Electronic access control system and method for arc flash prevention

ABSTRACT

An integrated arc flash safety system and methods for remote access control and safety compliance. An electronic access control system may comprise an enclosure having a door, a door lock device, an electronic access control unit, and an arc sensor. The access controller comprises electronic hardware and software for sensor/detection operation, door lock device operation, door lock actuation, and wireless remote communication. The door lock device may be controlled by the access controller in combination with the arc sensor. The access controller may facilitate remote access control via a smart mobile computing device (e.g., mobile phone) and telecommunication with a remote cloud server via a communication network (e.g., Internet). Embodiments of the present disclosure enable rapid detection of an arc flash precondition or event within an enclosure and warning generation as well as protection and standard compliance measures to improve technician safety.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. Provisional Application Ser.No. 62/862,532, filed on Jun. 17, 2019 entitled “ARC FLASH ACCESSCONTROLLED SAFETY COMPLIANCE AND PROTECTION SYSTEM,” the disclosure ofwhich is hereby incorporated in its entirety at least by reference.

FIELD

The present disclosure relates to the field of electronic access controlsystems; in particular, an electronic access control system and methodfor mitigating an arc flash precondition within an access-controlledenclosure.

BACKGROUND

An arc flash is the light and heat produced from an electric arcsupplied with sufficient electrical energy to cause substantial damage,harm, fire, or injury. Electrical arcs experience negative incrementalresistance, which causes the electrical resistance to decrease as thearc temperature increases. Therefore, as the arc develops it gets hotteras the resistance drops, drawing more and more current (runaway) untilsome part of the system melts, trips, or evaporates, providing enoughdistance to break the circuit and extinguish the arc.

An arc flash occurs during a fault, or short circuit condition, whichpasses through an arc gap. The arc flash can be initiated throughaccidental contact, equipment that is underrated for the available shortcircuit current, contamination or tracking over insulated surfaces,deterioration or corrosion of equipment and/or parts, as well as othercauses. An arc flash event can expel large amounts of deadly energy. Thearc causes an ionization of the air, and arc flash temperatures canreach as high as 35,000 degrees Fahrenheit. This kind of temperature canset fire to clothing and severely burn human skin in fractions of asecond at a significant distance from the event. The heat can alsoresult in ignition of any nearby combustible materials.

Arc flashes have occurred in many industrial environments. Theseoccurrences can result in severe and even lethal impacts to a technicianthat happens to be exposed to an arc flash while servicing cabinets andother types of enclosures and apparatus. Arc flashes have occurredfrequently enough in various industries to require several safetystandards that require adherence from companies in order to improve thesafety environment of individuals.

There are many examples of industries that have arc flash safety issuessuch as in telecommunications, energy and rail. One scenario that occursis when an outdoor enclosure, such as a cabinet, experiences an arcflash precondition and a field technician unlocks and opens theenclosure, causing the arc flash to occur upon opening and resulting insevere injury or death. There are various standards in place to helpensure safety measures are taken to protect individuals. For example,NFPA 70E requirements for safe work practices to protect personnel byreducing exposure to major electrical hazards. Originally developed atOSHA's request, NFPA 70E helps companies and employees avoid workplaceinjuries and fatalities due to shock, electrocution, arc flash, and arcblast, and assists in complying with OSHA 1910 Subpart S and OSHA 1926Subpart.

Section 5(a)(1) of the Occupational Health and Safety Act states thatemployers “shall furnish to each of his employees' employment and aplace of employment which are free from recognized hazards that arecausing or are likely to cause death or serious physical harm to hisemployees.”

OSHA Standards 29 CFR, Parts 1910 and 1926. Occupational Safety andHealth Standards. Part 1910, subpart S (electrical) Sections 1910.332through 1910.335 contain generally applicable requirements forsafety-related work practices. On Apr. 11, 2014, OSHA adopted revisedstandards for electric power generation, transmission, and distributionwork at part 1910, Section 1910.269 and part 1926, subpart V, whichcontain requirements for arc flash protection and guidelines forassessing arc-flash hazards, making reasonable estimates of incidentheat energy from electric arcs, and selecting appropriate protectiveequipment (79 FR 20316 et seq., Apr. 11, 2014[18]). All of these OSHAstandards reference NFPA 70E.

The National Fire Protection Association (NFPA) Standard 70-2014 “TheNational Electrical Code” (NEC) contains requirements for warninglabels. See NEC Article 110.16 & NEC Article 240.87. NFPA 70E 2012provides guidance on implementing appropriate work practices that arerequired to safeguard workers from injury while working on or nearexposed electrical conductors or circuit parts that could becomeenergized. The Canadian Standards Association's CSA Z462 Arc FlashStandard is Canada's version of NFPA70E, released in 2008. Otherindustry standards include the Underwriters Laboratories of Canada'sStandard on Electric Utility Workplace Electrical Safety for Generation,Transmission, and Distribution CAN/ULC S801 and The Institute ofElectronics and Electrical Engineers IEEE 1584—2002 Guide to PerformingArc-Flash Hazard Calculations.

Through applied effort, ingenuity, and innovation, Applicant hasidentified the safety problems associated with access to enclosures thatexhibit an arc flash precondition state. Applicant has developed asolution that is embodied by the present disclosure, which is describedin detail below.

SUMMARY

In order to provide a basic understanding of the invention, thefollowing is a simplified summary of certain embodiments thereof. Thissummary is not an extensive and is not intended to identify key/criticalelements of the invention or to delineate the scope of the invention.Its sole purpose is to present embodiments of the invention in asimplified form as a prelude to the more detailed description that isfurther below.

An object of the present disclosure is an integrated system for anenclosure containing electrically powered equipment, remote accesscontrol and safety compliance. The integrated system comprises anenclosure having a door, a door lock device, an electronic accesscontrol unit, and an arc sensor. In various embodiments, the accesscontroller comprises electronic hardware for sensor operation, door lockdevice operation, door lock actuation, and wireless remotecommunication. In various embodiments, the door lock device iscontrolled by the access controller in combination with the arc sensor.In various embodiments, the access controller enables remote accesscontrol via a smart mobile computing device (e.g., mobile phone) andtelecommunication with a remote cloud server via a communication network(e.g., Internet). In various embodiments, the one or more enclosurecomprises cabinets, poles, enclosures containing electrically poweredequipment, electrical switchgear, motor control center, or the like. Invarious embodiments, the said enclosure may be an enclosure possessingan arc flash precondition state.

An object of the present disclosure is one or more methods forcontrolling access to an enclosure. In various embodiments, the methodscomprise one or more processes for controlling access to enforce safetycompliance. The one or more methods are executed using one morecomponent of said integrated system, including but not limited to a(n):enclosure, door, door lock device, door lock actuator, electronic accesscontrol unit, arc sensor. In various embodiments, the access controllercontains stored instructions for executing, including but not limitedto, arc sensor operation, door lock device operation, door lockactuation, and wireless remote communication. In various embodiments,the methods comprise at least one process for controlling the door lockdevice in combination with the arc sensor. In various embodiments, themethods comprise a process for detecting one or more means or sensors ofarc flash precondition detection, including but not limited to heat,smoke, ohm phase deviation, electromagnetic radiation/emission,electromagnetic spike, ultrasound, magnetic, fiber optic, point sensor,resistive, current, voltage, optical modulation, picture, video,combinations thereof, or the like. In various embodiments, the methodcomprises a process for detecting an arc flash event and communicatingsaid event to the access controller, the access controller subsequentlycommunicating said event to one or more users via one or more saidcommunication network.

An object of the present disclosure is one or more processes forcontrolling access to enforce safety compliance. In various embodiments,the one or more processes include, but are not limited to, arc flashdetection, access lock down, safety procedures, temporary safetycompliance access, arc flash resolution, standard access, safety auditreporting, and combinations thereof. In various embodiments, an arcflash sensor detects a precondition for an arc flash and communicates itto the access controller through alarm, switch and/or networkinterfaces. In various embodiments, access is denied from any standardcode that a technician uses to unlock the enclosure. In variousembodiments, safety procedures are followed such as managementnotification and engagement of a trained technician with appropriatesafety gear. In various embodiments, temporary access only is grantedfor a particular individual once safety compliance has been approved byan independent observer for the enclosure and skilled technician. Invarious embodiments, one or more arc flash root issue is resolved beforeenclosure access is allowed. In various embodiments, standard access isreengaged by compliance approved individuals or external observer byusing a code and/or application configuration change. In variousembodiments, reports and real-time notifications reflect all steps thatoccurred for the enclosure. In various embodiments, reports enableafter-action analyses and future prevention.

An object of the present disclosure is an Enclosure Safety ManagementSystem (herein after “ESMS”) for the management worker or techniciansafety comprising at least one non-limiting: enclosure and accesscontroller, firmware, middleware, gateway, router, API, communicationnetwork, cloud server, database, client device (e.g., mobile, desktop,etc.), client portal, and one or more applications residing on a cloudbackend server. In various embodiments, the application cloud servercomprises one or more software application operating to send, receive atleast one data, instructions, protocol, message, text message, SMS,event, or command for execution, email, processing, analysis,prediction, broadcast, or communication relating to technician safetymanagement. In various embodiments, the one or more remote server isaccessible through one or more client computing devices, including butnot limited to desktop, laptop, tablet, mobile phone, smart phone, orthe like. In various embodiments, the software environment enables, butis not limited to, device registration, worker authentication, support,monitoring, and safety awareness, or the like. In various embodiments,one or more application enables the configuration of processes foraccess lock down, safety procedures, temporary safety compliance access,arc flash resolution, standard access, safety audit reporting, andcombinations thereof. In various embodiments, the said middlewarefacilitates one or more said applications, application components,software to enable the processing of at least one sensor data from anelectronic access control unit, device message, instruction, protocol,resource request, get, put, event, or information. In variousembodiments, the said application, residing on an application cloudserver, is operably engaged with at least one application database, theapplication cloud server being communicably connected to the electronicaccess control unit via a wireless communication network, the saiddevices being operable to communicate to the application cloud server,optionally in real time, via an internetworking communication network,including but not limited to cellular network or the Internet. Invarious embodiments, at least one application processes one or moredata, message, protocol, instructions, or communication stored withinthe application database according to one or more application logicinstructions. In various embodiments, at least one application enablesthe analysis of one or more data, message, protocol, instructions, orcommunication received and stored within the application database forprediction and/or provides safety guidance to one or more users,including worker and technician. In various embodiments, a client device(e.g., mobile phone, mobile computing device, PC, etc.) is communicablyengaged with the application cloud server, the client device comprisingone or more graphical user interface (GUI) being operable to run one ormore current instance, historical instance, prediction, recommendation,or combinations thereof, of an ESMS application via a Web browser, anequivalent browser on a desktop, a mobile computing platform, a nativemobile application, or a mobile phone. In various embodiments, anapplication provides access for at least one external CRM system orenterprise or cloud system(s).

