Systems and methods for virtually tagging and securing industrial equipment

ABSTRACT

In one embodiment, a non-transitory computer readable medium may include computer-executable instructions that, when executed by a processor, may receive a first set of data associated with a user, receive a second set of data associated with one or more lockout procedures performed by the user, receive a request to actuate a locking mechanism of an electronic lock configured to prevent a machine in an industrial automation application from being operational, and send a signal to the electronic lock to actuate the locking mechanism when the second set of data indicates that the lockout procedures have been performed by the user and the data corresponds to an authorized user.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority from and the benefit of U.S.Provisional Application Ser. No. 62/139,182, entitled “Systems andMethods for Exchanging Information Between Devices in an IndustrialAutomation Environment,” filed Mar. 27, 2015, which is herebyincorporated by reference in its entirety.

BACKGROUND

The present disclosure generally relates to an industrial automationsystem. More particularly, the present disclosure relates to systems andmethods for virtually tagging and securing industrial automationequipment, such as a machine, using an electronic lock when placing themachine offline.

BRIEF DESCRIPTION

In one embodiment, a non-transitory computer readable medium may includecomputer-executable instructions that, when executed by a processor, mayreceive a first set of data associated with a user, receive a second setof data associated with one or more lockout procedures performed by theuser, receive a request to actuate a locking mechanism of an electroniclock configured to prevent a machine in an industrial automationapplication from being operational, and send a signal to the electroniclock to actuate the locking mechanism when the second set of dataindicates that the lockout procedures have been performed by the userand the data corresponds to an authorized user.

In one embodiment, a system may include an electronic lock including afirst processor that may receive an actuation signal, a power source,and a locking mechanism configured to physically lock out a machine frombeing operational. The system may also include a computing deviceincluding a second processor that may send the actuation signal to theelectronic lock. The actuation signal may cause the locking mechanism toactuate when one or more access rights associated with the electroniclock correspond to one or more credentials of a user and one or moresteps of a lockout-tagout procedure have been performed.

In one embodiment, an electronic lock may physically lock out a machinefrom being operational. The electronic lock may include a lockingmechanism, a processor that may perform an action when the electroniclock is subject to tampering, a transceiver that may receive anactuation signal configured to actuate the locking mechanism and to senddata associated with the locking mechanism to a cloud-based computingsystem, and a memory that may store the data associated with the lockingmechanism.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other features, aspects, and advantages of the presentdisclosure will become better understood when the following detaileddescription is read with reference to the accompanying drawings in whichlike characters represent like parts throughout the drawings, wherein:

FIG. 1 is a diagrammatical representation of an exemplary control andmonitoring system, in accordance with embodiments presented herein;

FIG. 2 is a schematic representation of a communication network, inaccordance with embodiments presented herein;

FIG. 3 is a block diagram of example components within a computingdevice that is part of the communication network of FIG. 2, inaccordance with embodiments presented herein;

FIG. 4 is a block diagram of example components within a cloud-basedcomputing system of the communication network of FIG. 2, in accordancewith embodiments presented herein;

FIG. 5 is a block diagram of example components of an electronic lock,in accordance with embodiments presented herein;

FIG. 6 is a diagrammatical representation of an electronic lock, inaccordance with embodiments presented herein;

FIG. 7 is a flow diagram of a method for controlling actuation of theelectronic lock of FIG. 6, in accordance with embodiments presentedherein;

FIG. 8 is a flow diagram of a method for logging information related tooperation of the electronic lock, in accordance with embodimentspresented herein;

FIG. 9 is a flow diagram of a method for performing a preventativeaction based on whether the electronic lock of FIG. 6 is being tamperedwith, in accordance with embodiments presented herein; and

FIG. 10 is a flow diagram of a method for using location informationfrom the electronic lock of FIG. 6 to determine directions to theelectronic lock, in accordance with embodiments presented herein; and

FIG. 11 is a flow diagram of a method for controlling deactivation ofthe electronic lock of FIG. 6, in accordance with embodiments presentedherein.

DETAILED DESCRIPTION

One or more specific embodiments will be described below. In an effortto provide a concise description of these embodiments, not all featuresof an actual implementation are described in the specification. Itshould be appreciated that in the development of any such actualimplementation, as in any engineering or design project, numerousimplementation-specific decisions must be made to achieve thedevelopers' specific goals, such as compliance with system-related andbusiness-related constraints, which may vary from one implementation toanother. Moreover, it should be appreciated that such a developmenteffort might be complex and time consuming, but would nevertheless be aroutine undertaking of design, fabrication, and manufacture for those ofordinary skill having the benefit of this disclosure.

Generally, the present disclosure discusses numerous concepts regardinghow devices in an industrial automation system may exchange informationwith each other and use this shared information to assist users in theindustrial automation environment to manage the operations andmaintenance of the devices. In one embodiment, the industrial automationsystem may include a communication architecture that is structuredaccording to a tri-partite paradigm that facilitates communicationsbetween a device, a computing device, and a cloud-based computingsystem. The information shared between each component within thistri-partite structure may enable various devices within the industrialautomation system to operate more efficiently, users to perform tasksrelated to the conditions or operations of the industrial automationsystem more efficiently, and generally provide for improved operationsof the industrial automation system. In addition, the information sharedwithin the tri-partite structure may include data related to one or moreelectronic locks used to physically lock out industrial automationequipment, thereby removing the equipment from operation. Theinformation may be related to the location of the electronic lock,actuation command signals, information related to whether certain stepsof a procedure (e.g., lockout-tagout procedure) have been performed,alert notifications when the electronic lock is being tampered with, alog of actuation times and users operating the electronic locks, and soforth.

In one embodiment, this tri-partite paradigm may involve a softwareapplication operating on the computing device, such that the softwareapplication may monitor, control, access, or view industrial automationequipment in the industrial automation system. Further, the software maybe used to control actuation of the electronic locks. The computingdevice may feed data acquired from the industrial automation equipment,control/monitoring device, cloud-based computing system, electroniclock, or the like to the software application used to actuate theelectronic locks. The software application may then track and monitorthe data to assist the technician with regard to the maintenance andoperation of the equipment. Further, the data may be used by thesoftware to control the operation of the equipment of the industrialautomation system. In some embodiments, the software application mayassist the technician to perform a lockout-tagout procedure, which maydetail how to place equipment offline such that the technician canperform maintenance on the respective equipment. Using the data from theelectronic locks, the software application may disable certain featuresrelated to steps of the lockout-tagout procedure being tracked by thesoftware application when the data indicates certain electronic lockshave not been locked.

As discussed herein, lockout-tagout procedures are used throughoutvarious industries and research settings to ensure that machinery and/orprocesses are placed offline properly and not operating duringmaintenance or servicing. Generally, a lockout-tagout procedure mayinclude physically locking a part of the machinery in one position(e.g., off) to prevent the part from shifting to an alternate position(e.g., on). The procedure may then involve tagging or placing a label onthe device to indicate that the machinery is locked out or is beingserviced. It should be noted that, in some embodiments, an electronicversion of the tag or label may be included in an electronic lock (e.g.,a display (e.g., liquid-crystal display, electronic ink) of theelectronic lock may display certain information similar to the tag orlabel). Typically, the tag may include information such as a statement(e.g., “do not operate—equipment locked out”), an identity of a personwho affixed the tag to the device, and/or a timestamp of when the tag isaffixed. Also, manual locks may be employed when physically locking theparts of the industrial automation equipment offline. That is, atechnician manually actuates the locks to the locked positions.

