The invention is generally related to monitoring and tracking objects, and more particularly, to systems, devices and methods for monitoring and tracking objects in a controlled space such as a jobsite.
Companies typically have difficulties tracking jobsite items (including tools, equipment, instruments, parts, components, direct materials, etc.) and their usage within their facilities. Many jobsite items are misused, misplaced, and improperly tracked and replenished by the employees of the companies. For example, the General Contractors of California report that 85% of all jobsite item thefts are employee-related. Losing these jobsite items adversely affects the operation of a jobsite in various ways, including but not limited to monetary loss, project delays, loss production, duplicate orders, increased administrative cost, and increased insurance premiums.
The problem escalates when outside of a controlled environment such as a facility. Jobsite equipment and inventory theft is significant with industry loss estimates up to one billion dollars annually, according to a 2003 National Equipment Register study. Tool tracking and management systems provide one level of security, but a large percentage of theft includes jobsite items disappearing from jobsites at the end of the workday. Generally, only limited resources may be allocated to management of jobsite items at the perimeter of a controlled space such as a facility or an outdoor temporary worksite. Although manned jobsite perimeter security and personal inspection of workers is one option, providing the dedicated resources for such manned security is usually too costly to be considered. With many jobsites operating with aggressive deadlines on a 24-hour per day schedule, providing a security guard at every exit for multiple shifts throughout the day and night is not a viable option. Furthermore, manual inspection of workers would severely bottleneck exiting personnel during a shift change or other heavy traffic times, leading to further inefficiencies in the process.
Some contemporary solutions to this problem include security portals activated by special electronic article surveillance (“EAS”) security tags. Similar to retail environments, in practice, the portal sounds an alarm when an EAS tagged jobsite item passes through it. These portals must generally be carefully set up and aligned properly at every entry and exit point of a jobsite to ensure that accurate detection of the EAS security tags occurs. This set up process is time consuming and expensive, and is not a reasonably effective option for preventing jobsite item theft at temporary jobsites such as construction jobsites. Moreover, these portals may be significantly affected by harsh environmental conditions at a jobsite and become inoperable or damaged during use. Furthermore, these solutions still lack the tracking and access control that is beneficial on a jobsite with combinations of employees and contractors, as well as ease and portability of the secured area.
In another example, some jobsites store high-value jobsite items in a further controlled space with electronic access control systems configured to limit exposure of such jobsite items to certain personnel. However, these systems generally do not track inventory or other jobsite items on an individual level, and any tracking that is conducted is usually performed manually. These arrangements still do not solve the problem of jobsite item theft and add more inefficiencies to the security process.
Therefore there is a need in the art for a system, apparatus and method that detects and discourages jobsite item theft or unauthorized removal, which is conveniently portable and insulated from harsh environmental conditions.
Embodiments of the invention provide a mobile security system for a jobsite including a container, which is configured to be readily moved to a plurality of locations. The container is rugged or industrial-grade and includes a housing having first and second end walls and first and second side walls extending between the first and second end walls. The container also includes an interior within the housing and a walkway extending transversely through the housing and through the first and second end walls. A radio frequency identification (RFID) detection system is associated with the container. The RFID detection system includes at least one RFID antenna that detects RFID tags passing through the walkway, and a RFID reader that identifies an RFID tag associated with a jobsite item that are detected by the at least one RFID antenna. For example, the RFID detection system operates as an automatic identification and data capture system. The mobile security system also includes an alarm system associated with the container and producing a visible and/or audible signal when a RFID tag associated with a jobsite item is identified by the RFID reader. The RFID detection system also includes one or more IP cameras that photograph personnel moving through the container whenever motion is detected by the IP cameras. The RFID tag information and photographs are stored in local memory or transmitted to a central security system, and the relevant security or management personnel may be notified immediately via e-mail or other electronic communication methods. In this regard, the mobile security system is a comprehensive security system for any jobsite.