Aspects of the present disclosure provide for an arc flash safety systemcomprising an enclosure having a door, the enclosure having an arc flashprecondition state; a door lock device operably engaged with the door;an electronic access control unit operably engaged with the door lockdevice, the electronic access control unit comprising electronichardware configured for sensor operation, door lock device operation,door lock actuation, and wireless remote communication, the electronicaccess control unit being communicably engaged with a remote cloudserver via a communication network; and, an arc sensor operably engagedwith the door lock device and the electronic access control unit, thearc sensor being configured to detect a precondition for an arc flashand communicate the precondition to the electronic access control unit.

Aspects of the present disclosure provide for a method of preventing anarc flash in an enclosure, the method comprising detecting, with an arcflash sensor, a precondition for an arc flash in an enclosure;communicating, via a network interface, the precondition from the arcflash sensor to an access controller; denying, with the accesscontroller, access to the enclosure; verifying, with the accesscontroller, compliance with one or more safety protocols; granting, withthe access controller, temporary access to the enclosure to anauthorized user; verifying, via one or more user inputs, a resolution ofthe precondition for the arc flash in the enclosure; and, enabling, withthe access controller, standard access protocols for the enclosure.

Further aspects of the present disclosure provide for an electronicaccess control system comprising at least one sensor configured todetect at least one arc flash precondition or arc flash event for anenclosure; a controller communicably engaged with the at least onesensor to receive a sensor input, the controller comprising at least onewireless communications interface configured to wirelessly receive anaccess request from a mobile electronic device, the controller beingconfigured to actuate at least one locking mechanism to grant access tothe enclosure in response to authorizing the access request according toone or more access parameters; and a remote server communicably engagedwith the controller to receive sensor data associated with the sensorinput, the remote server comprising at least one processor operablyengaged with at least one non-transitory computer-readable medium havingone or more processor-executable instructions stored thereon that, whenexecuted, cause the at least one processor to perform one or moreoperations, the one or more operations comprising processing the sensordata to determine at least one arc flash precondition or arc flash eventfor the enclosure; configuring the one or more access parameters to denythe access request in response to the sensor data being indicative of atleast one arc flash precondition or arc flash event; and configuring atleast one arc flash safety protocol in response to the sensor data beingindicative of at least one arc flash precondition or arc flash event.

In accordance with certain embodiments of the present disclosure, themobile electronic device may be communicably engaged with the remoteserver via a wireless communication network. The mobile electronicdevice may comprise at least one electronic access control applicationcomprising a graphical user interface. The graphical user interface maybe configured to present one or more user prompts and receive one ormore user inputs according to the at least one arc flash safetyprotocol. In certain embodiments, the one or more operations of theprocessor may further comprise receiving the one or more user inputsfrom the mobile electronic device and processing the one or more userinputs to evaluate one or more safety and compliance parameters.

In accordance with certain aspects of the present disclosure, the one ormore operations of the processor may further comprise configuring theone or more access parameters to authorize an access request for anauthorized user, wherein the authorized user satisfies the one or moresafety and compliance parameters. The one or more operations of theprocessor may further comprise processing the one or more user inputsand/or the sensor data to determine a resolution state for at least onearc flash precondition or arc flash event. In some embodiments, the oneor more operations of the processor may further comprise restoring oneor more standard access parameters in response to resolving the at leastone arc flash precondition or arc flash event. In some embodiments, theone or more operations of the processor may further comprise assemblingsafety audit data for the enclosure. The one or more operations of theprocessor may further comprise communicating the safety audit data toone or more client devices.

Further aspects of the present disclosure provide for an electronicaccess control method comprising detecting, with at least one sensorcommunicably engaged with a controller comprising at least oneprocessor, an occurrence of a precondition for an arc flash in anenclosure; communicating, with the controller via a communicationsinterface, the precondition for the arc flash to at least one remoteserver or mobile electronic device; restricting, with the controller,access to the enclosure in response to the precondition for an arc flashin the enclosure; verifying, with the at least one remote server, usercompliance with one or more arc flash safety protocols; configuring,with the at least one remote server communicably engaged with thecontroller, temporary access to the enclosure to an authorized user;verifying, with the at least one remote server, a resolution of theprecondition for the arc flash in the enclosure; and, enabling, with theaccess controller, one or more standard access protocols for theenclosure in response to the resolution of the precondition for the arcflash.

In accordance with certain aspects of the present disclosure, theelectronic access control method may further comprise revoking, with theat least one remote server, one or more user access permissions inresponse to the precondition for an arc flash in the enclosure. Themethod may further comprise communicating, with the at least one remoteserver via the communications interface, the one or more arc flashsafety protocols to the mobile electronic device. In some embodiments,the method may further comprise receiving, with the mobile electronicdevice, one or more user inputs in response to the one or more arc flashsafety protocols. The method may further comprise communicating, withthe mobile electronic device via the communications interface, the oneor more user inputs to the at least one remote server.

In accordance with certain aspects of the present disclosure, theelectronic access control method may further comprise communicating,with the least one remote server via the communications interface, theprecondition for the arc flash to at least one client device. In someembodiments, the method may further comprise assembling, with the atleast one remote server, safety audit data for the enclosure. In someembodiments, the one or more user access permissions may comprise atleast one electronic access code. In some embodiments, the controllermay be operably engaged with at least one electronic locking deviceconfigured to selectively restrict access to the enclosure. Inaccordance with certain aspects of the present disclosure, theelectronic access control method may further comprise disabling, withthe at least one remote server, the at least one electronic access codein response to the precondition for an arc flash in the enclosure.

Still further aspects of the present disclosure provide for anon-transitory computer-readable medium encoded with instructions forcommanding one or more processors to execute operations for preventingan arc flash in an enclosure, the operations comprising receiving sensordata comprising one or more sensor inputs from an interior portion ofthe enclosure; processing the sensor data to determine at least one arcflash precondition or arc flash event for the enclosure; restricting oneor more electronic access permissions for the enclosure in response tothe sensor data being indicative of at least one arc flash preconditionor arc flash event; and configuring at least one arc flash safetyprotocol in response to the sensor data being indicative of at least onearc flash precondition or arc flash event.

The details of one or more implementations of the present disclosure areset forth in the accompanying drawings and description, below. Otherpotential features of the disclosure will be apparent from thedescription and drawings, and from the claims.

BRIEF DESCRIPTION OF DRAWINGS

The above and other embodiments, features and aspects of the presentdisclosure will be more apparent from the following detailed descriptiontaken in conjunction with the accompanying drawings, in which:

FIG. 1 is an architecture diagram of an electronic access controlsystem, in accordance with certain aspects of the present disclosure;

FIG. 2 is a schematic block diagram of an Electronic Access ControlUnit, in accordance with certain aspects of the present disclosure;

FIG. 3 is a functional block diagram of an electronic access controlsystem, in accordance with certain aspects of the present disclosure;

FIG. 4 is a functional block diagram of an electronic access controlsystem, in accordance with certain aspects of the present disclosure;

FIG. 5 is an architecture diagram of an electronic access control systemcomprising a private network (PN) architecture, in accordance withcertain aspects of the present disclosure;

FIG. 6 is a process flow diagram of an electronic access control method,in accordance with certain aspects of the present disclosure;

FIG. 7 is a process flow diagram of a routine of an electronic accesscontrol method and system, in accordance with certain aspects of thepresent disclosure;

FIG. 8 is a process flow diagram of a routine of an electronic accesscontrol method and system, in accordance with certain aspects of thepresent disclosure;

FIG. 9 is a process flow diagram of a routine of an electronic accesscontrol method and system, in accordance with certain aspects of thepresent disclosure;

FIG. 10 is a process flow diagram of a routine of an electronic accesscontrol method and system, in accordance with certain aspects of thepresent disclosure;

FIG. 11 is a process flow diagram of a routine of an electronic accesscontrol method and system, in accordance with certain aspects of thepresent disclosure;

FIG. 12 is a process flow diagram of a routine of an electronic accesscontrol method and system, in accordance with certain aspects of thepresent disclosure; and

FIG. 13 is an architecture diagram of an exemplary processor-implementedcomputing system in which one or more aspects of the present disclosuremay be implemented.

DETAILED DESCRIPTION

It should be appreciated that all combinations of the concepts discussedin greater detail below (provided such concepts are not mutuallyinconsistent) are contemplated as being part of the inventive subjectmatter disclosed herein. It also should be appreciated that terminologyexplicitly employed herein that also may appear in any disclosureincorporated by reference should be accorded a meaning most consistentwith the particular concepts disclosed herein.

Following below are more detailed descriptions of various conceptsrelated to, and embodiments of, inventive systems, devices, methods andnon-transitory computer-readable media having instructions storedthereon to enable one or more said systems, devices and methods for anelectronic access control system configured to detect a precondition ofan arc flash in an enclosure and restricting access to the enclosureuntil the precondition for the arc flash is mitigated and/or resolved.