Certain embodiments of the present disclosure relate to providingelectronic locks that may be remotely actuated via an electronic device,such as the computing device (e.g., tablet computer or a mobile device).The electronic locks may request certain credentials and/or statuschecks for activation. Moreover, the electronic locks may be used forsequential unlock permissions, sequential accessibility (ordering oftasks), user credentials, and the like. As such, the electronic locksmay use multi-factor authentication to create a soft virtual lock. Forexample, an electronic lock may be actuated based on user credentials,as well as based on whether certain procedures have been performed. Theprocedures may specify that locking out a machine be performed afterupstream devices are powered down and certain valves have beendepressurized. In this example, the software application may allow anauthorized user to actuate the electronic lock after these two stepshave been performed. As a result, the software application may requirethat certain steps are performed prior to a device being placed offlineto ensure that when the device is placed offline, the device is placedoffline properly. Moreover, the software application may help ensurethat the technician is operating safely.

Further, in some embodiments, the electronic locks may include locationinformation or a beacon that may be used to assist the softwareapplication operating on the computing device to identify a particularposition or location of the electronic lock. Further, the softwareapplication may determine directions to the electronic locks from thecomputing device executing the software application and display thedirections on the electronic device. Additional details with regard tothe electronic locks described above will be discussed in more detailwith reference to FIGS. 1-10 below.

FIG. 1 is a diagrammatical representation of an exemplary control andmonitoring system 10, in accordance with embodiments presented herein.In FIG. 1, the control and monitoring system 10 is illustrated asincluding a human machine interface (HMI) 12 and a control/monitoringdevice or automation controller 14 adapted to interface with devicesthat may monitor and control various types of industrial automationequipment 16. It should be noted that such an interface in accordancewith embodiments of the present techniques may be facilitated by the useof certain network strategies. Indeed, an industry standard network maybe employed, such as DeviceNet, to enable data transfer. Such networkspermit the exchange of data in accordance with a predefined protocol,and may provide power for operation of networked elements. Although notdepicted in FIG. 1, the control and monitoring system 10 may alsoinclude controllers, input/output (I/O) modules, motor control centers,operator interfaces, contactors, starters, drives, relays, networkswitches (e.g., Ethernet switches, modular-managed, fixed-managed,service-router, industrial, unmanaged, etc.), and the like.

The industrial automation equipment 16 may take many forms and includedevices for accomplishing many different and varied purposes. Forexample, the industrial automation equipment 16 may include machineryused to perform various operations in a compressor station, an oilrefinery, a batch operation for making food items, a mechanized assemblyline, and so forth. Accordingly, the industrial automation equipment 16may comprise a variety of operational components, such as electricmotors, valves, actuators, temperature elements, pressure sensors, or amyriad of machinery or devices used for manufacturing, processing,material handling and other applications.

Additionally, the industrial automation equipment 16 may include varioustypes of equipment that may be used to perform the various operationsthat may be part of an industrial application. For instance, theindustrial automation equipment 16 may include electrical equipment,hydraulic equipment, compressed air equipment, steam equipment,mechanical tools, protective equipment, refrigeration equipment, powerlines, hydraulic lines, steam lines, and the like. Some example types ofequipment may include mixers, machine conveyors, tanks, skids,specialized original equipment manufacturer machines, and the like. Inaddition to the equipment described above, the industrial automationequipment 16 may also include motors, protection devices, switchgear,compressors, and the like.

In certain embodiments, one or more properties of the industrialautomation equipment 16 may be monitored and controlled by certainequipment for regulating control variables. For example, sensors 18 andactuators 20 may monitor various properties of the industrial automationequipment 16 and may be involved to adjust operations of the industrialautomation equipment 16, respectively.

In some cases, the industrial automation equipment 16 may be associatedwith devices used by other equipment. For instance, scanners, gauges,valves, flow meters, and the like may be disposed on industrialautomation equipment 16. Here, the industrial automation equipment 16may receive data from the associated devices and use the data to performtheir respective operations more efficiently. For example, a controller(e.g., control/monitoring device 14) of a motor drive may receive dataregarding a temperature of a connected motor and may adjust operationsof the motor drive based on the data.

In certain embodiments, the industrial automation equipment 16 mayinclude a computing device and/or a communication component that enablesthe industrial equipment 16 to communicate data between each other andother devices. The communication component may include a networkinterface that may enable the industrial automation equipment 16 tocommunicate via various protocols such as EtherNet/IP®, ControlNet®,DeviceNet®, or any other industrial communication network protocol.Alternatively, the communication component may enable the industrialautomation equipment 16 to communicate via various wired or wirelesscommunication protocols, such as Wi-Fi, mobile telecommunicationstechnology (e.g., 2G, 3G, 4G, LTE), Bluetooth®, near-fieldcommunications technology, and the like.

The sensors 18 may be any number of devices adapted to provideinformation regarding process conditions. The actuators 20 may includeany number of devices adapted to perform a mechanical action in responseto a signal from a controller (e.g., the automation controller 14). Thesensors 18 and actuators 20 may be utilized to operate the industrialautomation equipment 16. Indeed, they may be utilized within processloops that are monitored and controlled by the control/monitoring device14 and/or the HMI 12. Such a process loop may be activated based onprocess inputs (e.g., input from a sensor 18) or direct operator inputreceived through the HMI 12. As illustrated, the sensors 18 andactuators 20 are in communication with the control/monitoring device 14.Further, the sensors 18 and actuators 20 may be assigned a particularaddress in the control/monitoring device 14 and receive power from thecontrol/monitoring device 14 or attached modules.

Input/output (I/O) modules 22 may be added or removed from the controland monitoring system 10 via expansion slots, bays or other suitablemechanisms. In certain embodiments, the I/O modules 22 may be includedto add functionality to the control/monitoring device 14, or toaccommodate additional process features. For instance, the I/O modules22 may communicate with new sensors 18 or actuators 20 added to monitorand control the industrial automation equipment 16. It should be notedthat the I/O modules 22 may communicate directly to sensors 18 oractuators 20 through hardwired connections or may communicate throughwired or wireless sensor networks, such as Hart or IOLink.

Generally, the I/O modules 22 serve as an electrical interface to thecontrol/monitoring device 14 and may be located proximate or remote fromthe control/monitoring device 14, including remote network interfaces toassociated systems. In such embodiments, data may be communicated withremote modules over a common communication link, or network, whereinmodules on the network communicate via a standard communicationsprotocol. Many industrial controllers can communicate via networktechnologies such as Ethernet (e.g., IEEE802.3, TCP/IP, UDP,EtherNet/IP, and so forth), ControlNet, DeviceNet or other networkprotocols (Foundation Fieldbus (H1 and Fast Ethernet) Modbus TCP,Profibus) and also communicate to higher level computing systems.

In the illustrated embodiment, several of the I/O modules 22 areconfigured to transfer input and output signals between thecontrol/monitoring device 14 and the industrial automation equipment 16.As illustrated, the sensors 18 and actuators 20 may communicate with thecontrol/monitoring device 14 via one or more of the I/O modules 22coupled to the control/monitoring device 14.

