Techniques to implement beacon-based access authorization to industrial assets in an industrial automation environment are disclosed herein. In at least one implementation, each industrial asset has one or more beacons that broadcast signals enabling a mobile device to measure its distance from the
Techniques to implement beacon-based access authorization to industrial assets in an industrial automation environment are disclosed herein. In at least one implementation, each industrial asset has one or more beacons that broadcast signals enabling a mobile device to measure its distance from the broadcasting beacon. Each signal also can include access level data defining access permitted for various users, depending on the user's authorization level and the calculated distance between the mobile device and the broadcasting beacon. In some implementations the mobile device can provide directions to the user to enable an otherwise disallowed operation. Access to industrial assets is thus limited by the calculated mobile device distance from the industrial asset and the user's authorization level.
대표청구항▼
1. One or more computer-readable storage media having program instructions stored thereon to control beacon-based access authorization in an industrial automation environment, wherein the program instructions, when executed by a computing system implemented at least in part on a mobile device, direc
1. One or more computer-readable storage media having program instructions stored thereon to control beacon-based access authorization in an industrial automation environment, wherein the program instructions, when executed by a computing system implemented at least in part on a mobile device, direct the computing system to at least: receive user identity data;receive a beacon signal via the mobile device from a beacon system, wherein the beacon system comprises one or more beacons associated with an industrial asset in the industrial automation environment, wherein the beacon signal comprises beacon signal data and further wherein beacon signal data comprises: beacon identity data, distance calculation data, and access level data;process received distance calculation data within the mobile device to calculate a distance between the mobile device and the industrial asset;receive via the mobile device a user command invoking an industrial automation operation; andauthorize or prohibit the invoked operation based on the user identity data, the calculated distance, received access level data, and the received user command. 2. The one or more computer-readable storage media of claim 1 wherein the user identity data comprises one of the following: a user type, a user name, a user class, or a user group. 3. The one or more computer-readable storage media of claim 2 wherein the mobile device comprises one of the following: a cell phone, a smartphone, a smart watch, a tablet computer, a laptop computer, a notebook computer, a handheld computer, a wearable computer device, or a gaming device. 4. The one or more computer-readable storage media of claim 1 wherein the distance calculation data comprises beacon transmit power data. 5. The one or more computer-readable storage media of claim 1 wherein each beacon comprises a Bluetooth lower energy (BLE) beacon. 6. The one or more computer-readable storage media of claim 1 wherein the access level data comprises access level authorization based on one of the following: a user type, a user name, a user class, or a user group. 7. The one or more computer-readable storage media of claim 1 further wherein, when the invoked operation is prohibited due to the calculated distance exceeds a threshold distance, the program instructions, when executed by the computing system, direct the computing system to provide distance-related directions on a display system on the mobile device. 8. The one or more computer-readable storage media of claim 1 further wherein the mobile device transmits user activity data pertaining to invoked operations to an industrial automation environment auditing system. 9. The one or more computer-readable storage media of claim 1 wherein at least a portion of the beacon signal data is encrypted when received by the mobile device; and further wherein the mobile device is configured to decrypt encrypted beacon signal data. 10. An apparatus to facilitate authorizing access by a mobile device to an industrial asset via wireless communication in an industrial automation environment, the mobile device comprising: one or more computer-readable storage media; andprogram instructions stored on the one or more computer-readable storage media that, when executed by a mobile device processing system, direct the mobile device processing system to at least: receive user identity data;receive beacon signal data from a beacon associated with an industrial asset in the industrial automation environment, wherein beacon signal data comprises: distance calculation data, and access level data;process received distance calculation data to calculate a distance between the mobile device and the industrial asset;receive a user command invoking an industrial automation operation with regard to the industrial asset; andauthorize or prohibit the invoked operation based on the user identity data, the calculated distance, received access level data, and the received user command. 11. The apparatus of claim 10 wherein at least a portion of the received beacon signal data is encrypted. 12. The apparatus of claim 10 wherein the user identity data comprises one of the following: a user type, a user name, a user class, or a user group; and further wherein the access level data comprises access level authorization based on one of the following: a user type, a user name, a user class, or a user group. 13. The apparatus of claim 10 wherein the beacon comprises a Bluetooth low energy beacon and further wherein the distance calculation data comprises beacon transmit power data. 14. The apparatus of claim 10 wherein the mobile device comprises one of the following: a cell phone, a smartphone, a smart watch, a tablet computer, a laptop computer, a notebook computer, a handheld computer, a wearable computer device, or a gaming device. 15. The apparatus of claim 10 wherein the program instructions, when executed by the mobile device processing system, direct the mobile device processing system to provide distance-related directions on a display system on the mobile device when an invoked operation is prohibited due to a distance threshold being exceeded. 16. A method of operating a computing system to facilitate authorizing access by a mobile device to an industrial asset via wireless communication in an industrial automation environment, the method comprising: receiving beacon signal data transmitted by a beacon associated with the industrial asset, wherein beacon signal data comprises: distance calculation data and access level data;processing received distance calculation data to calculate a distance between the mobile device and the industrial asset;receiving a user command invoking an industrial automation operation with regard to the industrial asset; andauthorizing or prohibiting the invoked operation based on the calculated distance, received access level data, and the received user command. 17. The method of claim 16 wherein at least a portion of the received beacon signal data is encrypted; and further wherein the beacon signal data is loaded into the beacon using one of the following: a computer directly connected to the beacon, an embedded user interface, Bluetooth communication, a central system connected to the beacon using a network. 18. The method of claim 16 wherein the beacon comprises a Bluetooth low energy beacon and further wherein the distance calculation data comprises beacon transmit power data. 19. The method of claim 16 wherein the mobile device comprises one of the following: a cell phone, a smartphone, a smart watch, a tablet computer, a laptop computer, a notebook computer, a handheld computer, a wearable computer device, or a gaming device. 20. The method of claim 16 further comprising providing distance-related directions on a display system on the mobile device when an invoked operation is prohibited due to a distance threshold being exceeded.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (3)
Hermann, Stefan, Method for controlling access to a vehicle.
Makel Darby B. (Sacramento CA) Jansa Earl D. (Shingle Springs CA) Cahill Daniel V. (Fair Oaks CA) Bickmore Timothy W. (Sacramento CA), Remotely controllable LNG field station management system and method.
Kostka, Lukasz; Krzych, Jakub, Methods for authenticating communication between a mobile device and wireless beacon at a remote domain name system, projecting a level of interest in a nearby product, and providing and ordering option or product data.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.