The present disclosure relates generally to controlling access to portable computing devices. More specifically, the present disclosure relates to electric means and mechanical means for controlling access to portable computing devices secured in a multi-bay charging station.
Many general-purpose portable consumer devices such as iPhones, iPads, iPods, and Android-based phones, tablets, and phablets are being used in the workplace. Examples of industries that use such portable consumer devices include healthcare (hospitals and clinics), hospitality (hotels), etc. Use of these devices is becoming even more prevalent with the development of cases which add workplace-specific functionality to the device such as a barcode-reading sled and the development of decoder applications that enable the native camera within the device to be used for barcode reading.
A problem is that these devices are general-purpose consumer devices and have significant value outside of the workplace. The value of these devices and their usefulness in consumer applications create an incentive for the devices to be misappropriated. Misappropriation of such devices is a particular problem in a workplace environment where devices are shared among co-workers and accountability for securing the device is not assigned to any particular individual.
A first aspect of the present disclosure comprises a method for controlling access to each of a plurality of portable computing devices and assigning responsibility for security of a portable computing device to a particular authorized user.
The method may comprise: i) obtaining identification information of a user; ii) selecting a portable computing device from the plurality of portable computing devices and recording an association of the user and the selected portable computing device within a database; and iii) unlocking the selected portable computing device.
Unlocking the selected portable computing device may comprise unlocking a mechanical lock which secures the selected portable computing device within a bay of a multi-bay charging station. Each bay of the multi-bay charging station may include a mechanical lock which is controlled independently of the mechanical lock for each of the other bays.
The identification information of the user may be obtained by reading a character string unique to the user from a barcode on an identification card of the user. Alternatively, the identification information of the user may be obtained by a radio frequency identity (RF ID) reader reading a character string unique to the user from an RF ID access device of the user. Alternatively, the identification information of the user may be a user identification character string and/or passcode entered by the user. Alternatively, the identification information of the user may be a biometric characteristic unique to the user which is obtained by reading or measuring the unique biometric characteristic of the user.
The method may further comprise: i) determining an identification of a checked-in portable computing device being returned to one of the bays of the multi-bay charging station; ii) locking the checked-in portable computing device within the bay to which the portable computing device is being returned; and iii) performing one of: a) recording an indication that the portable computing device has been checked in; or b) recording a dissociation of the user and the checked-in portable computing device. In each case, the authorized user is released from responsibility for security of the checked-in portable computing device.
The identification of the checked-in portable computing device may be determined by reading or obtaining a device ID from the checked-in portable computing device via a power/data connector through which the checked-in portable computing device is charged. Alternatively, the identification of the checked-in portable computing device may be determined by receiving a device ID from the checked-in portable computing device via a radio frequency (RF) interface.
The method may further comprise: i) sending the identification information from a first system which obtains the identification of the user to a remote authorization controller via a network which interconnects the first system which obtains the identification of the user and the remote authorization controller, wherein an authorization signal is generated by the remote authorization controller based on the identification information of the user; and ii) unlocking the selected portable computing device in response to receiving the authorization signal from the remote authorization controller.
The method may further comprise: i) determining an identification of a checked-in portable computing device being returned to one of the bays of the multi-bay charging station; ii) locking the checked-in portable computing device within the bay to which the portable computing device is being returned; and iii) sending identification of the checked-in portable computing device to the remote authorization controller via the network.
Another aspect of the present disclosure comprises an apparatus for controlling access to each of a plurality of portable computing devices and assigning responsibility for security of a portable computing device to a particular authorized user. The apparatus may comprise: i) an identification information reader for obtaining identification information of a user; ii) a controller for selecting a portable computing device from the plurality of portable computing devices and recording an association of the user and the selected portable computing device within a database; and iii) a locking mechanism for locking each of the plurality of portable computing devices and unlocking the selected portable computing device for use by the authorized user in response to the controller providing an authorization signal.
The locking mechanism may be a multi-bay charging station with each bay including a mechanical lock which is controlled independently of the mechanical lock for each of the other bays.
The identification information reader may be a barcode reader and the identification information of the user may be obtained by reading a character string unique to the user from a barcode on an identification card of the user. Alternatively, the identification information reader may be an RF ID reader interrogating an RF ID access device and the identification information of the user may be a character string unique to the user which is obtained by a radio frequency identity (RF ID) from an RF ID access device of the user. Alternatively, the identification information reader may be a mechanical keypad or electronic (virtual) keypad implemented as a touchscreen display and the identification information of the user may be a user identification character string and/or passcode entered by the user. Alternatively, the identification information reader may be a biometric reader and the identification information of the user may be a biometric characteristic of the user obtained by reading or measuring that biometric characteristic of the user.
