SYSTEM AND METHOD TO CONTROL ACCESS TO HAZARDOUS MACHINES
A system and method for controlling usage of a machine by an operator includes a card containing identity information related to the operator selectively in communication with an access device and a first server is in communication with the access device. The identity information is communicated to the access device. The first server includes training information for at least one operator and at least one training certificate. Identity information is communicated to the first server from the access device and the first server compares the identity information to the training information to identify whether the operator has a training certificate for the selected machine. The first server communicates to the access device that the operator does or does not have a training certificate for the selected machine. The access device permits instruction from the operator to the machine when the operator does have a training certificate for the selected machine.
This application claims priority as a continuation application of U.S. patent Ser. No. 10/410,443 with the same title and a filing date of Mar. 30, 2018 which claims priority to PCT Patent Application Number PCT/US2016/054612 with the same title and a filing date of Sep. 30, 2016 which claims priority to Russian Federation Patent Application Number 2015141877 filed on Oct. 1, 2015. All three applications in their entirety are incorporated by reference herein.
BACKGROUNDThe present disclosure relates to safety devices for controlling access to and use of hazardous machinery and equipment. More specifically, the disclosure relates to hazardous machinery access controls activated by access control cards issued to users of such machinery and equipment.
Equipment and machinery located, e.g., in a manufacturing facility, can be hazardous to personnel in the area proximate the equipment and machinery. Using machinery or equipment with inadequate training or with inadequate control over access to the equipment can result in injury to the user or other personnel, damage to the equipment, harm to business reputation of the equipment's owner or controlling entity, non-productive time due to incident investigation or equipment damage, and, in extreme cases, loss of life.
It would be helpful to have a system for controlling access to and use of hazardous equipment and machinery so that only suitably trained individuals are able to use the equipment and machinery.
SUMMARYIn one aspect, the disclosure is generally related to a system for controlling usage of a machine by a human operator. The system includes an access control card containing identity information related to the operator, an access control device in signal communication with an operating control of a selected machine and selectively in communication with the access control card and an access control computer in communication with the access control device. The identity information is communicated from the access control card to the access control device. The access control computer include identity information for at least one human operator. Identity information from the access control card is communicated to the access control card from the access control device and then to the access control computer. The access control computer compares the identity information from the access control card to stored identity information to identify whether the human operator identity information is consistent with the required qualifications to operate the selected machine. The access control computer communicates to the access control device that the human operator is or is not authorized to operate the selected machine. The access control device permits control instruction from the human operator to the machine when the operator is determined to be qualified to operate the selected machine.
In another aspect, the present disclosure is related to a method for restricting usage of a machine to authorized human operator(s). The method includes entering into or placing proximate an access control device associated with a selected machine an access control card including identity information for a human operator. The method further includes communicating the identity information from the access control card to the access control device and from the access control device to an access control computer. Identity information for the operator stored on the server is compared to the identity information communicated from the access control card. The result of the comparison is communicated to the access control device. The access control device permits the operator to operate the selected machine when the comparison communicated indicates the operator is currently authorized to operate the selected machine or restricts the operator from operating the selected machine when the comparison indicates the operator is not currently authorized to operate the machine.
Other aspects and advantages will be apparent from the following description and the appended claims.
Referring to
Example devices for reading the identity information from the access control card (102A in
A human operator attempting to gain access to a particular machine 120 for use in the operator's job duties will cause the access control card (102A in
In an example embodiment, the access control device 102B may comprise a card reader 103C which is configured to interrogate information stored on the access control card (102A in
Referring to
Referring once again to
Referring once again to
In some embodiments, enabling control of the specific machine 120 may comprise the specific machine 120 being connected to an electric power supply by the access control device 102B or by the access control computer (first server) 104. In some embodiments, the particular access control device 102B associated with the corresponding operator control device 102 may be activated to enable control of the particular machine 120 by the particular human operator or any other human operator having valid stored identity information by causing the access control device 102B to enable or activate the machine operator control device 102. If the identity information is not valid with respect to the particular machine 120, the access control computer (first server) 104 may not send any approval signal or message and the machine 120 and/or the associated operator control device 102 will not be activated Thus, if the human operator's access control card 102A has valid identity information to authorize use of the particular machine 120, then the access control device 102B will be activated by the access control computer (first server) 104 to permit the human operator to use the particular machine 120. If, on the other hand, the human operator's access control card 102A does not have valid identity information to enable the human operator to use the particular machine 120, then the access control device 102B prevents operation of the particular machine 120, e.g., by not enabling the machine operator control 102 or the access control computer 104 may not send a power-up command to the machine or an activation signal to the machine operator control. Such denial of operation may also be effected by having the access control computer (first server) 104 not send an actuation signal or message to the relevant access control device 102B or machine operator control 102.
