Card operated power plug interrupter/monitor and method of use
10079126 ยท 2018-09-18
Inventors
Cpc classification
Y04S20/14
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
H01H2300/03
ELECTRICITY
Y02B90/20
GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
International classification
H01H27/06
ELECTRICITY
H01R13/639
ELECTRICITY
Abstract
A device that is placed between the electrical power source and electrical equipment such that power going to the equipment can be controlled, regulated, and monitored. An individual may request access to use the electrical equipment by means of unique identification. The device is able to compare the user's request for authentication via a locally stored list (database) or remotely situated list. The device contains audio and visual indications of the current status of power going to the electrical device. An apparatus is used to prevent a user from disconnecting electrical equipment from the device and reconnecting it directly to the power source. A related method of use is also claimed.
Claims
1. A method for controlling power flow to an electrical device comprising: (i) providing a power control system that includes: a first contact for electrical communication with a first plug to a current source; a second contact for electrical communication with a second plug to the electrical device; a switch in communication with the first contact and the second contact, the switch movable between an on-condition, where electric current flows through the switch, and an off-condition, where electrical current does not flow through the switch; a moveable member, moveable between a first position and a second position, said movable member including: (a) a first portion for causing the switch to move between the on-condition, when the movable member is in the first position, and the off-condition, when the moveable member is in the second position; and (b) an electronic card reader which takes an individual operator card when properly positioned on said reader to open the switch for a preset amount of time from the off-condition to the on-condition, said reader being in contact with a database for determining whether a holder of that operator card is authorized to have the switch opened from the off-condition to the on-condition; and a lockable housing for encasing the first plug and the second plug; (ii) inserting the power control system between the first plug to the current source and the second plug to the electrical device; (iii) locking an enclosure about the first plug and the second plug; and (iv) activating the reader to receive individual operator cards and verifying a numerical or biometric identifier from each card before determining whether the switch can be moved from the off-condition to the on-condition.
2. The method of claim 1 wherein the reader further records and keeps track of every operator card that has attempted to access and run the electrical device.
3. The method of claim 1 wherein the reader keeps track of when and for how long every operator card has run the electrical device.
4. The method of claim 1 wherein the reader includes a visual indicator that the operator card is authorized to run the electrically powered device to which it is connected.
5. The method of claim 1 wherein the reader includes an audio indicator that the operator card is authorized to run the electrically powered device to which it is connected.
6. The method of claim 1 wherein the numerical or biometric identifier is selected from the group consisting of: an RFID signal, a phone (NFC) signal, a PIN identifier, a magnetic strip and a bar code.
7. The method of claim 1 wherein the numerical or biometric identifier is selected from the group consisting of: a fingerprint, a heart rate, an eye pattern, a vein pattern in an operator's hand and facial imaging.
8. The method of claim 1, which further includes an interrupter for moving the switch from the on-condition to the off-condition before an amount of authorized use is about to be exceeded.
9. The method of claim 1 wherein the database is external of the reader.
10. The method of claim 1 wherein the switch is electronic.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) Attention is now directed to the accompanying drawings and diagrams in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
(9) As used herein, the following terms are meant to expressly include: Requester is also a user, member, individual and/or cardholder. Device further includes tools, equipment and/or resources.
(10) This invention uniquely identifies an individual (authorized operator) through one or more of the following methods: RFID (Radio Frequency Identification) NFC (Near Field Communication) Biometrics: Fingerprint Ear Heart Rate Naturally Eliminated Electromagnetic Field Sitting Position The eye Veins in hand Facial Imaging Pin Number Magnetic Strip Barcode
(11) Internal to each interrupter, this invention can quickly check a database for a list of authorized access users with equipment access being dynamically adjusted for an interface with full/limited access for a limited preset time or for as long as the user's reader card remains lawfully connected thereto. Alternately, the database can be searched (and maintained) external to the system of this invention.
(12) The system (and related method) of this invention can also be used as a lockout that will PRECLUDE any unsanctioned use of a given piece of equipment to which it is connected. Access cards for this system/method will be able to more fully track when a system was accessed, by whom, and for how long.
(13) Furthermore, the overall system construct will enable management to accurately track the amount of power consumed by a given piece of equipment. Data can be stored locally, or remotely through a wireless or wired connection.
(14) The system is placed in line with the power cord for any such device and, as such, should be able to serve as a power interrupter for most plug or voltage level. When used with a locking plug wrap/box (external or integral to the unit itself), this plug will remain secured so as to preclude any one individual from manually overriding it.
(15) One particular model, developed for a medical device operator, led to the inclusion of certain optional features including a calendar style user control that accommodates settings for varying medical patients. Another component/advantage of this system is its use of fairly inexpensive RFID cards that allow a given doctor's office the option of providing limited distribution of personalized reader cards to its patients.
(16) Yet another anticipated end user of this device would be the shop teachers at a given trade, elementary or high school that routinely employs dangerous wood and/or machine shop equipment. This invention would more severely restrict who MAY run a particular saw and for how long, for instance.
(17) This invention offers a low cost, easy to use, powerful access control and equipment management system. The system (and its related method of use) seamlessly combines the following three essential components to a space management system: Payment acceptance for membership and users Space access and control with RFID; and Equipment management with RFID.
(18) This system provides the equivalent features of existing space access systems at a fraction of the cost; then offers a range of powerful benefits that current systems do not provide:
(19) Value proposition and easy use.