It should be appreciated that various concepts introduced above anddiscussed in greater detail below may be implemented in any of numerousways, as the disclosed concepts are not limited to any particular mannerof implementation. Examples of specific implementations and applicationsare provided primarily for illustrative purposes. The present disclosureshould in no way be limited to the exemplary implementation andtechniques illustrated in the drawings and described below.

Where a range of values is provided, it is understood that eachintervening value, to the tenth of the unit of the lower limit unlessthe context clearly dictates otherwise, between the upper and lowerlimit of that range and any other stated or intervening value in thatstated range is encompassed by the invention. The upper and lower limitsof these smaller ranges may independently be included in the smallerranges, and are also encompassed by the invention, subject to anyspecifically excluded limit in a stated range. Where a stated rangeincludes one or both of the endpoint limits, ranges excluding either orboth of those included endpoints are also included in the scope of theinvention.

As used herein, “exemplary” means serving as an example or illustrationand does not necessarily denote ideal or best.

As used herein, the term “includes” means includes but is not limitedto, the term “including” means including but not limited to. The term“based on” means based at least in part on.

As used herein the term “Internet of Things” or “IoT” refers to anetwork of physical objects, devices, vehicles, buildings and otheritems, embedded with electronics, software, sensors, and networkconnectivity that enables these objects to collect and exchange datawith one or more other objects, devices or data sources.

As used herein, the term “packet” refers to any formatted unit of datathat may be sent and/or received by an electronic device.

As used herein, the term “payload” refers to any part of transmitteddata that constitutes an intended message and/or identifyinginformation.

As used herein, the term “interface” refers to any shared boundaryacross which two or more separate components of a computer system mayexchange information. The exchange can be between software, computerhardware, peripheral devices, humans, and combinations thereof.

All definitions, as defined and used herein, should be understood tocontrol over dictionary definitions, definitions in documentsincorporated by reference, and/or ordinary meanings of the definedterms. Unless defined otherwise, all technical and scientific terms usedherein have the same meaning as commonly understood by one of ordinaryskill in the art to which this invention belongs. Although any methodsand materials similar or equivalent to those described herein can alsobe used in the practice or testing of the present invention, exemplarymethods and materials are now described. All publications mentionedherein are incorporated herein by reference to disclose and describe themethods and/or materials in connection with which the publications arecited.

Certain aspects of the present disclosure provide for systems, methods,and devices to identify and mitigate risk of occurrence of, and injuryfrom, an arc flash when accessing an enclosure containing electricallypowered equipment that might be in an arc flash precondition state.Embodiments of the present disclosure provide for an integrated arcflash safety system and methods for remote access control and safetycompliance. An electronic access control system may comprise anenclosure having a door, a door lock device, an electronic accesscontrol unit, and an arc sensor. The access controller compriseselectronic hardware and software for sensor/detection operation, doorlock device operation, door lock actuation, and wireless remotecommunication. The door lock device may be controlled by the accesscontroller in combination with the arc sensor. The access controller mayfacilitate remote access control via a smart mobile computing device(e.g., mobile phone) and telecommunication with a remote cloud servervia a communication network (e.g., Internet). Embodiments of the presentdisclosure enable rapid detection of an arc flash precondition or eventwithin an enclosure and warning generation as well as protection andstandard compliance measures to improve technician safety.

Exemplary systems, methods, and devices of the present disclosure enableone or more electronic access control protocols for controlling accessto an enclosure containing electrically powered equipment, including,but not limited to, one or more protocols for arc flash detection,access lock down, safety procedures, temporary safety compliance access,arc flash resolution, standard access, safety audit reporting, andcombinations thereof. In accordance with various embodiments of thepresent disclosure, electronic access may be denied from any standardcode that a technician uses to unlock an enclosure containingelectrically powered equipment according to the one or more electronicaccess control protocols. In various embodiments, one or morecommunication protocols and resolution workflows, such as managementnotification and engagement of a trained technician with appropriatesafety gear, may be executed in response to one or more controlparameters. In accordance with certain aspects of the presentdisclosure, one or more conditional and/or temporary access rights maybe granted to execute certain safety protocols. In various embodiments,one or more arc flash root issue is resolved before enclosure access isallowed by the system. In various embodiments, standard access isreengaged by compliance approved individuals or external observer byusing a code and/or application configuration change.

Turning now descriptively to the drawings, in which similar referencecharacters denote similar elements throughout the several views, FIG. 1depicts an architecture diagram of an electronic access control system100. In accordance with certain aspects of the present disclosure,system 100 is configured to restrict and/or disable standard accessprotocols for an access-controlled enclosure upon detection of an arcflash precondition within the enclosure and restore standard accessprotocols upon a resolution of the arc flash precondition. In accordancewith certain embodiments, system 100 may comprise an enclosure 102having a door 104, at least one door lock device 106, an electronicaccess control unit (ACU) 108, and at least one sensor 110. Enclosure102 may comprise an enclosure containing electrically powered equipment,electrical switchgear, motor control center, or the like. In certainembodiments, sensor 110 may be configured to detect one or moreconditions within enclosure 102 being correlated with an arc flashprecondition. The one or more conditions may include temperature/heat,ohm phase deviance, internal environmental electromagnetic spikes and/orother arc flash preconditions. In certain embodiments, sensor 110 maycomprise one or more temperature sensor, voltage sensor, e-field sensor,h-field sensor and/or other sensors configured to detect one or morevariables associated with an arc flash precondition. In variousembodiments, ACU 108 may comprise electronic circuitry to command andcontrol one or more operations of sensor 110, door lock device 104,actuator 112, and wireless communication via a bi-lateral networkconnection 114 (e.g. Bluetooth, wi-fi, ethernet connection, and thelike).

In accordance with certain aspects of the present disclosure, system 100may comprise at least one mobile electronic device 116, one or moreremote server 120, at least one database 112 communicably engaged withserver 120, one or more client devices 126 a-126 n, and, optionally, oneor more third-party servers/services 124. In accordance with anembodiment, mobile electronic device 116 is communicably engaged withACU 108 over wireless communications interface 114, and may comprise asmartphone, tablet computer, laptop computer, and the like. Wirelesscommunications interface 114 may comprise one or more wirelesscommunications protocols such as Bluetooth, Wi-Fi, LoRA, RF, near fieldcommunication (NFC), and the like. In certain embodiments, mobileelectronic device 116 comprises an electronic access control application130. Electronic access control application 130 may be native to mobileelectronic device 116 or may be a web-based application executed over aninstance of an Internet browser of mobile electronic device 116.Electronic access control application 130 may be configured toauthenticate a user and enable the user to configure and communicate anelectronic access request; for example, entering an access code forenclosure 102 via a graphical user interface of electronic accesscontrol application 130. In certain embodiments, mobile electronicdevice 116 and/or electronic access control application 130 may beassociated with a user being authorized to access enclosure 102; forexample, a service technician authorized to service one or moreelectrical components being housed within enclosure 102. Electronicaccess control application 130 may be configured to package the accessrequest and mobile electronic device 116 may be configured tocommunicate a data packet comprising the access request to ACU 108 viawireless communications interface 114. ACU 108 may be configured toprocess the access request according to one or more authorizationparameters. In accordance with various aspects of the presentdisclosure, ACU 108 is configured to process sensor data from one ormore inputs from sensor 110 to determine whether the sensor data exceedsa predetermined sensor data threshold corresponding to one or more arcflash preconditions. If the sensor data exceeds the threshold, ACU 108may deny the access request from mobile electronic device 116. If thesensor data does not exceed the threshold, ACU 108 may process theaccess request according to standard authorization and authenticationparameters and grant access in response to the access request beingvalid. In accordance with various aspects of the present disclosure, ACU108 is communicably engaged with server 120 via a network connection118. Network connection 118 may comprise an Internet connection or otherwide area network interface. ACU 108 may establish a data transferinterface with network connection 118 via one or more wirelesscommunications interface, such as LTE, 4G, 5G, WiFi or LoRA, or awireline communications interface, such as an Ethernet cable or otherdata cable. In some embodiments, communication between ACU 108 andserver 120 may be tunneled through mobile electronic device 116 viawireless communications interface 114. Mobile electronic device 116 maybe communicably engaged with server 120 via network connection 118.Server 120 may be configured to execute a server-side electronic accesscontrol application 128. Server-side electronic access controlapplication 128 may be configured to send and receive data fromelectronic access control application 130. Server-side electronic accesscontrol application 128 may be configured to configure one or more useraccess permissions and user authentication parameters; configure one ormore arc flash safety and compliance parameters for enclosure 102,including establishing one or more sensor threshold values fordetermining an arc flash precondition; provisioning ACU 108 withstandard access parameters, sensor thresholds, and temporary accessparameters; configuring one or more safety and compliance workflowswithin electronic access control application 130, including configuringone or more graphical user interface(s); sending and receivingcommunications between ACU 108, mobile electronic device 116, one ormore client devices 126 a-126 n, and, optionally, one or morethird-party servers/services 124; processing data received from ACU 108,mobile electronic device 116, one or more client devices 126 a-126 n,and, optionally, one or more third-party servers/services 124 todetermine compliance with one or more arc flash safety protocols;configuring one or more temporary access protocols and parameters fortemporary access to enclosure 102 in response to an arc flashprecondition; processing data received from ACU 108, mobile electronicdevice 116, one or more client devices 126 a-126 n, and, optionally, oneor more third-party servers/services 124 to determine a resolution ofthe precondition for the arc flash in the enclosure; and, restoring oneor more standard access protocols for the enclosure in response to theresolution of the arc flash precondition.