The processor 104B associated with the access control computer (first server) 104 may monitor at least one parameter of the selected machine 120. Examples of machine parameters to be monitored include operating hours, the identity of the human operator who operated the particular machine, machine loads, machine temperatures, etc. Such parameters may be measured by one or more sensors 121 associated with each machine 120. The sensors 121 may be in signal communication with the processor 104B either by a wired signal channel (e.g., Ethernet, RS-232 serial connection, USB connection) or by a wireless channel, e.g., IEEE 802.11n or 802.11ac standard wireless channel.
A computer display or monitor 106B may also be in signal communication with a monitoring computer 106. The monitoring computer 106 may be in signal communication with the access control computer, for example, by serial connection such as RS-232 or USB. The monitor 106B may display some or all of the identity information, such as an operator name, and the particular machine when that operator is permitted to operate the particular machine 120. The display 106B may also display the one or more measured parameters for one or more specific machines 120.
The machine(s) 120 may be, for example, any machine used in manufacturing. Examples of such machines include, without limiting the scope of the present disclosure, a heating oven, a forklift, an overhead crane, a break out machine, grinding machine, shock machine, and/or a key box. Other examples of machines may include presses, lathes, injection molding machines, fastening equipment, etc.
The monitoring computer 106 may be in signal communication with a remote data storage computer or server 105. Machine parameters and identity information may be communicated to the remote data storage server 105 from the monitoring computer 106, e.g., using wireless communication devices 105A, 106A, respectively. The wireless communication devices may be radio communication devices using, for example, IEEE standard 802.11n or 802.11ac communication protocol. The remote server 105 may include a processor (not shown separately) that can perform analysis, e.g., statistical analysis, on the measured machine parameters and communicate the analysis results to a computer in or associated with the monitoring computer 106. Communication may also be performed using Ethernet cable, RS-232 serial cable, USB connection wired channel or otherwise communicated using any form of wired or wireless signal communication channel.
Signal output from the various sensors 121 associated with each machine 120 may be input to the access control computer 104 for local processing therein or for communication to the monitoring computer 106 and/or remote server 105.
A method for restricting usage of a machine by a human operator includes initiating signal communication between an access control device 102B on a selected machine 120 and an access control card 102A in the possession of any human operator intending to use the selected machine 120. The access control card 102A includes identity information related to the human operator, such as a name and/or employee number. The human operator selectively presents the access control card 102A to the access device 102B on the selected machine 120 when the human operator is ready to use the machine 120. The human operator will place the access control card 102A on or near the access control device 102B such that the access control card 102A may be interrogated by the access control device 102B.
Identity information stored on the access control card 102A presented by the human operator is communicated to the access control device 102B. The identity information is then communicated from the access control device 102B to an access control computer (first server) 106. The identity information may be communicated using any suitable wired or wireless communication technique, including, without limitation, radio frequency such as multichannel 433 MHz radio.
Identity information related to the training status of each operator for each machine in a particular location may be provided to the access control computer (first server) 104. The first server 104 may include a processor 104B capable of interrogating identity information and determining whether the identity information is valid for the selected machine 120 and the particular human operator. While the above described embodiment has identity information stored on a local data storage device 104D, some or all of the same identity information may be stored on the access control card 102A.