An uninterruptible power supply (UPS) is operable to provide power to the RFID detection system and the alarm system. A central processing unit (CPU) may be operatively coupled to the alarm system and the RFID detection system, thereby controlling the actuation of the alarm system when the RFID detection system identifies a RFID tag associated with a jobsite item. The container includes a primary cabinet positioned alongside the walkway in the interior of the container, the primary cabinet holding the RFID antenna, the RFID reader, the UPS, and the CPU. The primary cabinet is positioned such that access into the primary cabinet from the walkway is prevented. The primary cabinet is configured to prevent unauthorized tampering with the electronic components of the mobile security system and is also configured to prevent damage to these electronic components that may be caused by vibrations and movement of the container. The rugged container also prevents damage to the electronic components caused by harsh environmental conditions at a jobsite. To this end, the mobile security system is a turnkey solution which requires no on-site assembly and is durable enough to withstand harsh jobsite environments, whether at a facility or outdoors.
In one embodiment, the container of the mobile security system may be moved in front of an exit gate of the jobsite such that the exit gate is only accessible through the walkway. As people walk through the walkway to access the exit gate, the RFID detection system scans those people in the walkway and identifies any RFID tags associated with a jobsite item carried by those people. If such a RFID tag is identified, the alarm system is actuated to produce an audible and/or visible signal to deter or prevent removal of that jobsite item from the jobsite. People walking through the container also activates the motion-sensitive IP cameras in the container, which record photographic or video evidence of every person leaving the jobsite. Furthermore, an e-mail notification is triggered and sent to designated security or management personnel to report any incident. The container may then be moved to another exit gate or another jobsite without requiring a new assembly of all the electronic components. At the completion of a project, the mobile security system can be transported to the next site without requiring any downtime for re-assembly. The mobile security system provides a comprehensive, rugged, industrial-strength, turnkey solution to jobsite security and jobsite item theft problems.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and, together with a general description of the invention given above, and the detailed description given below, serve to explain the invention.
It should be understood that the appended drawings are not necessarily to scale, presenting a somewhat simplified representation of various features illustrative of the basic principles of the invention. The specific design features of the sequence of operations as disclosed herein, including, for example, specific dimensions, orientations, locations, and shapes of various illustrated components, will be determined in part by the particular intended application and use environment. Certain features of the illustrated embodiments have been enlarged or distorted relative to others to facilitate visualization and clear understanding. In particular, thin features may be thickened, for example, for clarity or illustration.
Embodiments of the invention provide a mobile perimeter access security system that utilizes radio frequency identification (“RFID”) to secure exit gates or portals of a controlled space such as a jobsite. As seen generally in
In general operation of any of the implementations of the mobile security system 20, as a person steps into the walkway 24 of the container 22, a RFID detection system 26 scans the person to detect any RFID tags moving through the container. If the RFID detection system 26 detects any such RFID tags, the detected RFID tags are compared to a database of RFID tags associated with jobsite items including but not limited to tools, equipment, instruments, parts, components, and inventory. If the RFID detection system identifies a detected RFID tag as being associated with a jobsite item, an alarm system 28 within the container 22 is actuated to produce an audible and/or visual signal indicating the removal of a jobsite item from the jobsite. A camera device 30 may also be actuated to photograph the person in the walkway 24 upon sensing motion inside the container 22. The person may then be stopped at the turnstile 14 of the exit gate 10 or later identified by the photographs after passing through the exit gate 10 so that the jobsite items may be returned or replaced to the jobsite. To this end, the mobile security system 20 detects and prevents unauthorized removal and theft of jobsite items. Furthermore, the mobile security system 20 is a turnkey security solution that is rugged enough for industrial settings, completely mobile, and requires no installation or setup after moving to a new site.