Referring now to FIG. 2, with cross-reference to FIG. 1, a schematicblock diagram 200 illustrating an Electronic Access Control Unit (ACU)202 is shown. In accordance with various aspects of the presentdisclosure, ACU 202 may be embodied as ACU 108 as shown in FIG. 1. Inaccordance with certain embodiments, ACU 202 comprises one or moreanalog-to-digital (A/D) module 204 (optional), microcontroller module206, memory storage module 208, wireless communication module 210,antenna 212, power module 214, and an actuator module 216. In variousembodiments, the actuator module 216 comprises at least one electricaldriver relay 218 (e.g., actuator 112 of FIG. 1) to actuate one or moredoor lock device (e.g. door lock device 106 of FIG. 1). In certainembodiments, electrical driver relay 218 may actuate other components ofenclosure 102 of FIG. 1; including, but not limited to, anelectromagnetic actuation component, rod, a bolt, a hinge, a flap, orthe like, that controls a physical access to said enclosure. In variousembodiments, A/D module 204 comprises at least one analog-to-digitalconverter, signal amplifier, signal filter (optional), circuit elements,including but not limited to resistor, capacitor, diode, the like, orcombinations thereof, to enable the acquisition of an arc sensor,including sensor 110 of FIG. 1. In various embodiments, the controllermodule 206 comprises at least one microcontroller, a microprocessor, aCPU, the like, or combinations thereof. In a preferred embodiment,microcontroller module 206 comprises an embedded real-time operatingsystem being tuned and optimized for low power consumption. In variousembodiments, memory storage module 208 comprises at least onetransitory/non-transitory memory storage device 220 (e.g., Flash, RAM,ROM, EPROM, etc.). In various embodiments, wireless communication module210 comprises at least one transceiver 222, configured to operate as atransmitter-receiver, using one or more communication means, technology,network, protocol, or standard, including but not limited to, Bluetooth,BLE, Wi-Fi, RF, UHF, LC, LAN, WAN, GPS, cellular, the like, orcombinations thereof. In a preferred embodiment, communication module210 comprises a Bluetooth transceiver 222, and a GPS transceiver 224(optional), and optionally network I/O interface 226 for communicationvia Ethernet. In various embodiments, the antenna module 228 comprisesone or more antenna 212. In various embodiments, power module 214comprises at least one battery 228, optionally rechargeable. In anembodiment, power module 214 comprises optionally at least one directconnection 230 to a power source of a machine, equipment, plant orfacility. In various embodiments, power module 214 provides energy toone or components of system 100 of FIG. 1. In various embodiments, oneor more components or combinations of components of the ACU 202 can beimplemented as one or more embedded system, ASIC, SoC and the like, andcombinations thereof. In other embodiments, firmware may be incorporatedto simplify one or more function of one or more hardware component ofACU 202. In various embodiments, ACU 202 is integrated within one ormore control unit or system of a powered machine or electrical equipmentstored within enclosure 102 of FIG. 1.

Certain aspects of the present disclosure include one or more software,stored instructions, or applications being stored on memory storagedevice 220 and executed on controller module 206 to command one or moreoperations within system 100 of FIG. 1. In various embodiments, one ormore software stack running on controller module 206 includes, but isnot limited to, an Internet of Things (IoT) Operating System (OS), aHardware Abstraction, a software layer that enables access to thehardware features of a microprocessor, memory storage device, GPIOs,serial interfaces, etc., Communication Support, drivers and one or moreprotocols such as Bluetooth, BLE, Z-Wave, Thread, CAN bus, MQTT,Representational State Transfer (REST), RESTful, RESTful web service,Constrained Application Protocol (CoAP), etc.; and enabling devicecommunication, and Remote Management for the remote control ofcontroller module 206 to provision, update and upgrade firmware, batterylevel, and other operating instructions, including access permissionsand sensor data thresholds. In various embodiments, one or morelibraries can be deployed for stack development. In various embodiments,one or more libraries comprises instructions pertaining to methods forcontrolling access to an enclosure to enforce safety standards forpreventing, managing, mitigation and/or resolving one or more arc flashpreconditions. In various embodiments, one or more instructions includemachine-to-machine communication or IoT interactions. The one or moremethods include but are not limited to, arc sensor operation, door lockdevice operation, door lock actuation, and wireless remotecommunication. In various embodiments, the methods comprise at least oneprocess for controlling a door lock device in combination with one ormore sensors (or sensor suite) to detect one or more arc flashprecondition. In various embodiments, the methods comprise a process fordetecting one or more means or sensors of arc flash preconditiondetection, including but not limited to heat, smoke, ohm phasedeviation, electromagnetic radiation/emission, electromagnetic spike,ultrasound, magnetic field, fiber optic, point sensor, resistive,current, voltage, optical modulation, digital images or videos, andcombinations thereof. In various embodiments, ACU 202 serves as aresource providing one or more safety statuses (e.g., output) for anenclosure to one or more receiving clients. In various embodiments, aresource further stores one or more Uniform Resource Identifier (URI),Uniform Resource Name (URN), Uniform Resource Locator (URL) or the like,of a device or output as sub-resources. In various embodiments,sub-resources may comprise a sensor output, ACU transmission data,client control parameters to define safety features for controllingenclosure access, instructions to trigger door lock actuator, and thelike.

Referring now to FIG. 3, with cross-reference to FIGS. 1 and 2, afunctional block diagram of an electronic access control system 300 isshown. In accordance with certain aspects of the present disclosure,system 300 may be embodied within or as a subsystem of system 100 ofFIG. 1. In accordance with certain aspects of the present disclosure,system 300 may be configured to continuously assess and determine an arcflash precondition within an interior area of an enclosure 301, andselectively restrict access to enclosure 301 in response to the presenceof an arc flash precondition within the interior area of enclosure 301.System 300 comprises an electronic access control unit 302, a mobileelectronic device 312, and one or more sensors 320. In accordance withvarious aspects of the present disclosure, electronic access controlunit 302 may be embodied as ACU 108 of FIG. 1 and/or ACU 202 of FIG. 2;mobile electronic device 312 may be embodied as mobile electronic device116 of FIG. 1; and sensors 320 may be embodied as sensor 110 of FIG. 1.In accordance with various embodiments, mobile electronic device 312 maybe associated with an authorized user of an electronic access controlapplication comprising one or more credentials or authorizationpermissions for accessing enclosure 301; for example, a servicetechnician being authorized to access enclosure 301 for the purpose ofexecuting one or more service tasks. In accordance with variousembodiments, mobile electronic device 312 sends a wireless signalcomprising a data packet containing a payload comprising access requestdata 322 to ACU 302. ACU 302 may receive the signal at a wirelesscommunications module 308 comprising at least one antenna andcommunicate the data packet to processor 304 via system bus 330.Processor 304 may receive and process access request data 322 inaccordance with one or more processing instructions stored on memorydevice 306 to grant or deny the access request. In accordance withvarious aspects of the present disclosure, the one or more dataprocessing instructions may comprise one or more instructions forreceiving sensor data 328 and processing sensor data 328 to determinewhether sensor data 328 exceeds one or more arc flash safety thresholds.In certain embodiments, sensor data 328 may be collected by sensors 320and communicated to processor 304 via wireless communications module 308and/or system bus 330. In certain embodiments, sensors 320 may compriseone or more temperature sensor 314, voltage sensor 316, andE-Field/H-Field sensor 318. In accordance with various aspects of thepresent disclosure, processor 304 may process sensor data 328 accordingto the one or more data processing instructions to determine whethersensor data 328 exceeds one or more arc flash safety thresholds. Ifsensor data 328 exceeds a sensor data threshold value, then processor304 denies the access request and maintains enclosure lock 326 in alocked state. If sensor data 328 does not exceed the sensor datathreshold value, then processor 304 processes the access request data inaccordance with predetermined authorization and authenticationparameters being stored in memory device 306. If the access request isvalid/authenticated, then processor 304 sends a signal via system bus330 to electronic locking circuitry 310 to configure enclosure lock 326to an unlocked state. Processor 304 may be configured to assemble anaccess response communication (e.g., grant/denial of access request andpresence/absence of arc flash precondition) and communications module308 may be configured to transmit a signal comprising a data packetincluding access response data 324 to mobile electronic device 312.Mobile electronic device 312 may be configured to process accessresponse data 324 and display the access response communication to auser of mobile electronic device 312.

Referring now to FIG. 4, a functional block diagram of an electronicaccess control system 400 for preventing, controlling, mitigating and/orresolving an arc flash precondition within an enclosure 414 is shown. Inaccordance with various aspects of the present disclosure, system 400may be incorporated within or embodied as system 100 of FIG. 1. Inaccordance with various embodiments, system 400 comprises an electronicaccess control unit (ACU) 416 capable of communicating with one or morecloud server 402 via a communication network 404 to send activity datafrom ACU 416 to one or more cloud server 402. In accordance with variousaspects of the present disclosure, activity data may comprise sensordata received from one or more sensor 418, access request data receivedfrom mobile phone gateway 424, output data associated with one or moredata processing routines of ACU 416. In various embodiments,communication network 404 comprises one or more LAN, WAN, wirelessnetwork, cellular network, Internet, the like, or combinations thereof.In various embodiments, cloud server 402 comprises an IoT platform withvarious applications for ingestion of data generated by ACU 416, streamanalytics and safety guidance policies, action including actuation ofdoor lock 420 configured to lock and unlock door 422, data storage, anddevice management. In one implementation, ACU 416 communicates withcloud server 402 via a mobile phone gateway 424. In anotherimplementation ACU 416 with cloud server 402 via a gateway router 408.The said cloud server and services are commonly referred to as “cloudcomputing”, “on-demand computing”, “software as a service (SaaS)”,“platform computing”, “network-accessible platform”, “cloud services”,“data centers,” and the like. The term “cloud” can include a collectionof hardware and software that forms a shared pool of configurablecomputing resources (e.g., networks, servers, storage, applications,services, etc.), which can be suitably provisioned to provide on-demandself-service, network access, resource pooling, elasticity and measuredservice, among other features. In various embodiments, cloud-basedserver 402 comprises one or more software application (API) 408 toenable the development of one or more software application product 410providing one or more functions, including but not limited to, dataprocessing, data analysis, data presentation in graphical form, dataannotation, or the like. In certain embodiments, software applicationproduct 410 is hosted on cloud-based server 402. In various embodiments,software application product 410 comprises one or more logic flows toenable a system and methods for collecting, processing, and synthesizinginsights from at least one ACU 416, mobile client 406, or mobile phonegateway 424. In various embodiments, at least one application 410enables the retrieval or distribution of one or more said logic flowsfor controlling access to enclosure 414 and enforcing one or more safetyand compliance workflows. In various embodiments, a user (e.g., asupervisor or administrator) may access data insights from a desktopclient 412. Similarly, a technician may access instructions or guidancefrom a mobile client 406, or vice versa. In one implementation, mobileclient 406 comprises a mobile software program 426 capable ofcommunicating with cloud-server 402 to access said information.Similarly, desktop client 412 may access cloud-based server 402 viacommunication network 404. In various embodiments, a client device(e.g., mobile phone, mobile computing device, PC, etc.) is communicablyengaged with the cloud-based server 402 to receive one or more assetsconfigured to render one or more graphical user interface (GUI) elementsof mobile software program 426 and one or more instructions/commandsbeing operable to run one or more current instance, historical instance,prediction, recommendation, or combinations thereof, for safety,compliance, prevention, mitigation and/or resolution of an arc flashprecondition. In various embodiments, historical instances, reports andreal-time notifications reflect all steps that occurred for enclosure414. In various embodiments, one or more historical instances of mobilesoftware program 426 enable the prevention and after-action analyses tobetter identify and analyze one or more arc flash root issue. In variousembodiments, cloud-based server 402 may be communicably engaged with oneor more third-party systems, servers and/or applications to betterenable safety, compliance, prevention, mitigation and/or resolution ofan arc flash precondition within enclosure 414.