If the operator has identity information that is valid, then the access control computer (first server) 104 communicates via wired or wireless connection to the access control device 102B that the operator may use the selected machine or equipment. If the operator's identity information is invalid, e.g., the human operator has not successfully completed training for the specific machine 120 or the training is out-of-date, then the access control computer (first server) 104 may communicate an access authorization signal using wired or wireless communication to the access control device 102B that the human operator is not authorized to operate the selected machine 120 and access to such machine 120 is not enabled by the access control device 102B. In other embodiments, an access approval signal may simply not be communicated to the access control device 102B by the first server 106 when the identity information on the access control card 102A is not valid to enable operation of the specific machine.
Information including certain identity information of the operator, such as an operator name, and the selected machine may be displayed by a monitor 106B in signal communication with the monitoring computer 106.
Selected equipment may include a control device 102 configured to operate an associated machine 120. When a human operator activates the control device 102 of the selected machine by using the access control card 102A, the identity information stored on the access control card 102A may be sent to the access control computer (first server) 104 e.g., by radio communication or wired communication. The access control computer (first server) 104 validates the identity information by interrogating the data storage and retrieval device 104D to enable activating the machine or equipment by the specific human operator. If the identity information is valid, the access control computer (first server) 104 may send an activation signal or message e.g., through the radio or wired signal communication channel to enable the human operator to activate the specific machine or equipment. Some of the identity information and machine operating parameters may be displayed on the monitor 106B and sent to the remote server 105 for analysis, e.g., times of use of each machine 120, name of operator of each machine 120, and any of a number of sensor-derived machine operating parameters. In some embodiments, the functions of the access control computer 104 and the monitoring computer 106 may be performed by the same computer and/or processor.
The described system 100 may facilitate confirming training statuses of individual human operators on all machines or equipment through the identity information associated with each access control card 102A, making it unnecessary for the human operator to surrender the access control card 102A when, for example, training has expired or the human operator is no longer provided access to the physical location of the machine(s) such as on termination of employment or transfer of the human operator to a different facility. Parameters that may be monitored for the machine(s) or equipment may include the equipment name or identification number, location, time in use, human operators using such equipment, as well as operational data. Such data may be communicated to the remote server 105 and real time analysis may be performed. Such analysis may include how efficiently each human operator operates each respective machine 120, and the amount of time each operator uses each machine 120. Attempts to gain access to a specific machine 120 by an operator not having correct identifying information may be recorded and communicated (e.g., wirelessly) to a remote system operator to identify inappropriate human operator behavior, or the presence of an unauthorized person attempting to gain access to operation of a specific machine 120.
The system 100 may be programmed (e.g., in access control computer 106) such that any initial safety controls are satisfied prior to permitting a human operator to operate a selected machine. 120 One such example of this type of restricted access is that the system 100 would confirm that a daily crane check operation was performed prior to permitting any operator to use a crane. A priori safety or pre-use inspection records may be associated with enabling operation of any other machine 120 in a similar manner.
The system 100 may display the selected machine 120 and the operator's name using such selected machine on the monitor 106B. Such operation can prevent attempts by another operator to activate a selected machine 120 without an access control card 102A.
While the claimed subject matter has been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this disclosure, will appreciate that other embodiments can be devised which do not depart from the scope of the claimed subject matter as disclosed herein. Accordingly, the scope of the claimed subject matter should be limited only by the attached claims.
Claims
1. A system for controlling usage of a machine by a human operator comprising:
- a card containing identity information related to the human operator;
- an access control device in communication with the card, wherein the access control device communicates with the identity information and is in signal communication with a machine comprising operator control;
- an access control computer in communication with the access control device, wherein the access control computer is in signal communication with a data storage device having human operator machine operation control information;
- wherein identity information is communicated to the access control computer from the access control device and the access control computer compares the identity information to the machine operation control information;
- wherein the access control computer performs at least one of (i) communicates to the access control device that the human operator is enabled to operate the machine, (ii) communicates to the access control device that the human operator is denied access to operate the machine and (iii) does not communicate to the access control device wherein the human operator is denied access to operate the machine.
2. The system of claim 1, further comprising a computer display to display the identity information and a machine identifier when the human operator is enabled to operate the machine.