Referring now to
The mobile security system 20 further includes a RFID detection system 26 positioned within a primary cabinet 54 and a secondary cabinet 56 located adjacent to the walkway 24 on opposing sides of the interior 46 of the container 22. The RFID detection system 26 is embodied as an automatic identification and data capture RFID system. Although the exemplary embodiment shown in the figures illustrates two equipment cabinets 54, 56, the RFID detection system 26 could also be placed in one cabinet or more than two cabinets in other embodiments. As shown in
The mobile security system 20 also includes an alarm system 28 positioned within the container 22. The alarm system 28 includes at least one siren 64 mounted along one of the walls 38, 40, 42, 44 of the container. The siren 64 is configured to produce an audible signal or alarm noise when a RFID tag associated with a jobsite item has been identified by the RFID detection system 26. The alarm system 28 may also include at least one warning light or strobe light 66 positioned in the interior 46 of the container 22. More particularly, the strobe light 66 may be positioned on the siren 64 as shown in
The mobile security system 20 may further include a computer or central processing unit (CPU) 68 and an uninterruptible power supply (UPS) 70 housed within the primary cabinet 54. The CPU 68 is operatively connected to the RFID detection system 26 and the alarm system 28 and controls the operation of each of these components of the mobile security system 20. To this end, the alarm system 28 may further include a siren relay 72 located adjacent the CPU 68 in the primary cabinet 54. The siren relay 72 is configured to receive actuation signals from the CPU 68 when a RFID tag associated with a jobsite item has been identified by the RFID detection system 26 and thereby cause the actuation of the siren 64 and/or the strobe light 66. The CPU 68 may also be operable to store the database of RFID tags associated with jobsite items on the jobsite and also store photographic evidence of potential unauthorized removals of jobsite items as described in further detail below. The UPS 70 is configured to provide an uninterrupted supply of electrical power to each of the electronic components of the mobile security system 20, including the RFID detection system 26, the alarm system 28, and the CPU 68. The UPS 70 may receive power from appropriate connections near the exit gate 10 and may also have a battery backup in case the jobsite power supply is interrupted. The alarm system 28 may also be configured to emit a different indication signal for a loss of power when the UPS 70 is powering the mobile security system 20 on battery power so that the loss of power may be addressed before the battery drains. One or more cooling units (not shown) may also be provided on the primary cabinet 54 to remove heat generated from the electronic components from the primary cabinet 54.
As shown in
As shown in
The electronic components of the mobile security system 20 are shown schematically in further detail in
The CPU 68 also typically receives a number of inputs and outputs from the other components of the mobile security system 20. For interface with a user or operator, the CPU 68 typically includes one or more user interface devices 90, such as input devices (e.g., a keyboard, a mouse, a trackball, a joystick, a touchpad, a keypad, a stylus, and/or a microphone, among others). The interface devices 90 may also include a display or other output device (e.g., a CRT monitor, an LCD display panel, and/or a speaker, among others). In the exemplary embodiment, the interface devices 90 include a display monitor 92 in the primary cabinet 54 as also shown in
The CPU 68 operates under the control of an operating system 98, and executes or otherwise relies upon various computer software applications, components, programs, objects, modules, data structures, etc. (e.g. system software 100). Under control of the operating system 98 and the system software 100, the processor 84 actuates scans of the interior 46 of the container 22 with the RFID detection system 26 and actuates the alarm system 28 when appropriate. The operation of the mobile security system 20 is explained in further detail with reference to
In general, the routines executed to implement the embodiments of the invention, whether implemented as part of an operating system or a specific application, component, program, object, module or sequence of instructions will be referred to herein as “computer program code”, or simply “program code”. The computer program code typically comprises one or more instructions that are resident at various times in various memory and storage devices in a computer, and that, when read and executed by one or more processors in a computer, causes that computer to perform the steps necessary to execute steps or elements embodying the various aspects of the invention. Moreover, while the invention has and hereinafter will be described in the context of fully functioning computers and computer systems, those skilled in the art will appreciate that the various embodiments of the invention are capable of being distributed as a program product in a variety of forms, and that the invention applies equally regardless of the particular type of computer readable media used to actually carry out the distribution. Examples of computer readable media include but are not limited to physical, recordable type media such as volatile and non-volatile memory devices, floppy and other removable disks, hard disk drives, optical disks (e.g., CD-ROM's, DVD's, etc.), among others, and transmission type media such as digital and analog communication links.