The apparatus may be further configured to: i) determine an identification of a checked-in portable computing device being returned to one of the bays of the multi-bay charging station; ii) lock the checked-in portable computing device within the bay to which the checked-in portable computing device is returned; and iii) perform one of: a) record an indication that the portable computing device has been checked in; or b) record a dissociation of the user and the checked-in portable computing device. In each case, the authorized user is released from responsibility for the security of the checked-in portable computing device.
The apparatus may be configured to determine the identification of the checked-in portable computing device by reading a device ID via a power/data connector through which the checked-in portable computing device is charged. Alternatively, the apparatus may be configured to determine the identification of the checked-in portable computing device by receiving a device ID from the checked-in portable computing device via a radio frequency (RF) interface.
The identification information reader may be embodied in a first system which further includes a communication interface communicatively coupling the identification information reader to the controller via a network. In this embodiment, the controller may be configured to receive an authorization request message comprising the identification information of the user and provide an authorization response message. The locking mechanism may be configured to unlock the selected portable computing device in response to the authorization response message.
The apparatus may further comprise, within each bay of the multi-bay charging station, an ultraviolet light for sterilizing the checked-in portable computing device. In this embodiment, the ultraviolet light is activated to sterilize the checked-in portable computing device upon it being returned to the bay of the multi-bay charging station.
Another aspect of the present disclosure comprises a portable computing device. The portable computing device may comprise an identification information reader for obtaining user identification information identifying a user and a network interface for: i) sending an authorization request to a remote server, the authorization request comprising identification of the portable computing device and the user identification information; and ii) receiving an authorization response from the remote server. A controller may unlock the portable computing device based on the authorization response received from the remote server.
In one embodiment, unlocking the portable computing device may comprise sending an unlock signal to a mechanical device securing the portable computing device whereby the mechanical device mechanically releases the portable computing device in response to the unlock signal.
In another embodiment, the authorization response may include an authorization code and unlocking the portable computing device may comprise input of the authorization code to an electronic locking system of the portable computing device, and the electronic locking system unlocks the portable computing device to enable use only if the authorization code is a valid authorization code.
In yet another embodiment, the controller may be further configured to lock the portable computing device if it is moved beyond a limited area in which the user is authorized to operate the portable computing device.
In an exemplary embodiment, the system 10 may comprise a multi-bay charging station 20, a freestanding user identification information reader system 18 (which may alternatively be referred to as a standalone user identification information reader system 18), and/or an authorization server 16, each of which may be interconnected to the other components and/or each of the plurality of portable computing devices 14a, 14b, 14c via a communication network 12.
The communication network 12 may be compatible with any network protocol including, but not limited to, wired and/or wireless TCP/IP protocols such as IEEE 802.11 and various wide area wireless network protocols such as Wideband Code Division Multiple Access (WCDMA), High Speed Packet Access (HSPA), cdma2000, Long Term Evolution (LTE), or the like.
The authorization server 16 may maintain a wired or wireless link 40 with the network 12 for communication with any of: i) the freestanding user identification information reader system 18; ii) the multi-bay charging station 20; and/or iii) at least one of the portable computing devices 14a, 14b, 14c.
The freestanding user identification information reader system 18 may include a network interface system 28 (e.g., a network interface card (NIC)) which implements a wired or wireless link 30 between the freestanding user identification information reader system 18 and the network 12 for communication with any of: i) the multi-bay charging station 20; ii) the authorization server 16; and/or iii) any of the portable computing devices 14.
The multi-bay charging station 20 may include a network interface system 32 (e.g., an NIC) which implements a wired or wireless link 34 between the multi-bay charging station 20 and the network 12 for communication with any of: i) the freestanding user identification information reader system 18; ii) the authorization server 16; and/or iii) any of the portable computing devices 14.
The multi-bay charging station 20 and the freestanding user identification information reader system 18 may further be communicatively connected by a wired or wireless point-to-point communication link 45, enabling communication between the freestanding user identification information reader system 18 and the wired or wireless point-to-point communication link 45. The point-to-point communication link 45 may be compatible with the following technologies: Universal Serial Bus (USB), serial Universal Asynchronous Receiver/Transmitter (UART), Bluetooth, or other wired or wireless point-to-point communication technologies.