In certain embodiments, the control/monitoring system 10 (e.g., the HMI12, the control/monitoring device 14, the sensors 18, the actuators 20,the I/O modules 22) and the industrial automation equipment 16 may makeup an industrial application 24. The industrial application 24 mayinvolve any type of industrial process or system used to manufacture,produce, process, or package various types of items. For example, theindustrial applications 24 may include industries such as materialhandling, packaging industries, manufacturing, processing, batchprocessing, and the like.

In certain embodiments, the control/monitoring device 14 may becommunicatively coupled to a computing device 26 and a cloud-basedcomputing system 28. In this network, input and output signals generatedfrom the control/monitoring device 14 may be communicated between thecomputing device 26 and the cloud-based computing system 28. Further,the computing device 26 may be communicatively coupled to thecloud-based computing system 28 and one or more electronic locks 29 thatare used to physically lock the industrial automation equipment 16 in astate (e.g., off). For example, the computing device 26 may send acommand signal to the electronic lock 29 to actuate and lock theindustrial automation equipment 16 according to lockout-tagoutprocedures associated with respective industrial automation equipment16.

FIG. 2 is a schematic representation of a communication network 30 thatenables devices to communicate with each other within an industrialapplication, in accordance with embodiments presented herein. As such,the communication network 30 enables devices that are part of theindustrial application 24 to communicate with each other and with otherdevices that are not part of the industrial application 24. As mentionedabove, the industrial application 24 may be in the material handling,packaging industries, manufacturing, processing, batch processing, orany technical field that employs the use of the industrial automationequipment 16. One or more electronic locks 29 may be used to physicallylock the industrial automation equipment 16 according to lockout-tagoutprocedures.

With the foregoing in mind, in one embodiment, data acquired by theindustrial automation equipment 16 may be transmitted to a computingdevice 26. The computing device 26 may be a computing device that mayinclude communication abilities, processing abilities, and the like. Forexample, the computing device 26 may be any general computing devicethat may monitor, control, and/or operate one or more of the industrialautomation equipment 16. As such, the computing device 26 may be alaptop computer, a tablet computer, a mobile phone device computingdevice, a general personal computer, a wearable computing device, or thelike. Additional details regarding the computing device 26 will bediscussed below with reference to FIG. 3.

In addition to communicating with the industrial automation equipment16, the computing device 26 may also communicate with the cloud-basedcomputing system 28. The cloud-based computing system 28 may be acloud-accessible platform that may include one or more servers, one ormore computing devices (e.g., general purpose computers), and the like.In any case, the cloud-based computing system 28 may include a number ofcomputers that may be connected through a real-time communicationnetwork, such as the Internet, Ethernet, EtherNet/IP, ControlNet, or thelike, such that the multiple computers may operate together as a singleentity. The real-time communication network may include any network thatenables various devices to communicate with each other at near real-timeor such that data is communicated with each other at near instantaneousspeeds. In one embodiment, the cloud-based computing system 28 may becapable of communicating with the industrial automation equipment 16 andthe computing device 26. As such, the cloud-based computing system 28may be capable of wired or wireless communication between the industrialautomation equipment 16 and the computing device 26. In one embodiment,the cloud-based computing system 28 may be accessible via the Internetor some other network. In some embodiments, the computing device 26 andthe cloud-based computing system may be in communication with the one ormore electronic locks 29.

After establishing a communication connection between the computingdevice 26 and the industrial automation equipment 16 (e.g., via anassociated control/monitoring device 14 or computing device of theindustrial automation equipment 16), the cloud-based computing system 28may receive data acquired by the computing device 26 and the industrialautomation equipment 16. After receiving this data, in one embodiment,the cloud-based computing system 28 may perform large-scale dataanalysis operations on the data, such that the operations may bedistributed over the computers that make up the cloud-based computingsystem 28.

In another embodiment, the cloud-based computing system 28 may forwardacquired data or analyzed data to different computing devices, variousindustrial automation equipment, or the like. As such, the cloud-basedcomputing system 28 may maintain a communication connection with variousindustrial automation equipment 16, computing devices 26, and the like.Additional details regarding the cloud-based computing system 28 will bediscussed below with reference to FIG. 4.

FIG. 3 is a block diagram of example components within the computingdevice 26 that is part of the communication network 30 of FIG. 2, inaccordance with embodiments presented herein. For example, the computingdevice 26 may include a communication component 35, a processor 36, amemory 37, a storage 38, input/output (I/O) ports 39, an image sensor 40(e.g., a camera), a location sensor 41, a display 42, additional sensors(e.g., vibration sensors, temperature sensors), and the like. Thecommunication component 35 may be a wireless or wired communicationcomponent that may facilitate communication between the industrialautomation equipment 16, the cloud-based computing system 28, electroniclocks 29, and other communication capable devices.

The processor 36 may be any type of computer processor or microprocessorcapable of executing computer-executable code. The processor 36 may alsoinclude multiple processors that may perform the operations describedbelow. The memory 37 and the storage 38 may be any suitable articles ofmanufacture that can serve as media to store processor-executable code,data, or the like. These articles of manufacture may representcomputer-readable media (e.g., any suitable form of memory or storage)that may store the processor-executable code used by the processor 36 toperform the presently disclosed techniques. Generally, the processor 36may execute software applications that include programs that enable auser to track and/or monitor operations of the industrial automationequipment 16 via a local or remote communication link. That is, thesoftware applications may communicate with the control/monitoring device14 and gather information associated with the industrial automationequipment 16 as determined by the control/monitoring device 14, viasensors disposed on the industrial automation equipment 16, and thelike.

The memory 37 and the storage 38 may also be used to store the data,analysis of the data, the software applications, and the like. Thememory 37 and the storage 38 may represent non-transitorycomputer-readable media (e.g., any suitable form of memory or storage)that may store the processor-executable code used by the processor 36 toperform various techniques described herein. It should be noted thatnon-transitory merely indicates that the media is tangible and not asignal.

In one embodiment, the memory 37 and/or storage 38 may include asoftware application that may be executed by the processor 36 and may beused to monitor, control, access, or view one of the industrialautomation equipment 16, as well as control the actuation of theelectronic locks 29. As such, the computing device 26 maycommunicatively couple to industrial automation equipment 16 or to arespective computing device of the industrial automation equipment 16via a direct connection between the two respective devices or via thecloud-based computing system 28. Also, the computing device 26 maycommunicatively couple to the electronic locks 29 via a directconnection between the two respective devices or via the cloud-basedcomputing system 28. Additionally, the memory 37 may be used to storethe processor executable instructions for determining when to actuatethe electronic locks 29. For example, the instructions may specify thatcredentials of the user are authorized and certain steps of thelockout-tagout procedures are completed prior to sending an actuationsignal to the electronic locks 29. In some embodiments, the instructionsalso may determine the location of the electronic locks 29 based onlocation information received from the electronic locks 29, among otherthings.

The I/O ports 39 may be interfaces that may couple to other peripheralcomponents such as input devices (e.g., keyboard, mouse), sensors,input/output (I/O) modules, and the like. I/O modules may enable thecomputing device 26 to communicate with the industrial automationequipment 16 or other devices in the industrial automation system viathe I/O modules.