Referring now to FIG. 5, an architecture diagram of an electronic accesscontrol system 500 comprising a private network (PN) architecture isshown. In accordance with various aspects of the present disclosure,system 500 may be incorporated within or embodied as system 100 ofFIG. 1. In accordance with various embodiments, system 500 comprises anElectronic Access Control Unit (ACU) 502 being communicably engaged witha mobile client 514 to send and receive communications therebetween.Mobile client 514 may comprise an electronic access managementapplication 516 that enables a user to access one or more remote sitescomprising at least one access-restricted enclosure 501. In certainembodiments, access-restricted enclosure 501 is secured by a door 520being secured by an electronic locking mechanism 522. Electronic lockingmechanism 522 may be operably engaged with ACU 502 to actuate between alocked state and an unlocked state. In accordance with an embodiment,electronic access management application 516 enables a data transferinterface between mobile client 514 and ACU 502. In accordance withcertain embodiments, mobile client 514 is communicably engaged with atleast one cloud server 518 via network 504 to enable a data transferinterface between electronic access management application 516 and anidentity and access management software application (IAS) 506. Network504 may be configured as a private network (PN) that does not transferdata over a public Internet connection. In certain embodiments, mobileclient 514 is authenticated and authorized via a direct connectionbetween with Network Operations Center (NOC) 508, optionally comprisingone or more network firewall 510. In certain embodiments, no public IPaddress or Certificate Signing Request (CSR) is required forestablishing communication with NOC 508. In certain implementations, IAS506 authorizes a user via an interactive voice response module toauthenticate the user and grant access to enclosure 501. In response toidentifying an arc flash precondition or arc flash event, IAS 506 mayconfigure one or more system parameters to deny access to enclosure 501by sending control instructions to electronic access managementapplication 516. IAS 506 may further configure and communicate one ormore safety and compliance workflows to electronic access managementapplication 516 to ensure user compliance with one or more safetyprotocols and grant temporary access to enclosure 501. In variousembodiments, electronic access management application 516 comprises agraphical user interface comprising one or more interface elements toenable one or more features, including but not limited to, user accessvalidation, activity audit trail, generation of remote site accesscodes, and notes. In various embodiments, IAS 506 comprises a lockmanagement software system hosted on one or more cloud servers 518within NOC 508. In an implementation, IAS 506 contains remote site anduser information for all users within system 500. In anotherimplementation, IAS 506 authenticates user access privileges prior togranting access to a site. In yet another implementation, one or moregraphical user interface enables a user to query and filter data toenable one or more access management and audit functions. In variousembodiments, IAS 506 may be configured to provide real-time reporting ofdata to one or more users to enable analytics and customized reportingfor complete insight into a site and user access activity.

FIG. 6 is a process flow diagram of an electronic access control method600. In accordance with various aspects of the present disclosure,method 600 may be incorporated within one or more aspects and/orroutines of system 100 of FIG. 1. Method 600 comprises various steps forpreventing, mitigating, managing and resolving an arc flash preconditionor arc flash event within an access-controlled enclosure containingelectrical equipment. In accordance with certain embodiments, method 600may be initiated by receiving a sensor input by an electronic accesscontrol unit and processing the sensor input to detect an occurrence ofan arc flash precondition or arc flash event within the enclosure (Step602). Method 600 may continue by communicating, with the electronicaccess control unit via one or more alarm, switch and/or networkinterfaces, the occurrence of an arc flash precondition or arc flashevent within the enclosure and configuring an access lock down state forthe enclosure (Step 604). The access lock down state may be configuredby the electronic access control unit and/or a remote servercommunicably engaged with the electronic access control unit. Method 600may continue by implementing one or more safety procedures and protocolsfor mitigating and resolving the arc flash precondition or arc flashevent, which may include one or more compliance workflows such asmanagement notification and verification of technician safety gear andtraining (Step 608). Method 600 may continue by granting temporaryaccess to one or more authorized users who have completed the one ormore compliance workflows and have been approved for access by theremote server and/or one or more administrator users (Step 610). Method600 may continue by verifying a resolution of the arc flash event or arcflash precondition in the enclosure (Step 612). Method 600 may verifyresolution of the arc flash event or arc flash precondition via one ormore user responses or user-generated inputs and/or one or moreprocessing steps executed on the electronic access control unit and/orthe remote server. Method 600 may continue by enabling, with theelectronic access control unit and/or the remote server, one or morestandard access protocols for the enclosure in response to theresolution of the arc flash event or arc flash precondition (Step 614).In accordance with certain aspects of the present disclosure, method 600may conclude by generating, either automatically or ad hoc, one or moresafety audit reports for the arc flash event or arc flash precondition(Step 616). The one or more safety audit reports may include event datato reflect all steps that occurred for the enclosure. The one or moresafety audit reports may be utilized for arc flash prevention andpost-mortem analyses to gain insights for future prevention and improvedsafety protocols.

Referring now to FIG. 7, a process flow diagram of a routine 700 of anelectronic access control method and system is shown. In accordance withcertain aspects of the present disclosure, routine 700 may beincorporated within one or more aspects of system 100 of FIG. 1. Routine700 may be incorporated within one or more process steps of method 600of FIG. 6 and/or may include one or more sub-steps of method 600 of FIG.6. Routine 700 may be embodied within one or more processor-executableinstructions to command one or more operations of an electronic accesscontrol unit, mobile electronic device and/or a remote server, as shownand described in FIGS. 1-5. In accordance with certain aspects of thepresent disclosure, routine 700 may comprise one or more of process flowsteps 702-716. In accordance with certain embodiments, routine 700 maycomprise one or more data receiving steps to receive access datacommunicated from a mobile electronic device to an ACU (Step 702) andreceive sensor data communicated from one or more sensors to the ACT(Step 704). Routine 700 may comprise one or more data processing stepsto process the sensor data (Step 708) and process the access requestdata (Step 706). In certain embodiments, the output of the one or moredata processing steps is evaluated to determine the presence of an arcflash precondition based on the sensor data (Step 710). In accordancewith certain embodiments, step 710 is configured to compare the sensordata to one or more predetermined threshold values being stored inmemory to determine if the sensor data exceeds the threshold values. Incertain embodiments, the one or more predetermined threshold values arecorrelated with one or more arc flash precondition and/or arc flashevent. Routine 700 may comprise a decision step 712 on the output ofstep 710 to determine if an arc flash precondition is present based onwhether the sensor data exceeds a threshold value. If NO, then routine700 continues by processing the access request data according to one ormore standard protocols for authenticating and authorizing an accessrequest (Step 714). If YES, then routine 700 continues by denying theaccess request (Step 716) and restricting access to the enclosure.

Referring now to FIG. 8, a process flow diagram of a routine 800 of anelectronic access control method and system is shown. In accordance withcertain aspects of the present disclosure, routine 800 may beincorporated within one or more aspects of system 100 of FIG. 1. Routine800 may be incorporated within one or more process steps of method 600of FIG. 6 and/or may include one or more sub-steps of method 600 of FIG.6. Routine 800 may be embodied within one or more processor-executableinstructions to command one or more operations of an electronic accesscontrol unit, mobile electronic device and/or a remote server, as shownand described in FIGS. 1-5. In certain embodiments, routine 800 maycomprise a continuation of one or more steps of routine 700. Inaccordance with certain aspects of the present disclosure, routine 800may comprise one or more of process flow steps 802-814. In accordancewith certain embodiments, routine 800 may comprise operations forcommunicating sensor data and/or data indicative of an arc flashprecondition state or arc flash event to the mobile electronic deviceand/or remote server (Step 802). Routine 800 may continue by executingone or more operations to disable standard access permissions for theACU and/or one or more users and may configure one or more applicationsettings to comprise a safety/restricted access mode of operation forthe ACU (Step 804). Routine 800 may continue by executing one or moreprocessing steps to evaluate a root issue of the arc flash preconditionand determine one or more safety protocols based on the arc flashprecondition (Step 806). Routine 800 may continue by executing one ormore communication steps comprising communicating a push notification oralert message to a client device associated with a technician user (Step808) and communicating a push notification or alert message to one ormore client device(s) associated with one or more other users orstakeholders (Step 810). Routine 800 may continue by executing one ormore application configuration steps comprising configuring at least onesafety and compliance workflow for the technician user (Step 812) andconfiguring at least one safety and compliance workflow for one or moreother users or stakeholders (Step 814).