Each portable computing device 14 may include a network interface system 36 which implements a wireless (or wired) link 38 between the portable computing device 14 and the network 12 for communication with any of: i) the freestanding user identification information reader system 18; ii) the authorization server 16; and/or iii) the multi-bay charging station 20. Further, each portable computing device 14 may include a power/data connector 37 which implements a data link 39 with a data interface 48 of the multi-bay charging station 20 which, among other functions, enables the portable computing device 14 to communicate with any of: i) the multi-bay charging station 20, ii) the freestanding user identification information reader system 18 (utilizing the network interface system 32 of the multi-bay charging station 20 and the network 12 or the point-to-point communication link 45); or iii) and the authorization server 16 (utilizing the network interface system 32 of the multi-bay charging station 20 and the network 12). The portable computing devices 14 may be recharged through the power/data connector 37 by the power interface 50 of the multi-bay charging station 20.
The system 10 includes at least one identification information reader 22, 24, 26 which is used to identify an authorized user to which at least one of the portable computing devices 14a, 14b, or 14c will be checked out (unlocked) for use by the authorized user.
The at least one identification information reader 22, 24, 26 may be embodied as any of: i) an identification information reader 22 embodied within the multi-bay charging station 20; ii) an identification information reader 26 embodied in a freestanding user identification information reader system 18; iii) an identification information reader 24a embodied as a fingerprint reader within at least one of the portable computing devices 14a, 14b, and 14c; iv) an identification information reader 24b (shown in
Turning to
Returning to
The at least one authorization control module 42 may be implemented as: i) an authorization control module 42a within the authorization server 16; ii) an authorization control module 42b implemented within the freestanding user identification information reader system 18; iii) an authorization control module 42c implemented within the multi-bay charging station 20; and/or iv) an authorization control module 42d implemented within a least one of the portable computing devices 14a, 14b, and 14c.
The at least one database 44 may be implemented as: i) database 44a within the authorization server 16; ii) database 44b implemented within the freestanding user identification information reader system 18; and/or iii) database 44c implemented within the multi-bay charging station 20. A more detailed discussion of the authorization control module 42 and the database 44 is included herein.
The system 10 further includes a least one locking system which may be implemented as: i) a mechanical locking system implemented in the multi-bay charging station 20 which prevents removal of each portable computing device 14a, 14b, and 14c until such time that authorization to unlock has been generated by the authorization control module 42; and/or ii) an electronic locking system implemented in at least one of the portable computing devices 14a, 14b and 14c which prevents use of the device (e.g., the device remains disabled) until such time that authorization to unlock has been generated by the authorization control module 42.
In a case where the portable computing device 14 receives an authorization response from a remote authorization control module, the portable computing device 14 may send an unlock signal to a mechanical device (e.g., the multi-bay charging station 20), securing the portable computing device 14 whereby the mechanical device may mechanically release the portable computing device 14 in response to the unlock signal.
In another embodiment, the authorization response that the portable computing device 14 receives may include an authorization code and the portable computing device 14 may be unlocked by inputting the authorization code to an electronic locking system of the portable computing device 14. The electronic locking system may unlock the portable computing device 14 to enable use if the entered authorization code is a valid authorization code.
For clarity, mechanical locks 47a and 47c are depicted in a locked position wherein portable computing devices 14a and 14c are physically restrained from being removed from the charging cradle 57a and 57c. Mechanical lock 47b is depicted in a released position such that portable computing device 14b may be removed from the charging cradle 57b without physical restraint by mechanical lock 47b.
The locking system of the embodiment includes a locking control module 46a and the mechanical locks 47a, 47b, and 47c, each of which is associated with a charging bay and each of which is coupled to an independent actuator 56a, 56b, and 56c such that each mechanical lock 47a, 47b, and 47c can be independently toggled between its locked position and its released position
In operation, the locking control module 46a may receive an authorization signal 58 from an internal authorization control module 42c or an authorization signal 58 embodied as an authorization response 59 from a remote authorization control module 42a, 42b, or 42d via the network interface system 32 and the network 12 or the point-to-point communication link 45.
In response to an authorization signal 58, the locking control module 46a actuates (e.g., provides actuation power to) the actuator 56a, 56b, or 56c associated with the charging cradle 57a, 57b, 57c in which the selected portable computing device 14 to be unlocked is positioned. Actuating the actuator 56a, 56b, or 56c has the result of toggling the mechanical lock 47a, 47b, or 47c to its released position such that the user may remove the unlocked portable computing device 14 from its charging bay.
Locking compartments 60c and 60d are depicted with locking doors removed to show components within the interior 67c and 67d of the locking compartments 60c and 60d. Within the interior of the locking compartments 60a-f may be: i) an electrical cord with a connector 69a-f which couples to the power/data connector 37 of a portable computing device 14 for charging power to the portable computing device 14; and ii) a communication connection between the portable computing device 14 and the data interface 48 within the multi-bay charging station 20.