(20) Yet another component of this system/method is providing LIVE, real time equipment access/use to those who are fully paid up members to a makerspace and/or shared equipment and resource center. Conversely, those not having up-to-date, fully paid memberships can be near instantaneously denied access integration or have the power to their apparatus rapidly shut off.
(21) Locations that currently employ a membership-based model (e.g. makerspaces) have two separate systems for accepting payment before providing access to the space. Their method requires an individual to update the list of individuals to be given access based on their ability to pay. The system of this invention, by contrast, is completely integrated. Hence, it reduces employee time and the possibility of unauthorized access through human error.
(22) Business can be proactive in their security and safety by utilizing the preferred system of this invention. It will restrict unauthorized access while further logging all transactions for later review. This is ideal for a business that uses high-risk equipment and would like to do everything it can to reduce the likelihood of an insurance claim.
(23) While the system is built on a foundation of open source components, the main controller board that it employs combines a number of different components in a customer configuration for manufacturing and installation benefits. This invention should be the first to market offering a system designed especially for co-working and makerspace environments.
(24) The use of RFID's for resource management is a unique concept. With the Plug and Play modular components of this invention, operators will be able to grow their systems with less concern about lost space for safety/security control concerns. The system/method herein can be added to, or integrated with, existing devices/equipment. This will allow customers to begin using THE system without changing their infrastructure.
(25) The accompanying drawings are for purposes of illustrating various aspects of the present invention and are not meant to limit the scope of the present invention. Referring now to
(26) Attached to node 101 with a cable is a female electrical connector 106 that connects with the equipment's male connector 105. From the power junction 102 between node 101 and the equipment, there is a connector enclosure cover or apparatus 104 that holds both connectors for ensuring that the power controller cannot be circumvented without physically damaging either the system or equipment.
(27) In
(28) An overview of the entire system can be seen in
(29) To achieve the operation described above the node must contain at least all elements shown within
(30)
(31) While current is allowed to flow to the equipment, the node continuously monitors current flow until the operation session 608 has concluded. While the equipment is being operated, current draw data is being collected to either report 612 at the conclusion of a session or determine if equipment misuse 609 is occurring by means of excessive current draw resulting in a notification 610 sent to an administrator. The current will continue to flow as long as both those conditions remain false, unless the device is remotely disabled 611 by a system administrator.
(32) The final drawing,
(33) The apparatus, from here on referred to as the node, being protected is a device that contains a method of limiting the access of powered equipment only to authorized individuals. The node is able to be placed inline with any device that has a power cord and does not require the device of which it is connected to, to be modified. The node contains: (i) an input whereby a user can identify him or herself using a variety of methods, (ii) a way to notify the requester of the nodes status, and (iii) a computer that can relay the requestor's identification to a central database for determining whether the requestor has permission to be using the device.
(34) The node uses a method of power interruption to best restrict a user's utilization of a particular piece of equipment. As an additional benefit of using the node, there is an ability to monitor the power consumption of the device it is connected to. That collected information can then be used for both tracking how much power is being used by an individual or device, as well as an alert to an administrator that the device may be being misused.
(35) As part of the node, it is critical to have a method of control that prevents a requestor from overriding the node by simply unplugging the device from the node and into an outlet. This level of control is obtained by having an apparatus that securely locks together the device's male power plug to the nods female power connector. The apparatus that maintains the two power connectors connected would require physical tampering to over ride, making it evident to the owner of the system that a requestor has attempted to bypass the system.
(36) Among the items deemed novel and non-obvious herein are: 1. A device connected with a piece of electronic equipment for purposes of controlling access to, and/or monitoring the use of, a piece of electronic equipment. The device uses one of the following means: (a) an access controller for powered equipment; (b) a non-invasive or having the need to alternator/modify the equipment that it is being connected to; (c) user specific limitations so that access can be controlled from anywhere. For this device, use is not just for restricting access. It can also be used to monitor log in usage for either safety or production purposes. 2. A non-destructive method of attaching such a device wherein the node connects inline with a piece of equipment. The controller has the receiving end of a power connector that allows equipment to plug into it and the plugs are held together with an apparatus that securely encases and affixes both cord ends together. That apparatus is kept in place via a lock that gets installed by a system administrator. 3. The node for this device uses a method of input for uniquely identifying the individual who has requested access to a particular piece of equipment. Such identification may not be limited to identifying just one individual; it could be used to identify a given product through its production. The node could use a method of uniquely identifying an individual and/or production. That method may include, but not be limited to, one or more of the following options: RFID, PIN, biometrics, phone (NFC), magnetic, heart rate, facial imaging, bar code. 4. A controller for this invention may work by interrupting the power being sent to the equipment. One method of interruption occurs by ways of an electronic switch that can be in the form of a relay, transistor or other similarly functioning switch. Additional power controls can be added for allowing multiple devices to be initiated or engaged at the same time. 5. As part of the power control concept, the node of this invention will have a method of collecting and monitoring power consumption at any given time. 6. Communication with the hub for data should be included. Once data is read by this device, it may be transmitted via a wireless or wired connection to a central location where the data is stored and compared for access.
(37) There have been shown and described preferred embodiments of power control devices and methods for their use. It is apparent to those skilled in the art, however, that many changes, variations, modifications, and other uses and applications for the apparatus, its components, and methods for its use are possible, and also such changes, variations, modifications, and other uses and applications which do not depart from the spirit and scope of the invention are deemed to be covered by the invention, which is limited only by the claims which follow.