The image sensor 40 may include any image acquisition circuitry such asa digital camera capable of acquiring digital images, digital videos, orthe like. The location sensor 41 may include circuitry designed todetermine a physical location of the computing device 26. In oneembodiment, the location sensor 41 may include a global positioningsystem (GPS) sensor that acquires GPS coordinates for the computingdevice 26. In another embodiment, the location sensor 41 may includeother circuitry such as a radio wave transmitter, an infrared sensor,and the like that may acquire data that may be used to determine alocation of the computing device 26 with respect to other industrialautomation equipment 16 or other fixtures in the industrial automationsystem. In certain embodiments, the computing device 26 may also includevarious other sensors that may provide additional data related to anenvironment in which the computing device 26 exists. For instance, theother sensors may include an accelerometer, a gas (e.g., smoke, carbonmonoxide) sensor, or the like.

The display 42 may depict visualizations associated with software orexecutable code being processed by the processor 36. In one embodiment,the display 42 may be a touch display capable of receiving inputs from auser of the computing device 26. As such, the display 42 may serve as auser interface to communicate with the industrial automation equipment16. The display 42 may be used to display a graphical user interface(GUI) for operating the industrial automation equipment 16, for trackingthe maintenance of the industrial automation equipment 16, performingvarious procedures (e.g., lockout-tagout, placing device offline,replacing component, servicing device) for the industrial automationequipment 16, and the like. Also, the display 42 may display thelocation and/or position of the electronic lock 29 and may displaynavigational directions to the electronic lock 29. The display 42 may beany suitable type of display, such as a liquid crystal display (LCD),plasma display, or an organic light emitting diode (OLED) display, forexample. Additionally, in one embodiment, the display 42 may be providedin conjunction with a touch-sensitive mechanism (e.g., a touch screen)that may function as part of a control interface for the industrialequipment 16. In some embodiments, the operator interface may becharacterized as the HMI 12, a human-interface machine, or the like.

Although the components described above have been discussed with regardto the computing device 26, it should be noted that similar componentsmay make up the control/monitoring device 14. Moreover, the computingdevice 26 may also be part of the industrial automation equipment 16,and thus may monitor and control certain operations of the industrialautomation equipment 16. Further, it should be noted that the listedcomponents are provided as example components and the embodimentsdescribed herein are not to be limited to the components described withreference to FIG. 3.

FIG. 4 is a block diagram of example components within the cloud-basedcomputing system 28 of the communication network 30 of FIG. 2, inaccordance with embodiments presented herein. As mentioned above, thecloud-based computing system 28 may include a number of computingdevices, such as servers 43 that may be communicatively coupled to eachother and may distribute various tasks between each other to perform thetasks more efficiently. In certain embodiments, each server 43 mayinclude the example components described above as part of the computingdevice 26 in FIG. 3.

The cloud-based computing system 28 may also have access to a number ofdatabases 44. The databases 44 may be related to various aspects of theindustrial automation system, the industrial automation equipment 16,the computing device 26, operators of the computing device 26 or theindustrial automation equipment 16, or the like. For example, thedatabases 44 may include information regarding procedures for operatingand/or maintaining the industrial automation equipment 16. Theprocedures, as such, may include steps to perform, tools to use,personal protective equipment to wear, and the like with regard to theoperations being performed.

The databases 44 may also include information regarding variousregulations related to how the industrial automation equipment 16 shouldbe maintained or operated. Additionally, the regulations may be relatedto how maintenance operations should be documented by the user of thecomputing device 26. The databases 44 may also include data related towarranty information for the industrial automation equipment 16, servicecontact information related to the industrial automation equipment 16,manuals for operating the industrial automation equipment 16, and otherinformation that may be useful to an operator of the industrialautomation equipment 16.

In certain embodiments, the cloud-based computing system 28 may alsoinclude access to various resources 46. The resources 46 may be aresource database or collection of published documents or webpages thatmay be related to the industrial automation equipment 16. As such, theresources 46 may be accessed by the cloud-based computing system 28available via the Internet or other communication networks. Thecloud-based computing system 28 may search or consult the resources 46to acquire data related to the industrial automation equipment 16. Forinstance, the resources 46 may provide information regarding productrecalls or safety concerns related to the industrial automationequipment 16, weather advisory notices for the industrial automationsystem, and the like. Additionally, the resources 46 may includehardware, software or firmware updates, software patches, vulnerabilitypatches, certificates, and the like.

FIG. 5 is a block diagram of example components of the electronic lock29, in accordance with embodiments presented herein. It should be noted,that the electronic lock 29 may include several similar components asthe computing device 26. For example, the electronic lock 29 may includea lock communication component 50, a lock processor 52, a lock memory54, a lock sensor 56, and a lock display 57. The lock communicationcomponent 50 may facilitate communicatively coupling to the computingdevice 26, the cloud-based computing system 28, and/or thecontrol/monitoring device 14. The lock communication component 50 may beprogrammed to communicate over any suitable wired and/or wirelessnetwork, such as Ethernet, WiFi, Bluetooth® Low Energy (BLE), ZigBee®,and so forth. In some embodiments, the lock communication component 50includes a transceiver enabled to receive and transmit data.

The lock processor 52 may be any type of computer processor ormicroprocessor capable of executing computer-executable code. The lockprocessor 52 may also include multiple processors that may perform theoperations described below. The lock memory 54 may be any suitablearticles of manufacture that can serve as media to storeprocessor-executable code, data, or the like. These articles ofmanufacture may represent computer-readable media (e.g., any suitableform of memory or storage) that may store the processor-executable codeused by the lock processor 52 to perform the presently disclosedtechniques. The lock memory 54 may also be used to store the data,analysis of the data, the software applications, and the like. The lockmemory 54 may represent non-transitory computer-readable media (e.g.,any suitable form of memory or storage) that may store theprocessor-executable code used by the lock processor 52 to performvarious techniques described herein. It should be noted thatnon-transitory merely indicates that the media is tangible and not asignal. Generally, the lock processor 52 may execute a softwareapplication that maintains a record of times in which the electroniclock 29 is opened and/or closed, identifies a person or user who mayhave operated the electronic lock 29, perform one or more preventativeactions (e.g., send alert or send signals to shut down the industrialautomation equipment 16) when the electronic lock 29 is being tamperedwith, and the like.

The lock sensor 56 may be used to detect users that are operating theelectronic lock 29 and/or are in the area where the industrialautomation equipment 16 is located. The lock sensor 56 may include areceiver circuit (e.g., radio-frequency identification (RFID) reader)that reads or detects a signal from a transmitter circuit (e.g., RFIDtag) in an access badge. The lock sensor 56 may be communicativelycoupled to the lock processor 52 and send signals to the lock processor52. The lock processor 52 may determine the identity of the user basedon the signals and log the users that access the electronic lock 29and/or the area including the industrial automation equipment 16. Insome embodiments, the lock sensor 56 may include a vibration sensorenabled to detect vibrations or a level sensor to detect angle, whichthe lock processor 52 may use to determine whether the electronic lock29 is being tampered with. For example, the lock processor 52 may have arange of expected vibration or level data associated with normal contactof the electronic lock 29. When the lock processor 52 receives vibrationdata that exceeds the range, the lock processor 52 may determine thatthe electronic lock 29 is being tampered with.