Similar to the embodiment of
Further, in some embodiments, each locking compartment 60a-f may include a sterilization system 68 such as an ultra-violate illumination source that is activated for a predetermined period of time to sterilize a portable computing device 14 within the locking compartment 60a-f. Sterilization systems 68c and 68d are depicted in
Examples of when both the authorization control module 42 and the identification information reader 22, 24, or 26 are operated by the same processor include: i) when both the identification information reader 22 and the authorization control module 42c within the multi-bay charging station 20 are controlled by the same processer within the multi-bay charging station 20; ii) when the identification information reader 26 and the authorization control module 42b within the freestanding user identification information reader system 18 are controlled by the same processor within the freestanding user identification information reader system 18; or iii) when the identification information reader 24a, 24b, or 24c and the authorization control module 42d within a portable computing device 14 are controlled by the processor of the portable computing device 14.
When the authorization control module 42 is separate from the identification information reader 22, 24, 26 which provides the identification information of the user, step 140 may comprise obtaining an authorization request message 142 from the device in which the identification information reader 22, 24, 26 is embodied. The authorization request message 142 may include the identification information of the user and be sent between the devices via one of, or a combination of, the network 12, the point-to-point communication link 45, and/or the data link 48 supporting data communication with the portable computing device 14 through its power/data connector 37.
In embodiments where an authorization request message is sent from a device comprising an identification information reader 22, 24, 26 to a device comprising the authorization control module 42, the authorization request message 142 may further include an identification of the portable computing device the user is requesting to unlock and/or identification of one or more of the portable computing devices 14 that are available to be checked out (e.g., that are fully charged and/or the sterilization cycle is complete).
Step 144 represents selecting one of the plurality of available portable computing devices 14 to unlock (e.g., the selected portable computing device 14). In one embodiment, selecting one of the plurality of available portable computing devices 14 may comprise determining which one of the available portable computing devices 14 the authorized user has selected for use. For example, if the user utilizes the touch screen user interface of a portable computing device 14 to enter user identification information or uses the front- or rear-facing camera of a portable computing device 14 to capture user identification information then that portable computing device 14 may be the selected portable computing device. In the event that a multi-bay charging station 20 includes hardware and/or software means for obtaining user selection of one of the portable computing devices 14 therein, that portable computing device may be the selected portable computing device. Similarly, in the event that a multi-bay charging station 20 includes means for obtaining user selection of one of the locking compartments 60a-f or charging cradles 57a-c, the portable computing device 14 within the selected locking compartment 60a-f or the charging cradle 57a-c may be the selected portable computing device.
In another embodiment, selecting one of the plurality of available portable computing devices 14 may comprise determining which one of the available portable computing device 14 has been assigned for use by the authorized user on a permanent, semi-permanent, or long term (e.g., multi-work shift) basis. In this embodiment, the authorization control module 42, after obtaining identification information of the user, may query a database to obtain one of: the device ID of the portable computing device 14 that has been assigned to the user; or ii) the location (e.g., the identification of the locking compartment 60a-f or the charging cradle 57a-c) in which the portable computing device 14 that has been assigned to the user is positioned.
In yet another embodiment, selecting one of the plurality of available portable computing devices 14 may comprise determining which portable computing devices 14 are available for checkout and selecting one of the available portable computing devices 14 at random or utilizing predetermined criteria. The portable computing devices 14 that are determined to be available for checkout may be those portable computing devices 14 that: i) are charged above a selected threshold (e.g., are fully charged); and/or ii) have completed sterilization. Determining which portable computing devices 14 are charged above a selected threshold may be determined by calculating charging time for a portable computing device 14 (i.e., the time since the portable computing device 14 began charging) or by receiving from the multi-bay charging station 20 an indication that the portable computing device 14 has completed its charging cycle.
Similarly, determining which portable computing devices 14 have completed sterilization may be determined by calculating sterilization time for a portable computing device 14 (e.g., the time since the portable computing device 14 began sterilization) or by receiving from the multi-bay charging station 20 an indication that the portable computing device 14 has completed sterilization.
Step 146 represents recording, in a database 44, an association of the user identification of the authorized user, device identification of the selected portable computing device 14 to be unlocked, and/or an identification of the date and time the selected portable computing device 14 is unlocked for use.
