. The accelerometer could detect motion patterns and the data processor could compare these patterns to known patterns. For instance, if the device identifier is attached to a hard hat, the accelerometer readings could be compared to the patterns of an accelerometer when worn on the head. This could be used to assure the hard hat is worn and not just carried. Or the accelerometer in a device identifier attached to a pair of goggles at a saw mill could indicate that the goggles were vertical, implying that the goggles were on the face protecting the user's eyes.
In another embodiment, a thermal detector could be incorporated in the device identifier, detecting body heat to determine if the equipment attached to the device identifier is being worn. For instance, the device identifier could be attached to gloves at a band saw, and the thermal sensor could detect if the gloves were on the hands. The provision of these elements and their operation will be familiar to those having ordinary skill in the art.
The user also carriers a computer-controlled electronic communications device (124), such as a smartphone, tablet computer, personal data assistant (“PDA”), or the like. Examples of suitable devices are those using the Android operating system (Google, Mountain View, Calif.) and the iOS operating system (Apple Computer, Cupertino, Calif.). Still other suitable devices and operating systems will be recognized by those having ordinary skill in the art. The device is capable of receiving signals from, and sending signals to, antennas 108 and 112 and device 120. The configuration and operation of the computer-controlled electronic communications device will be described in greater details herein below. The provision of these elements and their operation will be familiar to those having ordinary skill in the art.
The Access Control Service is also in bi-directional communication (either directly or over an electronic communications network) with a portal 212 demarcating the policy-controlled area from non-controlled areas (including areas under control of a different policy or policies). The portal has the general description provided for door 104 in
The Access Control Service also engages in bi-directional communication (either directly or over an electronic communications network) with one or more antennas or other devices that enable the transmission of electronically encoded signals between a user 220 and the Access Control Service. Such signals can be transmitted using methods such as cellular communications, Wi-Fi, radio, microwave, and other means familiar to those having ordinary skill in the art. The signals include signals encoded to broadcast the presence of the Access Control Service, which are sent at regular intervals to engage with a user's computer-controlled electronic communications device (124) as described herein. The provision of these elements and their operation will be familiar to those having ordinary skill in the art.
Turning to
In some embodiments, the user's device locates proximate devices by searching for electronically encoded signals from the device. In more specific embodiments, the signals are Bluetooth-encoded signals; in other embodiments, RFID or near-field communications are used instead of, or in addition, Bluetooth. In still more specific embodiments, the Bluetooth signals are from “tags” that provide an identifier, such as a serial number or the like, that is associated with a description or identifier of the device. In some embodiments, the user's device is responsible for determining the identification of the proximate device from the signal, e.g., by referring date stored on the user's device or by separate query to the Access Control Server, e.g., provided by the Access Control Service with the original query, or through another server. In alternative embodiments, the user's device relays the identifier to the Access Control Service for processing by the Access Control Service. Still other methods and materials for device identification will be apparent to those having ordinary skill in the art. The provision of these elements and their operation will be familiar to those having ordinary skill in the art.
Once the Access Control Service receives the response to the query from the user's device, the Service processes the query to determine if the policy requirements for access have been met. If the result is affirmative, then the Access Control Service enable access to the policy-controlled area by the user. This can be accomplished by enabling physical access, e.g., unlocking or unblocking a door, or by disabling an alarm or other warning. In addition, in some embodiments the Access Control Service sends a reply to the user's device indicating approval, e.g., by a sound or visual cue, or both. If the policy requirements are not met, then the Access Control Service prevents access, e.g., by maintaining or initiating a lock or block of a door, or by activating an alarm or warning. In addition, in some embodiments the Access Control Service sends a reply to the user's device indicating approval, e.g., by a sound or visual cue, or both. The provision of these elements and their operation will be familiar to those having ordinary skill in the art.
In one illustrative and non-limiting example, a user seeks to enter a policy-controlled work area that requires both a hard-hat and protective boots. The area is separated by a locked door that can be unlocked by a signal from an Access Control Service, configured as described herein, if the necessary policy conditions are met. The user carries a smartphone, such as an Android or Apple iPhone, that is configured to provide the functionalities described hereinabove.
As the user enters the uncontrolled area, his (or her) smartphone receives signals from the Access Control Servers that initiate a process to respond to queries from the Access Control Service. When the process is running, it sends to the Access Control Service a response that causes the Access Control Service to forward the query appropriate for access to the controlled area. The process receives the query and determines which devices are needed to demonstrate access. Alternatively, the query simply tells the process to locate all devices proximate to the user. In a second alternative, the query more specifically identifies the devices to boots and a hard-hat.
The process then seeks Bluetooth signals proximate to the user; in other embodiments, RFID or near-field communications are used instead of, or in addition, Bluetooth. If no Bluetooth (or equivalent) signals are received, then the process returns that result; the Access Control Service determines the policy conditions have not been met; and sends an exception to the user and maintains the lock. If Bluetooth signals are received, then the process either determines the corresponding identifiers and their corresponding device identities (i.e., if they are from the boots and hard-hat), or the process forwards the corresponding identifiers to the Access Control Service for further analysis. If the Access Control Service determines that the identifiers are sufficient to allow the users to meet the policy requirements for access, then the Access Control Service unlocks the door and sends a corresponding reply to the process, which then notifies the user. If the Access Control Service determines that all of the identifiers are present, but not sufficient (e.g., wrong type of boots or hard-hat), or that at least one identifier is not present (e.g., the hard-hat is present, but not the boots), then the Service denies access as just described.
In another embodiment, the computer-controlled electronic communications device (124) could interrogate other computer-controlled electronic communications devices proximate to the computer-controlled electronic communications device (124) to see if these other devices have located device identifiers 122 attached to safety equipment. If the computer-controlled electronic communications device (124) is not connected to similar equipment, the computer-controlled electronic communications device (124) could sound an alarm. For instance, if the user's cell phone checks with the nearby cell phones of other users, and finds that everyone else is wearing a hard hat but the user is not, the cell phone would sound an alarm.
In another embodiment, a police department could establish a virtual zone around a dangerous situations by defining the protected zone using IPS, beacons, GPS, Assisted GPS, U-TDOA or other similar technologies to map out the area. This is the policy-controlled area. A wireless protocol, such as cellular, Wi-Fi, or Bluetooth can then be used to identify all devices (computer-controlled electronic communications device (124)) within the protected zone or that are entering the protected zone. Each police officer runs an app on their cell phones that connects to tags 122 on the equipment that they are carrying. The tags 122 may be placed on the bullet proof vests, their uniforms, various radios and weapons. When the police office enters the protected zone (and while in the protected zone), the cell phone app takes an inventory of the equipment that he is carrying. The app then reports this equipment to a central computer (Access Control Service) that maps where all of the police officers are located along with the equipment they are carrying. This will allow police supervisors to locate needed equipment within the protected zone, such as an officer with a particular weapon.
Should the police supervisors decide that all police officers located in the protected zone must be wearing certain equipment, such as a bullet proof vest, then every police officer entering the protected zone will be warned if they attempt to enter the protected zone without the bullet proof vest, and the central computer will be notified if they continue into the protected zone. All police officers within the protected zone at the time that the requirement is set may also be warned that they are not in compliance. This embodiment could also be extended to firefighters at the scene of a fire.
The above description of the embodiments, alternative embodiments, and specific examples, are given by way of illustration and should not be viewed as limiting. Further, many changes and modifications within the scope of the present embodiments may be made without departing from the spirit thereof, and the present invention includes such changes and modifications.
Number | Date | Country | |
---|---|---|---|
62043580 | Aug 2014 | US |