Referring now to FIG. 9, a process flow diagram of a routine 900 of anelectronic access control method and system is shown. In accordance withcertain aspects of the present disclosure, routine 900 may beincorporated within one or more aspects of system 100 of FIG. 1. Routine900 may be incorporated within one or more process steps of method 600of FIG. 6 and/or may include one or more sub-steps of method 600 of FIG.6. Routine 900 may be embodied within one or more processor-executableinstructions to command one or more operations of an electronic accesscontrol unit, mobile electronic device and/or a remote server, as shownand described in FIGS. 1-5. In certain embodiments, routine 900 maycomprise a continuation of one or more steps of routine 800. Inaccordance with certain aspects of the present disclosure, routine 900may comprise one or more of process flow steps 902-910. In accordancewith certain embodiments, routine 900 may comprise operations forexecuting one or more safety and compliance workflows across one or moreclient devices (Step 902). Routine 900 may continue by executing one ormore data collection and communication steps comprising collecting oneor more user-generated inputs from the one or more safety and complianceworkflows across the one or more client devices and communicating theone or more user-generated inputs to the server (Step 904). Routine 900may continue by executing operations for receiving the one or moreuser-generated inputs comprising a plurality of safety and compliancedata and processing the safety and compliance data according to one ormore data processing operations (Step 906). Routine 900 may continue byutilizing the output of step 906 to execute one or more operations forverifying safety and compliance of at least one user according to one ormore safety and compliance protocol(s) (Step 908). In certainembodiments, the one or more safety and compliance protocol(s) maycomprise one or more rules or rules engine. Routine 900 may continue byutilizing the output of step 908 to configure temporary accesspermissions for one or more compliant user (Step 910).

Referring now to FIG. 10, a process flow diagram of a routine 1000 of anelectronic access control method and system is shown. In accordance withcertain aspects of the present disclosure, routine 1000 may beincorporated within one or more aspects of system 100 of FIG. 1. Routine1000 may be incorporated within one or more process steps of method 600of FIG. 6 and/or may include one or more sub-steps of method 600 of FIG.6. Routine 1000 may be embodied within one or more processor-executableinstructions to command one or more operations of an electronic accesscontrol unit, mobile electronic device and/or a remote server, as shownand described in FIGS. 1-5. In certain embodiments, routine 1000 maycomprise a continuation of one or more steps of routine 900. Inaccordance with certain aspects of the present disclosure, routine 1000may comprise one or more of process flow steps 1002-1010. In accordancewith certain embodiments, routine 1000 may comprise operations forprovisioning the ACU with temporary access settings (Step 1002). Routine1000 may continue by executing one or more operations for receivingtemporary access request data at a processing unit of ACU (Step 1004).Routine 1000 may utilize the output of step 1004 to process thetemporary access request data and grant temporary access in response tothe data being valid and authorized (Step 1006). Routine 1000 maycontinue by executing one or more operations for collecting temporaryaccess data (e.g. from one or more sensors) and receiving storingtemporary access data in at least one memory device of ACU and/or themobile electronic device (Step 1008). Routine 1000 may continue byexecuting one or more operations for communicating the temporary accessdata from the ACU and/or mobile electronic device to the remote server(Step 1010).

Referring now to FIG. 11, a process flow diagram of a routine 1100 of anelectronic access control method and system is shown. In accordance withcertain aspects of the present disclosure, routine 1100 may beincorporated within one or more aspects of system 100 of FIG. 1. Routine1100 may be incorporated within one or more process steps of method 600of FIG. 6 and/or may include one or more sub-steps of method 600 of FIG.6. Routine 1100 may be embodied within one or more processor-executableinstructions to command one or more operations of an electronic accesscontrol unit, mobile electronic device and/or a remote server, as shownand described in FIGS. 1-5. In certain embodiments, routine 1100 maycomprise a continuation of one or more steps of routine 1000. Inaccordance with certain aspects of the present disclosure, routine 1100may comprise one or more of process flow steps 1102-1112. In accordancewith certain embodiments, routine 1100 may comprise operations forreceiving temporary access data from the ACU and/or mobile electronicdevice (Step 1102) and processing the temporary access data to determineresolution of at least one arc flash root issue (Step 1104). Routine1100 may comprise a decision step 1106 based on the output of step 1104to determine if the at least one arc flash root issue has been resolved.If NO, routine 1100 continues by executing operations for maintainingthe restricted access protocol(s) for the arc flash precondition/event(Step 1108). If YES, routine 1100 continues by executing operations forrestoring standard access permissions and/or settings from prior to thearc flash precondition/event (Step 1110). Routine 1100 may conclude byexecuting operations for provisioning the ACU with the restored standardaccess permissions and/or settings based on the output of step 1110(Step 1112).

Referring now to FIG. 12, a process flow diagram of a routine 1200 of anelectronic access control method and system is shown. In accordance withcertain aspects of the present disclosure, routine 1200 may beincorporated within one or more aspects of system 100 of FIG. 1. Routine1200 may be incorporated within one or more process steps of method 600of FIG. 6 and/or may include one or more sub-steps of method 600 of FIG.6. Routine 1200 may be embodied within one or more processor-executableinstructions to command one or more operations of an electronic accesscontrol unit, mobile electronic device and/or a remote server, as shownand described in FIGS. 1-5. In certain embodiments, routine 1200 maycomprise a continuation of one or more steps of routine 1100. Inaccordance with certain aspects of the present disclosure, routine 1200may comprise one or more of process flow steps 1202-1208. In accordancewith certain embodiments, routine 1200 may comprise one or moreoperations for requesting or initiating a safety audit workflow from oneor more client devices to the server (Step 1202). Routine 1200 may beconfigured to query and analyze safety audit data being stored in atleast one database communicably engaged with the server in accordancewith one or more user inputs and/or data processing operations (Step1204). Routine 1200 may continue by executing one or more operations forassembling the safety audit data and presenting the safety audit data toone or more client devices via a graphical user interface or file format(Step 1206). In certain embodiments, routine 1200 may comprise one ormore steps for updating one or more electronic access permissions and/orsettings by at least one user in response to receiving the safety audit(Step 1208).

Referring now to FIG. 13, a processor-implemented computing device inwhich one or more aspects of the present disclosure may be implementedis shown. According to an embodiment, a processing system 1300 maygenerally comprise at least one processor 1302, a memory 1304, an inputdevice 1306 for receiving input data 1318 and an output device 1308 thatproduces output data 1320 coupled together with at least one bus 1310.In certain embodiments, input device 1306 and output device 1308 couldbe the same device. An interface 1312 can also be provided for couplingthe processing system 1300 to one or more peripheral devices, forexample interface 1312 could be a PCI card or PC card. At least onedatabase storage device 1314 which houses at least one database 1316 canalso be provided. The memory 1304 can be any form of memory device, forexample, volatile or non-volatile memory, solid state storage devices,magnetic devices, etc. The processor 1302 could comprise more than onedistinct processing device, for example to handle different functionswithin the processing system 1300. Input device 1306 receives input data1318 and can comprise, for example, a keyboard, a pointer device such asa pen-like device or a mouse, audio receiving device for voicecontrolled activation such as a microphone, data receiver or antennasuch as a modem or wireless data adaptor, data acquisition card, etc.Input data 1318 could come from different sources, for example keyboardinstructions in conjunction with data received via a network. Outputdevice 1308 produces or generates output data 1320 and can comprise, forexample, a display device or monitor in which case output data 1320 isvisual, a printer in which case output data 1320 is printed, a port forexample a USB port, a peripheral component adaptor, a data transmitteror antenna such as a modem or wireless network adaptor, etc. Output data1320 could be distinct and derived from different output devices, forexample a visual display on a monitor in conjunction with datatransmitted to a network. A user could view data output, or aninterpretation of the data output, on, for example, a monitor or using aprinter. The storage device 1314 can be any form of data or informationstorage means, for example, volatile or non-volatile memory, solid statestorage devices, magnetic devices, etc.

In use, the processing system 1300 is adapted to allow data orinformation to be stored in and/or retrieved from, via wired or wirelesscommunication means, at least one database 1316. The interface 1312 mayallow wired and/or wireless communication between the processing unit1302 and peripheral components that may serve a specialized purpose. Ingeneral, the processor 1302 can receive instructions as input data 1318via input device 1306 and can display processed results or other outputto a user by utilizing output device 1308. More than one input device1306 and/or output device 1308 can be provided. It should be appreciatedthat the processing system 1300 may be any form of terminal, server,specialized hardware, or the like.

It is to be appreciated that the processing system 1300 may be a part ofa networked communications system. Processing system 1300 could connectto a network, for example the Internet or a WAN. Input data 1318 andoutput data 1320 could be communicated to other devices via the network.The transfer of information and/or data over the network can be achievedusing wired communications means or wireless communications means. Aserver can facilitate the transfer of data between the network and oneor more databases. A server and one or more databases provide an exampleof an information source. For example, processing system 1300 mayestablish a data transfer interface with a remote server, for exampleover a public Internet, and send and receive data to and from the serverin accordance with one or more data transfer protocols, includingHypertext Transfer Protocol (HTTP)/Hypertext Transfer Protocol Secure(HTTPS). In accordance with certain data transfer protocols, processingsystem 1300 may be configured to resolve a domain name of a remoteserver with Domain Name System (DNS) servers. The DNS may resolvequeries for these names into IP addresses for the purpose of locatingprocessing system 1300 and its services. Processing system 1300 mayestablish a Transmission Control Protocol (TCP) connection with theremote server. HTTP or HTTPS protocol may be adopted to transmitapplication data between the app and the corresponding servers.According to various embodiments, the data transfer protocols maycomprise the transmission and or reception of one or more requests(e.g., web service request) and responses (e.g., arc sensor status)between a resource and a client via one or more servers using one ormore communication protocols (e.g., UDP, TCP, etc.) in conjunction witha resource observation. In various embodiments, one or more IoTapplication uses one or more web services to process data. One or moreapplication may comprise one or more data and control inputs, processinglogic, and outputs. In accordance with certain aspects of the presentdisclosure, input data may comprise a sensor reading or an output of ACU202 (shown in FIG. 2).