In some embodiments, the electronic lock 29 may also include the lockdisplay 57. The lock display 57 may include liquid crystals (e.g., aliquid-crystal display (LCD)), light emitting diodes (LEDs), orelectronic ink). In some embodiments, electronic ink may be used topreserve display during absence of an energy level of the power source60. The lock display 57 may display any suitable information stored inthe lock memory 54 and/or obtained from the computing device 26 and/orthe cloud-based computing system 28. For example, the lock display 57may display certain information related to tagging the industrialautomation equipment 16 after the equipment is locked out. That is, thelock display 57 may display an identity of a technician that locked theelectronic lock 29, a message (e.g., a warning not to unlock or tamperwith the electronic lock 29), and a timestamp of when the technicianlocked the electronic lock 29. Further, in some embodiments, the lockdisplay 57 may display a history of the timestamps at which theelectronic lock 29 was locked and unlocked as well as the identity ofthe technician who locked and unlocked the electronic lock 29. As may beappreciated, a physical tag or label may not be used in an embodimentwhere the electronic lock 29 uses the lock display 57 to display thetagging information. However, in some embodiments, a physical tag orlabel may be used in conjunction with the lock display 57 to display thetagging information.

In some embodiments, the electronic lock 29 may also include an alarm 58that is controlled by the lock processor 52. The alarm 58 may include aspeaker to emit an audible noise that may be used to indicate whenenergy of a power source 60 is below a threshold. Additionally, thealarm 58 may emit the noise when the electronic lock 29 is beingtampered with. In some embodiments, tampering may refer to theelectronic lock 29 being moved in an unexpected way, being disturbed,experiencing an unexpected change in temperature, being unable tocommunicate with other devices, and so forth. In some embodiments, thealarm 58 may include a light source enabled to display a certain lightcolor depending on the severity of the alarm-triggering event. The lightsource may include a light-emitting diode (LED), a laser, or the like.

In some embodiments, the power source 60 may store a charge and providepower for the electronic lock 29. The power source 60 may include apre-charged battery that is replaceable when the stored power isdepleted or a rechargeable battery that can be recharged using anothersource of power. In some embodiments, the power source 60 may includeany suitable number of batteries and combination of types of batteries(e.g., pre-charged or rechargeable). Further, in some embodiments, thepower source 60 may include an energy-harvesting device that collectsenergy from its environment. The energy-harvesting device may usevarious energy harvesting techniques that turn ambient light, heat,movement, and so forth into energy to charge the power source 60. Forexample, the energy-harvesting device may include a piezoelectricmaterial that enables converting kinetic energy (e.g., from vibration ofindustrial automation equipment 16) into electrical energy that can bestored by the power source 60. The energy-harvesting device may alsoinclude a thermoelectric energy harvesting device and/or an ambientlight-harvesting device. A thermoelectric energy-harvesting device maygenerate electricity in the presence of temperature differences betweensubstrate layers. Additionally, the power source 60 may include acontinuous source of alternating current (AC) power.

In some embodiments, the electronic lock 29 may include a beacon 62(e.g., Bluetooth® Low Energy) that may send location informationregarding the electronic lock 29 to the computing device 26 and/or anycommunicatively connected device. The beacon 62 may include electroniccircuitry that is capable of broadcasting a signal including thelocation information, position information, proximity to other devicesinformation, or some combination thereof. The signal may be received byother electronic devices listening at a certain frequency. In someembodiments, the electronic circuitry of the beacon 62 may be capable ofsending the signal directly to devices that are connected to the beacon62. The software application operating on the computing device 26 mayuse the location information to identify a particular position and/orlocation of the electronic lock 29. For example, in some embodiments,the beacon 62 may emit coordinates to its location (e.g., a uniqueidentifier indicative of physical location of the beacon 62), thelocation of the electronic lock 29, and/or the location of theindustrial automation equipment 16. In one embodiment, the lockprocessor 52 may use triangulation schemes to assist the computingdevice 26 in determining directions to the electronic lock 29 or theindustrial automation equipment 16. Triangulation schemes may includedetermining the location of the electronic lock 29 or the industrialautomation equipment 16 by measuring the angles to the electronic lock29 or the industrial automation equipment 16 from known points at theends of a fixed baseline (e.g., a wall of a facility, a line between twoother known points (other industrial automation equipment in thefacility)). In some embodiments, emitters may be strategically placed inthe facility for the purpose of finding the location of the electroniclock 29 or the industrial automation equipment 16 by broadcasting thelocation of the emitters for devices (e.g., computing device 26) toread. The location of the electronic lock 29 or the industrialautomation equipment 16 can be fixed as the third point of a trianglebased on known locations, such as the locations of the emitters. Asdescribed below, the location of the electronic device 29 may enable thecomputing device 26 to determine navigational directions to theelectronic lock 29 based on the signal provided by the beacon 62.

In some embodiments, the electronic lock 29 may include a lockingmechanism 64. The locking mechanism 64 may include mechanical componentsthat are moved via actuators controlled by the lock processor 52. Forexample, one such locking mechanism 64 may include a magnet and anadjustable cable. The lock processor 52 may send signals to the powersource 60 to supply current to the magnet so a magnetic field isgenerated that either attracts or repels the adjustable cable, which maybe made of a ferromagnetic material (e.g., metal, iron, or nickel),depending on whether the lock processor 52 is locking or unlocking theelectronic lock 29.

In some embodiments, the locking mechanism 64 may include gears thatmove the adjustable cable. In some embodiments, the gears may turn inresponse to a magnetic field generated by the magnet. Additionally, thelocking mechanism 64 may include a motor that moves the gears, which inturn move the adjustable cable. In some embodiments, the motor may bepowered by the power source 60 of the locking mechanism 64.

In some embodiments, the electronic lock 29 may include a camera 66. Thecamera 66 may be used to capture image/video data and send theimage/video data to the lock processor 52 for analysis. The lockprocessor 52 may use facial recognition techniques while analyzing theimage/video data to determine the identity of the user in theimage/video data and then log the identity of the user that isidentified and the date/time that the user was identified. As discussedabove, the identity of the user may be logged if the user is determinedto be accessing the electronic lock 29 and/or the area including theindustrial automation equipment 16.

Although the components described above have been discussed with regardto the electronic lock 29 that is separate from the industrialautomation equipment 16, it should be noted that the electronic lock 29may be integrated in the industrial automation equipment 16 and may bepart of the industrial automation equipment 16. In such an embodiment,the integral electronic lock 29 may include similar components describedabove. Further, it should be noted that the listed components areprovided as example components and the embodiments described herein arenot to be limited to the components described with reference to FIG. 5.

FIG. 6 is a diagrammatical representation of an electronic lock, inaccordance with embodiments presented herein. As depicted, theelectronic lock 29 includes the locking mechanism 64. The lockingmechanism 64 may include an adjustable cable 68 made of a ferromagneticmaterial and a magnet internal to the electronic lock. As shown by arrow70, the adjustable cable 68 may move up and down to unlock and lock theelectronic lock 29. That is, the magnet is used to pull the adjustablecable 68 down to a locked position and to push the adjustable cable 68up to an unlocked position. As previously discussed, the lock processor52 may instruct the power source 60 to supply current to the magnet togenerate a magnetic field to either attract or repel the adjustablecable 68.