3. The system of claim 1, wherein the access control device comprises a battery, wherein the battery is used to power the access control device.
4. The system of claim 1, wherein the card comprises at least one of a smart card having at least one of an embedded electrically erasable programmable read-only memory chip, a magnetic data recording strip, a bar code, and a radio frequency identification (RFID) element and wherein the access control device comprises a data reader corresponding to and configured to extract identity information from the at least one of an embedded electrically erasable programmable read-only memory chip, a magnetic data recording strip, a bar code, and a radio frequency identification (RFID) element.
5. The system of claim 1, wherein the access control computer monitors at least one machine operating parameter during operation of the machine.
6. The system of claim 5, further comprising a data analysis computer in signal communication with the access control computer, wherein the access control computer communicates identity information and the monitored machine operating parameter to the data analysis computer.
7. The system of claim 6, wherein the data analysis computer calculates an analysis based on the at least one monitored parameter.
8. The system of claim 7, wherein the calculated analysis is correlated with the identity information.
9. The system of claim 8, wherein the access control computer is in signal communication with a plurality of access control devices, each access control device in signal communication with a respective machine operating control.
10. The system of claim 1, wherein the machine comprises at least one of a heating oven, a forklift, an overhead crane, a break out machine, and a key box.
11. A method for controlling use of a machine by a human operator comprising:
- the human operator presenting a card to an access control device associated with a machine operator control configured to operate a respective machine, the card comprising identity information thereon corresponding to the human operator;
- communicating the identity information from the card to the access control device;
- communicating the identity information from the access control device to an access control computer;
- comparing the identity information to qualification criteria accessible by the access control computer, the qualification criteria related to operating the machine; and
- at least one of (i) communicating from the access control computer to the machine that the human operator is enabled to operate the machine, (ii) communicating from the access control computer to the machine that the human operator is denied access to operate the machine and (iii) not communicating to the machine wherein the human operator is denied access to operate the machine.
12. The method of claim 11, wherein the card comprises at least one of a smart card having at least one of an embedded electrically erasable programmable read-only memory chip, a magnetic data recording strip, a bar code, and a radio frequency identification (RFID) element and wherein the access control device comprises a data reader corresponding to and configured to extract identity information from the at least one of an embedded electrically erasable programmable read-only memory chip, a magnetic data recording strip, a bar code, and a radio frequency identification (RFID) element.
13. The method of claim 11, further comprising monitoring at least one machine operating parameter during operation of the machine.
14. The method of claim 13, further comprising causing the monitored machine operating parameter to be correlated to the human operator.
15. The method of claim 13, further comprising analyzing the at least one machine operating parameter.
16. The method of claim 15, wherein the calculated analysis is correlated with the identity information.
17. The system of claim 11, wherein the respective machine comprises at least one of a heating oven, a forklift, an overhead crane, a break out machine, and a key box.
18. The method of claim 11, further comprising:
- each of a plurality of human operators presenting a respective card to one of a plurality of access control devices each associated with a respective machine operator control configured to operate a respective machine, each card comprising identity information thereon corresponding to one of the plurality of human operators;
- communicating the identity information from each card to the respective access control device;
- communicating the identity information from the respective access control device to an access control computer;
- comparing the identity information from each card to qualification criteria accessible by the access control computer, the qualification criteria related to required qualifications to operate each machine; and
- at least one of (i) communicating from the access control computer to the respective access control device that the respective human operator is enabled to operate the respective machine, (ii) communicating from the access control computer to the respective machine that the respective human operator is denied access to operate the respective machine and (iii) not communicating to the access control device wherein the respective human operator is denied access to operate the respective machine.
19. The method of claim 11, further comprising analyzing at least one machine operating parameter.
20. The method of claim 19, wherein the analysis is correlated with the identity information.
Type: Application
Filed: Sep 9, 2019
Publication Date: Jan 2, 2020
Inventors: James Peach (Asker), Pavel Mikhailovich Podgurskiy (Yuzhno-Sakhalinsk)
Application Number: 16/564,323