Thus, the processing system 1300 illustrated in FIG. 13 may operate in anetworked environment using logical connections to one or more remotecomputers. The remote computer may be a personal computer, a server, arouter, a network PC, a peer device, or other common network node, andtypically includes many or all of the elements described above.

It is to be further appreciated that the logical connections depicted inFIG. 13 include a local area network (LAN) and a wide area network (WAN)but may also include other networks such as a personal area network(PAN). Such networking environments are commonplace in offices,enterprise-wide computer networks, intranets, and the Internet. Forinstance, when used in a LAN networking environment, the processingsystem 1300 is connected to the LAN through a network interface oradapter. When used in a WAN networking environment, the computing systemenvironment typically includes a modem or other means for establishingcommunications over the WAN, such as the Internet. The modem, which maybe internal or external, may be connected to a system bus via a userinput interface, or via another appropriate mechanism. In a networkedenvironment, program modules depicted relative to the computing systemenvironment 1300, or portions thereof, may be stored in a remote memorystorage device. It is to be appreciated that the illustrated networkconnections of FIG. 13 are exemplary and other means of establishing acommunications link between multiple computers may be used.

FIG. 13 is intended to provide a brief, general description of anillustrative and/or suitable exemplary environment in which variousembodiments of the invention may be implemented. FIG. 13 is an exampleof a suitable environment and is not intended to suggest any limitationas to the structure, scope of use, or functionality of an embodiment ofthe present invention. A particular environment should not beinterpreted as having any dependency or requirement relating to any oneor combination of components illustrated in an exemplary operatingenvironment. For example, in certain instances, one or more elements ofan environment may be deemed not necessary and omitted. In otherinstances, one or more other elements may be deemed necessary and added.

In the description that follows, certain embodiments may be describedwith reference to acts and symbolic representations of operations thatare performed by one or more computing devices, such as the processingsystem 1300 of FIG. 13. As such, it will be understood that such actsand operations, which are at times referred to as beingcomputer-executed, include the manipulation by the processor of thecomputer of electrical signals representing data in a structured form.This manipulation transforms the data or maintains them at locations inthe memory system of the computer, which reconfigures or otherwisealters the operation of the computer in a manner understood by thoseskilled in the art. The data structures in which data is maintained arephysical locations of the memory that have particular properties definedby the format of the data. However, while an embodiment is beingdescribed in the foregoing context, it is not meant to be limiting asthose of skill in the art will appreciate that the acts and operationsdescribed hereinafter may also be implemented in hardware.

Embodiments of the present invention can be implemented with numerousother general-purpose or special-purpose computing devices, systems orconfigurations. Examples of well-known computing systems, environments,and configurations suitable for use in embodiment of the inventioninclude personal computers, handheld or laptop devices, personal digitalassistants, multiprocessor systems, microprocessor-based systems, settop boxes, programmable consumer electronics, network, minicomputers,server computers, game server computers, web server computers, mainframecomputers, and distributed computing environments that include any ofthe above systems or devices.

Various embodiments of the invention will be described herein in ageneral context of computer-executable instructions, such as programmodules, being executed by a computer. Generally, program modulesinclude routines, programs, objects, components, data structures, etc.,that perform particular tasks or implement particular abstract datatypes. In certain embodiments, distributed computing environments wheretasks are performed by remote processing devices that are linked througha communications network may also be employed. In distributed computingenvironments, program modules may be located in both local and remotecomputer storage media including memory storage devices.

With the general computing system environment 1300 of FIG. 13 beingshown and discussed above, the following description and remainingfigures pertain to various exemplified embodiments of the presentinvention generally relating to systems and methods for detecting, withat least one sensor communicably engaged with a controller comprising atleast one processor, an occurrence of a precondition for an arc flash inan enclosure; communicating, with the controller via a communicationsinterface, the precondition for the arc flash to at least one remoteserver or mobile electronic device; restricting, with the controller,access to the enclosure in response to the precondition for an arc flashin the enclosure; verifying, with the at least one remote server, usercompliance with one or more arc flash safety protocols; configuring,with the at least one remote server communicably engaged with thecontroller, temporary access to the enclosure to an authorized user;verifying, with the at least one remote server, a resolution of theprecondition for the arc flash in the enclosure; and, enabling, with theaccess controller, one or more standard access protocols for theenclosure in response to the resolution of the precondition for the arcflash.

As will be appreciated by one of skill in the art, the present inventionmay be embodied as a method (including, for example, acomputer-implemented process, a business process, and/or any otherprocess), apparatus (including, for example, a system, machine, device,computer program product, and/or the like), or a combination of theforegoing. Accordingly, embodiments of the present invention may takethe form of an entirely hardware embodiment, an entirely softwareembodiment (including firmware, resident software, micro-code, etc.), oran embodiment combining software and hardware aspects that may generallybe referred to herein as a “system.” Furthermore, embodiments of thepresent invention may take the form of a computer program product on acomputer-readable medium having computer-executable program codeembodied in the medium.

Any suitable transitory or non-transitory computer readable medium maybe utilized. The computer readable medium may be, for example but notlimited to, an electronic, magnetic, optical, electromagnetic, infrared,or semiconductor system, apparatus, or device. More specific examples ofthe computer readable medium include, but are not limited to, thefollowing: an electrical connection having one or more wires; a tangiblestorage medium such as a portable computer diskette, a hard disk, arandom access memory (RAM), a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM or Flash memory), a compact discread-only memory (CD-ROM), or other optical or magnetic storage device.

In the context of this document, a computer readable medium may be anymedium that can contain, store, communicate, or transport the programfor use by or in connection with the instruction execution system,apparatus, or device. The computer usable program code may betransmitted using any appropriate medium, including but not limited tothe Internet, wireline, optical fiber cable, radio frequency (RF)signals, or other mediums.

Computer-executable program code for carrying out operations ofembodiments of the present invention may be written in an objectoriented, scripted or unscripted programming language such as Java,Perl, Smalltalk, C++, or the like. However, the computer program codefor carrying out operations of embodiments of the present invention mayalso be written in conventional procedural programming languages, suchas the “C” programming language or similar programming languages.

Embodiments of the present invention are described above with referenceto flowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products. It will be understood thateach block of the flowchart illustrations and/or block diagrams, and/orcombinations of blocks in the flowchart illustrations and/or blockdiagrams, can be implemented by computer-executable program codeportions. These computer-executable program code portions may beprovided to a processor of a general purpose computer, special purposecomputer, or other programmable data processing apparatus to produce aparticular machine, such that the code portions, which execute via theprocessor of the computer or other programmable data processingapparatus, create mechanisms for implementing the functions/actsspecified in the flowchart and/or block diagram block or blocks.

These computer-executable program code portions (i.e.,computer-executable instructions) may also be stored in acomputer-readable memory that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the code portions stored in the computer readablememory produce an article of manufacture including instructionmechanisms which implement the function/act specified in the flowchartand/or block diagram block(s). Computer-executable instructions may bein many forms, such as program modules, executed by one or morecomputers or other devices. Generally, program modules include routines,programs, objects, components, data structures, etc. that performparticular tasks or implement particular abstract data types. Typically,the functionality of the program modules may be combined or distributedas desired in various embodiments.

The computer-executable program code may also be loaded onto a computeror other programmable data processing apparatus to cause a series ofoperational phases to be performed on the computer or other programmableapparatus to produce a computer-implemented process such that the codeportions which execute on the computer or other programmable apparatusprovide phases for implementing the functions/acts specified in theflowchart and/or block diagram block(s). Alternatively, computer programimplemented phases or acts may be combined with operator or humanimplemented phases or acts in order to carry out an embodiment of theinvention.

As the phrases are used herein, a processor may be “operable to” or“configured to” perform a certain function in a variety of ways,including, for example, by having one or more general-purpose circuitsperform the function by executing particular computer-executable programcode embodied in computer-readable medium, and/or by having one or moreapplication-specific circuits perform the function.

The terms “program” or “software” are used herein in a generic sense torefer to any type of computer code or set of computer-executableinstructions that can be employed to program a computer or otherprocessor to implement various aspects of the present technology asdiscussed above. Additionally, it should be appreciated that accordingto one aspect of this embodiment, one or more computer programs thatwhen executed perform methods of the present technology need not resideon a single computer or processor, but may be distributed in a modularfashion amongst a number of different computers or processors toimplement various aspects of the present technology.

All definitions, as defined and used herein, should be understood tocontrol over dictionary definitions, definitions in documentsincorporated by reference, and/or ordinary meanings of the definedterms.

The indefinite articles “a” and “an,” as used herein in thespecification and in the claims, unless clearly indicated to thecontrary, should be understood to mean “at least one.” As used herein,the terms “right,” “left,” “top,” “bottom,” “upper,” “lower,” “inner”and “outer” designate directions in the drawings to which reference ismade.

The phrase “and/or,” as used herein in the specification and in theclaims, should be understood to mean “either or both” of the elements soconjoined, i.e., elements that are conjunctively present in some casesand disjunctively present in other cases. Multiple elements listed with“and/or” should be construed in the same fashion, i.e., “one or more” ofthe elements so conjoined. Other elements may optionally be presentother than the elements specifically identified by the “and/or” clause,whether related or unrelated to those elements specifically identified.Thus, as a non-limiting example, a reference to “A and/or B”, when usedin conjunction with open-ended language such as “comprising” can refer,in one embodiment, to A only (optionally including elements other thanB); in another embodiment, to B only (optionally including elementsother than A); in yet another embodiment, to both A and B (optionallyincluding other elements); etc.