Additionally, as mentioned above, in some embodiments, the lockingmechanism 64 may include gears and a small motor coupled to at least oneof the gears via a shaft. When the small motor is activated, the shaftmay rotate, thereby causing the gears to rotate. Depending on thedirection of rotation, the gears may pull the adjustable cable 68 downto the locked position or push the adjustable cable 68 up to theunlocked position. In yet another embodiment, the locking mechanism 64may include the magnet, gears, and the adjustable cable. The magneticfield generated by the supplied current may cause the gears to rotate ina desired direction, thereby moving the adjustable cable 68.

In some embodiments, the electronic lock 29 may include the lock display57, which may display certain information related to tagging theindustrial automation equipment 16 after the electronic lock 29 has beenlocked. As depicted, the lock display 57 shows the technicianresponsible for locking the electronic lock 29 (e.g., “John Smith”) andthe timestamp that the technician locked the electronic lock 29 (e.g.,Sep. 1, 2015 12:00 PM). It should be understood that the displayedinformation is illustrative only and not meant to limit the scope ofinformation presented by the lock display 57. For example, the lockdisplay 57 may display a message, such as a warning not to unlock ortamper with the electronic lock 29. Additionally, the lock display 57may display a history of timestamps when the electronic lock 29 waslocked and/or unlocked, as well as the technician responsible forlocking and/or unlocking the electronic lock 29. In some embodiments,the lock display 57 may display a reason why the electronic lock 29 waslocked. In some embodiments, the lock display 57 may display an alertwhen certain events occur (e.g., when the electronic lock 29 is beingtampered with). The alert may include changing the font color (e.g.,red), changing font size, changing background color, and so forth.

As discussed above, the camera 66 may be used to capture image/videodata. As depicted, the camera 66 may be located on a front panel of theelectronic lock 29 in proximity to the lock display 57. However, itshould be noted that the camera 66 and the lock display 57 may bearranged in any suitable location on the electronic lock 29. In someembodiments, the camera 66 may be used to capture image/video data whena user is locking and/or unlocking the electronic lock 29 (e.g., via thecomputing device 26). For example, the image/video data may be sent tothe lock processor 52, which may use facial recognition techniques whileanalyzing the image/video data to determine the identity of the user inthe image/video data and then log the identity of the user that isidentified and the date/time that the user was identified. As discussedabove, the identity of the user may be logged if the user is determinedto be accessing the electronic lock 29 and/or the area including theindustrial automation equipment 16.

In some embodiments, more than one user may request to actuate (e.g.,lock) the electronic lock 29. In some embodiments, the electronic lock29 may be locked after a first authorized user requests to lock theelectronic lock 29 (e.g., using a computing device 26). Then, whenadditional authorized users request to actuate the electronic lock 29(e.g., using a computing device 26) and the electronic lock 29 isalready actuated, an authorized user count may be incremented. In someembodiments, the authorized user count may be maintained by theprocessor 36 of the computing device 26 or the lock processor 52 of theelectronic lock 29. Also, the processor 36 and/or the lock processor 52may keep track of the identities of the users that request to lock theelectronic lock 29 and the timestamps the electronic lock 29 is locked.In some embodiments, the authorized user count may be displayed on thelock

FIG. 7 is a flow diagram of a method 72 for controlling actuation of theelectronic lock 29 of FIG. 6, in accordance with embodiments presentedherein. Although the following description of the method 72 is describedas being performed by the processor 36 of the computing device 26, itshould be noted that the method 72 may be performed by other processorsdisposed on other devices that may be capable of communicating with theelectronic lock 29, such as the cloud-based computing system 28, theindustrial automation equipment 16, the control/monitoring device 14, orother components associated with the industrial application 24. In someembodiments, the method 72 may be performed by the processor 52 of theelectronic lock 29. Additionally, although the following method 72describes a number of operations that may be performed, it should benoted that the method 72 may be performed in a variety of suitableorders and all of the operations may not be performed. It should beappreciated that the method 72 may be wholly executed by the computingdevice 26 or the execution may be distributed between the computingdevice 26 and/or the cloud-based computing system 28.

Referring now to the method 72, the processor 36 may receive (block 74)a request to place the industrial automation equipment 16 offlineaccording to the lockout-tagout procedures. The request may be receivedas input from the user, as a signal from the industrial automationequipment 16, the electronic lock 29, the control/monitoring device 14,the cloud-based computing system 28, other industrial automationequipment located in the facility, or the like. The processor 36 maydetermine (block 76) whether the user associated with the request isauthorized to place the industrial automation equipment 16 offline basedon credentials of the user. For example, the processor 36 may prompt theuser to enter an employee identification number, a username, or the likeand an associated password, and then verify the credentials in adatabase to determine the access rights associated with the credentials.In some embodiments, the processor 36 may use single sign-on (SSO) andalready possess the credentials from when the user entered them byinitially logging into the software. Also, the processor 36 may haveremembered the credentials of the user, thereby skipping over promptingthe user for the credentials. If the credentials of the user do not havesufficient access rights to place the industrial automation equipment 16offline, then the processor 36 may deny the request. Additionally, theprocessor 36 may disable certain features of the lockout-tagoutprocedures being displayed on the display 42 that are tied to themissing access rights by graying the procedures out and making theiricons/buttons inoperable, removing procedures from the graphical userinterface (GUI), or the like.

The processor 36 may also determine (block 78) whether certain steps ofa procedure (e.g., lockout-tagout) have been performed. That is, in someembodiments, the lockout-tagout procedures may specify that certainsteps are completed prior to physically locking the industrialautomation equipment 16. For example, locking out a machine may bespecified as being performed after upstream devices are powered down andcertain valves have been depressurized. When the user is authorizedand/or when the certain steps have been performed, the processor 36 maysend (block 80) an actuation signal to the electronic lock 29 to lock.In the above example, the processor 36 may send the actuation signal tothe electronic lock 29 when the upstream devices are powered down andthe certain valves are depressurized and the user is authorized.However, when the upstream devices are not powered down, the certainvalves are not depressurized, or the user is not authorized, theprocessor 36 may not send the actuation signal to the electronic lock29. In this way, the electronic lock 29 may be used for sequentialunlock permissions, sequential accessibility (ordering of tasks), usercredentials, and the like. As such, the electronic lock 29 may usemulti-factor authentication to create a soft virtual lock.