In addition, various program codes described hereinafter may be identified based upon the application or software component within which it is implemented in specific embodiments of the invention. However, it should be appreciated that any particular program nomenclature that follows is merely for convenience, and thus the invention should not be limited to use solely in any specific application identified and/or implied by such nomenclature. Furthermore, given the typically endless number of manners in which computer programs may be organized into routines, procedures, methods, modules, objects, and the like, as well as the various manners in which program functionality may be allocated among various software layers that are resident within a typical computer (e.g., operating systems, libraries, APIs, applications, applets, etc.), it should be appreciated that the invention is not limited to the specific organization and allocation of program functionality described herein.
Those skilled in the art will recognize that the exemplary environment illustrated in
One particular jobsite item that encounters regular theft or unauthorized removal from a jobsite is tools, such as the hammer 102 shown in
In some embodiments, it may be desirable to permit certain top-level personnel or contractors to leave a jobsite with jobsite items without setting off an alarm. These top-level personnel or authorized persons are provided with RFID key fobs associated with them. Alternatively, the authorized personnel may be provided with RFID cards, RFID tags implanted into a hard hat, or other alternative RFID tags instead of a fob, but in
As discussed above, the mobile security system 20 is configured for wholesale movement and turnkey placement in front of an exit gate 10 of a jobsite or other controlled space. When the container 22 is a standard shipping container as in the exemplary embodiment, a standard forklift 180 may be used to move the mobile security system 20 as shown in
While the present invention has been illustrated by a description of one or more embodiments thereof and while these embodiments have been described in considerable detail, they are not intended to restrict or in any way limit the scope of the appended claims to such detail. Additional advantages and modifications will readily appear to those skilled in the art. The invention in its broader aspects is therefore not limited to the specific details, representative apparatus and method, and illustrative examples shown and described. Accordingly, departures may be made from such details without departing from the scope of the general inventive concept.
Number | Name | Date | Kind |
---|---|---|---|
5745036 | Clare | Apr 1998 | A |
7086558 | Pixley et al. | Aug 2006 | B1 |
7317393 | Maloney | Jan 2008 | B2 |
7337963 | Harper et al. | Mar 2008 | B2 |
7371977 | Preonas | May 2008 | B1 |
20010035410 | Taube et al. | Nov 2001 | A1 |
20020089434 | Ghazarian | Jul 2002 | A1 |
20040150525 | Wilson et al. | Aug 2004 | A1 |
20040164864 | Chung et al. | Aug 2004 | A1 |
20060103520 | Clark | May 2006 | A1 |
20060107614 | Slagel | May 2006 | A1 |
20070018826 | Nowak et al. | Jan 2007 | A1 |
20070108273 | Harper et al. | May 2007 | A1 |
20070115127 | Harper et al. | May 2007 | A1 |
20070290849 | Tuttle | Dec 2007 | A1 |
20080100416 | Harper et al. | May 2008 | A1 |
20080164311 | Harper et al. | Jul 2008 | A1 |
20080165013 | Harper et al. | Jul 2008 | A1 |
20080246613 | Linstrom et al. | Oct 2008 | A1 |
20080250726 | Slagel et al. | Oct 2008 | A1 |
20090033154 | Linkhart et al. | Feb 2009 | A1 |
20100289626 | Oberle et al. | Nov 2010 | A1 |
20110106681 | Cockerell et al. | May 2011 | A1 |
Entry |
---|
Autocrib, Inc., AutoCrib Website Pages, http://www.autocrib.com/Intelliport, Apr. 27, 2009, 6 pages. |
Dropbox, Inc., DropBox Website Pages, http://www.dropboxinc.com, Apr. 27, 2009, 4 pages. |
Dropbox, Inc., Drop Box Brochure from Website, http://www.dropboxinc.com, 2 pages. |
Stanley Black & Decker, Inc., CribMaster Website Pages, http://www.cribmaster.com, Apr. 27, 2009, 3 pages. |
U.S. Patent and Trademark Office; Office Action in U.S. Appl. No. 12/432,361 dated Nov. 30, 2011, 12 pages. |
Number | Date | Country | |
---|---|---|---|
20120306651 A1 | Dec 2012 | US |