Turning briefly to
Returning to
Examples of when both the authorization control module 42 and the locking control module 46 are operated by the same processor include: i) when the locking control module 46a and the authorization control module 42c within the multi-bay charging station 20 are controlled by the same processer within the multi-bay charging station 20; and ii) when the locking control module 46b and the authorization control module 42d within a portable computing device 14 are controlled by the processor of the portable computing device 14.
When the authorization control module 42 is separate from the locking control module 46, step 148 may comprise generating an authorization response 150 and providing the authorization response 150 to the locking control module 46 controlling the unlocking of the selected portable computing device 14. The authorization response 150 may, if sent to the locking control module 46a within a multi-bay charging station 20, comprise the authorization signal and may further include: i) identification of the selected portable computing device 14 to unlock; and ii) identification of the location (e.g., locking compartment 60a-f or charging cradle 57a-c) in which the selected portable computing device 14 is positioned
The authorization response 150 may, if sent to the locking control module 46b within the selected portable computing device 14, comprise an electronic key (e.g., an encrypted electronic key value) that the locking control module 46b utilizes as a trusted authorization signal to enable use of the portable computing device 14.
The authorization response 150 may be sent to the applicable locking control module 46 via one of, or a combination of, the network 12, the point-to-point communication link 45 and/or the data link 48 supporting data communication with the portable computing device 14 through its power/data connector 37.
Step 160 represents identifying the portable computing device 14 being checked-in. In an embodiment where the portable computing device 14 is being returned to a multi-bay charging station 20 for locking within a locking compartment 60a-f or a charging cradle 57a-c, step 160 may comprise reading the device identification of the portable computing device 14 being returned, for example, through its power/data connector 37.
In an embodiment where the portable computing device 14 being checked in is electronically locked by the locking control module 46b within the portable computing device 14, step 160 may comprise reading the device identification from a register within the portable computing device 14.
In embodiments where the authorization control module 42 is separate from the locking control module 46a or 46b which locks the portable computing device 14, step 160 may include receiving, by the authorization control module 42 from the locking control module 46a or 46b, a return message. The return message 164 may include an identification of the device being returned and an indication of the date and time the device is being returned.
The return message 164 may be sent to the authorization control module 42 via one of, or a combination of, the network 12, the point-to-point communication link 45, and/or the data link 48 supporting data communication with the portable computing device 14 through its power/data connector 37.
Step 162 represents the authorization control module 42 recording the return of the portable computing device 14 in the database 44 which, referring briefly to
Step 166 represents locking the portable computing device: i) by the locking control module 46a mechanically locking the portable computing device 14 within a locking compartment 60a-f or a charging cradle 57a-c; or ii) by the locking control module 46b electronically locking the portable computing device 14.
Step 168 represents activating charging of the checked in portable computing device and may include measuring at least one charge parameter that may be used for subsequently determining whether the portable computing device is sufficiently charged to be considered an available portable computing device (e.g., step 144 of
Step 170 represents activating the sterilization system 68 for the locking compartment 60a-f in which the checked-in portable computing device is returned for sterilization of the device and may include measuring at least one sterilization parameter (such as the time required for sterilization) that may be used for subsequently determining whether the portable computing device is sufficiently disinfected to be considered an available portable computing device (e.g., step 144 of
The flow chart depicted in
Step 172 represents determining that an unauthorized location event has occurred. The systems of the portable computing device 14 may continually, on a trigger basis or on a periodic basis, monitor for the occurrence of an unauthorized location event. Examples of determining that an unauthorized location event has occurred include: i) losing communication contact with a local area network (e.g., the communication range of the local area network defines the authorized locations); ii) determining that a self-determined location (e.g., determined by Global Positioning System (GPS), network positioning, or the like) is outside of defined authorized locations; and iii) determining that a periodic authorization signal (e.g., a heartbeat signal) sent by a remote source when the portable computing device is within the authorized location has not been timely received.
Step 174 represents electronically locking or otherwise disabling use of the portable computing device 14 in response to determining that an unauthorized location event has occurred.
One or more of the features, functions, procedures, operations, components, elements, structures, etc. described in connection with any one of the configurations described herein may be combined with one or more of the functions, procedures, operations, components, elements, structures, etc. described in connection with any of the other configurations described herein, where compatible.
The steps and/or actions of the methods described herein may be interchanged with one another without departing from the scope of the claims. In other words, unless a specific order of steps or actions is required for proper operation of the method that is being described, the order and/or use of specific steps and/or actions may be modified without departing from the scope of the claims.
The claims are not limited to the specific implementations described above. Various modifications, changes and variations may be made in the arrangement, operation and details of the implementations described herein without departing from the scope of the claims