In some embodiments, the processor 36 determines whether the steps havebeen performed (e.g., upstream devices are powered down and/or thevalves are depressurized) in a number of ways. For example, theprocessor 36 may receive data input by the technician using atouch-screen display 42 or other input peripheral of the computingdevice 26 that indicates completion of the steps (e.g., powering downthe upstream devices and/or depressurizing the valves). In anotherexample, the processor 36 may determine that the steps are performedwhen a confirmation is received that indicates the upstream devices arepowered down or the valves are depressurized. For example, voltagemeters on a voltage bus may determine that the upstream devices arepowered down, and the voltage meters may send a confirmation messageindicating the same to the processor 36. Also, a controller thatcontrols the upstream devices may determine that the upstream devicesare powered down, and the controller may send a confirmation messageindicating the same to the processor 36. In addition, pressure sensorsmonitoring the valves may detect that the valves are depressurized andsend a confirmation message indicating the same to the processor 36. Insome embodiments, the data related to whether the steps (e.g., upstreamsystems are powered down and/or the valves are depressurized) arecomplete may be communicated to the cloud-based computing system 28 bythe processor 36, the voltage meter, the controller, the pressuresensor, and so forth. The processor 36 may receive the data related tocompletion of the steps (e.g., powering down of upstream devices and/ordepressurization of valves) from the cloud-based computing system 28. Itshould be noted that, in some embodiments, the processor 52 of theelectronic lock 29 may receive the data related to whether the steps areperformed from the cloud-based computing system 28 and/or the individualcomponents (e.g., the processor 36 of the computing device 26, thevoltage meter, the controller, the pressure sensor) that send the datato the processor 36, as described above.

FIG. 8 is a flow diagram of a method 82 for logging information relatedto operation of the electronic lock 29, in accordance with embodimentspresented herein. Although the following description of the method 82 isdescribed with reference to the processor 52 of the electronic lock 29,it should be noted that the method 82 may be performed by otherprocessors disposed on other devices that may be capable ofcommunicating with the electronic lock 29, such as the computing device26, the cloud-based computing system 28, the industrial automationequipment 16, the control/monitoring device 14, or other componentsassociated with the industrial application 24. Additionally, althoughthe following method 82 describes a number of operations that may beperformed, it should be noted that the method 82 may be performed in avariety of suitable orders and all of the operations may not beperformed. It should be appreciated that the method 82 may be whollyexecuted by the processor 52 of the electronic lock 29 or the executionmay be distributed between the processor 52 of the electronic lock 29and/or the processor 36 of the computing device 26.

Referring now to the method 82, the processor 52 may receive (block 83)an actuation signal to lock or unlock. The actuation signal may bereceived from the computing device 26, the cloud-based computing system28, the control/monitoring device 14, or the like. The processor 52 maystore (block 84) a record of times that the electronic lock 29 is opened(e.g., unlocked) and closed (e.g., locked) in the memory 54. The timesmay enable tracking whether there are certain times of the day that theelectronic lock 29 is locked more often than other times, which mayindicate trends and enable troubleshooting by focusing attention onthose times. The processor 52 may also detect (block 86) a user thataccessed the electronic lock 29 and/or the area of the facilityincluding the industrial automation equipment 16. As described above,the user may be detected by using the sensor 56 and/or the camera 66 andthe processor 52 may determine the identity of the user. The processor52 may also store (block 88) the identity of the user that access theelectronic lock 29 and/or the area of the facility including theindustrial automation equipment 16. As such, the processor 52 virtuallytags the electronic lock 29 by storing the user that is responsible forlocking the lock 29 and the time at which the lock 29 was locked. Theidentified user may be indicated on the display 57. Storing ordisplaying this information may avoid use of traditional physical tags.The computing device 26 can contact the electronic lock 29 at any timeand request the tagged information to determine who locked theelectronic lock 29 and when the person locked the lock 29. Storing(block 88) information regarding the user that accesses the lock 29and/or the area of the facility including the industrial automationequipment 16 may also include sending the identity of the userresponsible for locking the lock 29 and the time at which the lock 29was locked to the cloud-based computing system 28 for storage. In someembodiments, any computing device 26 in communication with thecloud-based computing system 28 may receive the stored information fromthe cloud-based computing system 28 to view as virtual tags onrespective industrial automation equipment 16 located in the facility ina visualization depicted on the display 42.

FIG. 9 is a flow diagram of a method 90 for performing a preventativeaction based on whether the electronic lock 29 of FIG. 6 is beingtampered with, in accordance with embodiments presented herein. Althoughthe following description of the method 90 is described with referenceto the processor 52 of the electronic lock 29, it should be noted thatthe method 90 may be performed by other processors disposed on otherdevices that may be capable of communicating with the electronic lock29, such as the computing device 26, the cloud-based computing system28, the industrial automation equipment 16, the control/monitoringdevice 14, or other components associated with the industrialapplication 24. Additionally, although the following method 90 describesa number of operations that may be performed, it should be noted thatthe method 90 may be performed in a variety of suitable orders and allof the operations may not be performed. It should be appreciated thatthe method 90 may be wholly executed by the electronic lock 29 or theexecution may be distributed between the electronic lock 29 and/or thecomputing device 26.

Referring now to the method 90, the processor 52 may determine (block92) whether the electronic lock 26 is being tampered with. That is, theprocessor 52 may receive signals from the sensor 56 that are indicativeof tampering. For example, one sensor 56 may include a temperaturesensor and may send signals to the processor 52 that indicate theelectronic lock 29 increasing or decreasing in temperature at a rateabove some threshold. In another example, the sensor 56 may include avibration sensor that provides signals indicating that the electroniclock 29 is vibrating greater than some threshold. Further, theimage/video data obtained by the camera 66 may be used by the processor52 to determine that the electronic lock 29 is being tampered with. Theprocessor 52 may perform (block 94) one or more preventative actionswhen the processor 52 determines that the electronic lock 29 is beingtampered with. The preventative actions may include the processor 52triggering the alarm 58 to emit an audible noise and/or colored light,sending an alert notification to an appropriate device (e.g., thecomputing device 26, the cloud-based computing system 28, and/or thecontrol/monitoring device 28), sending command signals to shut down theindustrial automation equipment 16 or any other equipment in thefacility, logging the identity of the user identified in the image/videodata captured by the camera 66 or read by the RFID reader, and so forth.

FIG. 10 is a flow diagram of a method 96 for using location informationfrom the electronic lock 29 of FIG. 4 to determine directions to theelectronic lock 29, in accordance with embodiments presented herein.Although the following description of the method 96 is described withreference to the processor 36 of the computing device 26, it should benoted that the method 96 may be performed by other processors disposedon other devices that may be capable of communicating with theelectronic lock 29, such as the cloud-based computing system 28, theindustrial automation equipment 16, the control/monitoring device 14, orother components associated with the industrial application 24.Additionally, although the following method 96 describes a number ofoperations that may be performed, it should be noted that the method 96may be performed in a variety of suitable orders and all of theoperations may not be performed. It should be appreciated that themethod 96 may be wholly executed by the computing device 26 or theexecution may be distributed between the computing device 26 and/or thecloud-based computing system 28.

Referring now to the method 96, the processor 36 may receive (block 98)location information from the electronic lock 29. The locationinformation may be sent from the communication component 50, such as abeacon, and the location information may indicate the location and/orposition of the electronic lock 29 on the industrial automationequipment 16. The processor 36 may determine (block 100) the locationand/or position of the electronic lock 29 based on the locationinformation. Further, the processor 36 may determine (block 102)navigational directions to the electronic lock 29. In some embodiments,the directions may begin from the location of the computing device 26and end at the location of the electronic lock 29. The processor 36 maydisplay (block 104) the directions on the display 42. As such, thecomputing device 26 may enable easily locating, servicing, and/orreplacing the electronic lock 29 when desired.