As used herein in the specification and in the claims, “or” should beunderstood to have the same meaning as “and/or” as defined above. Forexample, when separating items in a list, “or” or “and/or” shall beinterpreted as being inclusive, i.e., the inclusion of at least one, butalso including more than one, of a number or list of elements, and,optionally, additional unlisted items. Only terms clearly indicated tothe contrary, such as “only one of” or “exactly one of,” or, when usedin the claims, “consisting of,” will refer to the inclusion of exactlyone element of a number or list of elements. In general, the term “or”as used herein shall only be interpreted as indicating exclusivealternatives (i.e. “one or the other but not both”) when preceded byterms of exclusivity, such as “either,” “one of,” “only one of,” or“exactly one of.” “Consisting essentially of,” when used in the claims,shall have its ordinary meaning as used in the field of patent law.

As used herein in the specification and in the claims, the phrase “atleast one,” in reference to a list of one or more elements, should beunderstood to mean at least one element selected from any one or more ofthe elements in the list of elements, but not necessarily including atleast one of each and every element specifically listed within the listof elements and not excluding any combinations of elements in the listof elements. This definition also allows that elements may optionally bepresent other than the elements specifically identified within the listof elements to which the phrase “at least one” refers, whether relatedor unrelated to those elements specifically identified. Thus, as anon-limiting example, “at least one of A and B” (or, equivalently, “atleast one of A or B,” or, equivalently “at least one of A and/or B”) canrefer, in one embodiment, to at least one, optionally including morethan one, A, with no B present (and optionally including elements otherthan B); in another embodiment, to at least one, optionally includingmore than one, B, with no A present (and optionally including elementsother than A); in yet another embodiment, to at least one, optionallyincluding more than one, A, and at least one, optionally including morethan one, B (and optionally including other elements); etc.

In the claims, as well as in the specification above, all transitionalphrases such as “comprising,” “including,” “carrying,” “having,”“containing,” “involving,” “holding,” “composed of,” and the like are tobe understood to be open-ended, i.e., to mean including but not limitedto. Only the transitional phrases “consisting of” and “consistingessentially of” shall be closed or semi-closed transitional phrases,respectively, as set forth in the United States Patent Office Manual ofPatent Examining Procedures, Section 2111.03.

The present disclosure includes that contained in the appended claims aswell as that of the foregoing description. Although this invention hasbeen described in its exemplary forms with a certain degree ofparticularity, it is understood that the present disclosure of has beenmade only by way of example and numerous changes in the details ofconstruction and combination and arrangement of parts may be employedwithout departing from the spirit and scope of the invention.

What is claimed is:
 1. An electronic access control system comprising:at least one sensor configured to detect at least one arc flashprecondition or arc flash event for an enclosure; a controllercommunicably engaged with the at least one sensor to receive a sensorinput, the controller comprising at least one wireless communicationsinterface configured to wirelessly receive an access request from amobile electronic device, the controller being configured to actuate atleast one locking mechanism to grant access to the enclosure in responseto authorizing the access request according to one or more accessparameters; and a remote server communicably engaged with the controlleror the mobile electronic device to receive sensor data associated withthe sensor input, the remote server comprising at least one processoroperably engaged with at least one non-transitory computer-readablemedium having one or more processor-executable instructions storedthereon that, when executed, cause the at least one processor to performone or more operations, the one or more operations comprising:processing the sensor data to determine at least one arc flashprecondition or arc flash event for the enclosure; configuring the oneor more access parameters to deny the access request in response to thesensor data being indicative of at least one arc flash precondition orarc flash event, wherein configuring the one or more access parametersto deny the access request comprises disabling at least one electronicaccess code in response to the sensor data being indicative of the atleast one arc flash precondition or arc flash event; configuring atleast one arc flash safety protocol in response to the sensor data beingindicative of at least one arc flash precondition or arc flash event,wherein the at least one arc flash safety protocol comprisescommunicating a notification of the at least one arc flash preconditionor arc flash event to an administrator user, wherein the at least onearc flash safety protocol comprises configuring a compliance workflowcomprising one or more steps for verifying the presence of safety gearfor a technician user and completion of training for the technicianuser; granting temporary access to the technician user in response to anapproval by the administrator user, wherein the approval comprisesverification by the administrator user that the technician user hascompleted the compliance workflow; verifying resolution of the at leastone arc flash precondition or arc flash event in response to receivingone or more user-generated inputs from one or both of the technicianuser and the administrator user; enabling one or more standard accessprotocols for the enclosure in response to the verifying resolution ofthe at least one arc flash precondition or arc flash event; generatingone or more safety audit reports for the at least one arc flashprecondition or arc flash event, wherein the one or more safety auditreports comprise event data associated with resolution steps for the atleast one arc flash precondition or arc flash event in the enclosure;and providing the one or more safety audit reports to at least one enduser device.
 2. The system of claim 1 wherein the mobile electronicdevice is communicably engaged with the remote server via a wirelesscommunication network, wherein the wireless communication networkcomprises a private network that does not transfer data over a publicInternet connection.
 3. The system of claim 2 wherein the mobileelectronic device comprises at least one electronic access controlapplication comprising a graphical user interface, wherein the graphicaluser interface is configured to present one or more user prompts andreceive one or more user inputs according to the at least one arc flashsafety protocol.
 4. The system of claim 1 wherein the one or moreoperations of the remote server further comprise provisioning thecontroller with temporary access settings for the technician user.
 5. Anelectronic access control method comprising: detecting, with at leastone sensor communicably engaged with a controller comprising at leastone processor, an occurrence of a precondition for an arc flash in anenclosure; communicating, with the controller via a communicationsinterface, the precondition for the arc flash to at least one remoteserver or mobile electronic device; disabling, with the controller, oneor more standard access protocols for the enclosure in response to theprecondition for the arc flash in the enclosure; restricting access tothe enclosure, wherein the restricting access comprises disabling atleast one electronic access code in response to the precondition for thearc flash in the enclosure; configuring, with the at least one remoteserver, at least one arc flash safety protocol, wherein the at least onearc flash safety protocol comprises communicating a notification of theprecondition for the arc flash in the enclosure to an administratoruser, wherein the at least one arc flash safety protocol comprisesconfiguring a compliance workflow comprising one or more steps forverifying the presence of safety gear for a technician user andcompletion of training for the technician user; granting, with the atleast one remote server, temporary access to the technician user inresponse to an approval by the administrator user, wherein the approvalcomprises verification by the administrator user that the technicianuser has completed the compliance workflow; verifying, with the at leastone remote server or mobile electronic device, resolution of theprecondition for the arc flash in the enclosure in response to receivingone or more user-generated inputs from one or both of the technicianuser and the administrator user; enabling the one or more standardaccess protocols for the enclosure in response to the verifyingresolution of the precondition for the arc flash in the enclosure;generating, with the at least one remote server or mobile electronicdevice, one or more safety audit reports for the precondition for thearc flash in the enclosure, wherein the one or more safety audit reportscomprise event data associated with the resolution of the preconditionfor the arc flash in the enclosure; and providing, with the at least oneremote server or mobile electronic device, the one or more safety auditreports to at least one client device communicably engaged with the atleast one remote server.
 6. The method of claim 5 further comprisingcommunicating, with the at least one remote server via thecommunications interface, the at least one arc flash safety protocol tothe mobile electronic device.
 7. The method of claim 6 furthercomprising receiving, with the mobile electronic device, one or moreuser inputs in response to the at least one arc flash safety protocol.8. The method of claim 7 further comprising communicating, with themobile electronic device via the communications interface, the remoteserver.
 9. The method of claim 5 further comprising communicating, withthe least one remote server via the communications interface, theprecondition for the arc flash to the at least one client device. 10.The method of claim 5 further comprising assembling, with the at leastone remote server, safety audit data for the enclosure, wherein thesafety audit data comprises event data to reflect all steps thatoccurred for the enclosure.
 11. The method of claim 5 wherein one ormore user access permissions comprise the at least one electronic accesscode.
 12. The method of claim 5 wherein the controller is operablyengaged with at least one electronic locking device configured toselectively restrict access to the enclosure.
 13. The method of claim 5wherein the communications interface comprises a private network thatdoes not transfer data over a public Internet connection.
 14. Anon-transitory computer-readable medium encoded with instructions forcommanding one or more processors to execute operations for preventingan arc flash in an enclosure, the operations comprising: receivingsensor data comprising one or more sensor inputs from an interiorportion of the enclosure; processing the sensor data to determine atleast one arc flash precondition or arc flash event for the enclosure;restricting one or more electronic access permissions for the enclosurein response to the sensor data being indicative of the at least one arcflash precondition or arc flash event, wherein the one or moreelectronic access permissions comprise at least one electronic accesscode; configuring at least one arc flash safety protocol in response tothe sensor data being indicative of the at least one arc flashprecondition or arc flash event, wherein the at least one arc flashsafety protocol comprises communicating a notification of the at leastone arc flash precondition or arc flash event to an administrator user,wherein the at least one arc flash safety protocol comprises configuringa compliance workflow comprising one or more steps for verifying thepresence of safety gear for a technician user and completion of trainingfor the technician user; disabling the at least one electronic accesscode in response to the sensor data being indicative of the at least onearc flash precondition or arc flash event; granting temporary access tothe technician user in response to an approval by the administratoruser, wherein the approval comprises verification that the technicianuser has completed the compliance workflow; verifying resolution of theat least one arc flash precondition or arc flash event in response toreceiving one or more user-generated inputs from one or both of thetechnician user and the administrator user; restoring the one or moreelectronic access permissions for the enclosure in response to theresolution of the at least one arc flash precondition or arc flashevent; generating one or more safety audit reports in response to theresolution of the at least one arc flash precondition or arc flashevent, wherein the one or more safety audit reports comprise event dataassociated with the resolution of the at least one arc flashprecondition or arc flash event; and providing the one or more safetyaudit reports to at least one end user device.
 15. The non-transitorycomputer-readable medium of claim 14 wherein the operations furthercomprise provisioning temporary access settings for the technician user.