It should be noted that the methods 82 and 90 are performed using theprocessor 52 that is part of the electronic lock 29 and the methods 72and 96 are performed by the processor 36 of the computing device 26. Theelectronic lock 29 and the computing device 26 are configured to executeinstructions that enable each device to interact with the industrialautomation equipment 16. As such, the electronic lock 29 and thecomputing device 26 are tied to particular machines to assist in themanagement and operations of the industrial automation equipment 16, andthus, the industrial application 24. Moreover, it should be noted thatthe data received by the electronic lock 29, the computing device 26,the cloud-based computing system 28, the industrial automation equipment16, or the control/monitoring device 14 may be transformed when beingtransmitted, analyzed, or depicted for view by a user of the respectivedevice. For example, the tampering alert generated based on signalsreceived from the sensors 56 and/or image/video data received fromcamera 66 includes a transformation of the sensor data signals and/orimage/video data to the alert. Also, the directions generated based onthe location data from the electronic lock 29 include a transformationof the location information to navigational directions. Further, theactuation signal generated by the computing device 26 after multi-factorauthentication enables controlling the industrial automation equipment16.

FIG. 11 is a flow diagram of a method 110 for controlling deactivationof the electronic lock 29 of FIG. 6, in accordance with embodimentspresented herein. Although the following description of the method 110is described with reference to the processor 36 of the computing device26, it should be noted that the method 110 may be performed by otherprocessors disposed on other devices that may be capable ofcommunicating with the electronic lock 29, such as the cloud-basedcomputing system 28, the industrial automation equipment 16, thecontrol/monitoring device 14, or other components associated with theindustrial application 24. For example, in some embodiments, the method110 may be performed by the lock processor 52. Additionally, althoughthe following method 110 describes a number of operations that may beperformed, it should be noted that the method 110 may be performed in avariety of suitable orders and all of the operations may not beperformed. It should be appreciated that the method 110 may be whollyexecuted by the computing device 26 or the execution may be distributedbetween the computing device 26 and/or the cloud-based computing system28.

Referring now to the method 110, the processor 36 may receive (block112) a request to deactivate (e.g., unlock) the locking mechanism 64 ofthe electronic lock 29 that is currently in a locked state (e.g.,preventing the industrial automation equipment 16 from beingoperational). The request may be received as input from the user, as asignal from the industrial automation equipment 16, the electronic lock29, the control/monitoring device 14, the cloud-based computing system28, other industrial automation equipment located in the facility, orthe like. The processor 36 may determine (block 114) whether the userassociated with the request is authorized to place the industrialautomation equipment 16 online based on credentials of the user. Forexample, the processor 36 may prompt the user to enter an employeeidentification number, a username, or the like and an associatedpassword, and then verify the credentials in a database to determine theaccess rights associated with the credentials. In some embodiments, theprocessor 36 may use single sign-on (SSO) and already possess thecredentials from when the user entered them by initially logging intothe software. Also, the processor 36 may have remembered the credentialsof the user, thereby skipping over prompting the user for thecredentials. If the credentials of the user do not have sufficientaccess rights to place the industrial automation equipment 16 online,then the processor 36 may deny the request and not decrement theauthorized user count, discussed above in FIG. 7.

When the credentials of the user have sufficient access rights to placethe industrial automation equipment 16 online, then the processor 36 maydecrement (block 116) the authorized user count. In some embodiments,the processor 36 may check the actuation state (e.g., locked orunlocked) of the locking mechanism 64 before decrementing the authorizeduser count. In some embodiments, the processor 36 may not send adeactivation signal until the authorized user count reaches a desiredvalue (e.g., zero). Thus, the processor 36 may receive additionalrequests to deactivate the electronic lock 29 (shown by dotted line 118)until the authorized user count is decremented to zero. To illustrate,if the authorized user count is set to three, then three requests todeactivate the electronic lock 29 may cause the authorized user count tobe decremented to zero. As a result, the processor 36 may send (block120) a deactivation signal to the electronic lock 29 when the authorizeduser count is zero.

Technical effects of the embodiments described herein include using anelectronic lock 29 that enables virtually tagging and locking industrialautomation equipment 16 from a connected device, such as the computingdevice 26. The software running on the computing device 26 may generatean actuation signal after certain credential and/or status checks areperformed. Also, information related to the user who operates theelectronic lock 29 and the time at which the lock 29 was operated may belogged (e.g., virtually tagged) by the electronic lock 29. Also, theelectronic lock 29 may provide location information to the computingdevice 26 so the computing device 26 may locate and/or providedirections to the electronic lock 29. Further, the electronic lock 29may determine when it is being tampered with and perform one or morepreventative actions. In addition, displaying tagging information (e.g.,identity of technician responsible for locking the electronic lock 29,timestamp of locking the electronic lock 29) using the display 57 on theelectronic lock 29 avoids the use of traditional physical tags. Althoughthe above system and techniques are described with regard to theindustrial application 24, it should be understood that the system andtechniques may apply to any industry, such as pharmaceutical, oil andgas, food and beverage, and so forth.

In the preceding specification, various embodiments have been describedwith reference to the accompanying drawings. It will, however, beevident that various modifications and changes may be made thereto, andadditional embodiments may be implemented, without departing from thebroader scope of the present disclosure as set forth in the claims thatfollow. The specification and drawings are accordingly to be regarded inan illustrative rather than restrictive sense.

The invention claimed is:
 1. A non-transitory computer readable mediumcomprising computer-executable instructions that, when executed by aprocessor, are configured to cause the processor to: receive a first setof data associated with a user; receive a second set of data associatedwith one or more lockout procedures performed by the user; receive arequest to actuate a locking mechanism of an electronic lock configuredto prevent a machine in an industrial automation application from beingoperational; and send a signal to the electronic lock to actuate thelocking mechanism when the second set of data indicates that the lockoutprocedures have been performed by the user and the data corresponds toan authorized user.
 2. The computer readable medium of claim 1, whereinthe instructions, when executed by the processor, are configured tocause the processor to not send the signal when the lockout procedureshave not been performed or the data does not correspond to theauthorized user.
 3. The computer readable medium of claim 1, wherein theinstructions, when executed by the processor, are configured to causethe processor to receive location information from the electronic lockand determine a location, a position, or both the location and theposition of the electronic lock based on the location information. 4.The computer readable medium of claim 1, wherein the instructions, whenexecuted by the processor, are configured to cause the processor to:receive an additional request to actuate the locking mechanism of theelectronic lock from an authorized user; and increment an authorizeduser count when the locking mechanism is already locked.
 5. The computerreadable medium of claim 1, wherein the computer instructions, whenexecuted by the processor, are configured to cause the processor to:receive a request from an authorized user to deactivate the lockingmechanism of the electronic lock when the locking mechanism is locked;decrement an authorized user count; and send a signal to the electroniclock to deactivate the locking mechanism when the authorized user countis zero.
 6. The computer readable medium of claim 3, wherein theinstructions, when executed by the processor, are configured to causethe processor to: determine navigational directions to the electroniclock based on the location; and display the navigational directions on adisplay.
 7. The computer readable medium of claim 1, wherein theinstructions, when executed by the processor, are configured to causethe processor to send a request for log data to the electronic lock,wherein the log data comprises: a record of times when the electroniclock has been locked and unlocked; one or more identities of one or moreusers associated with operating the electronic lock for each respectivetime; or both.
 8. The computer readable medium of claim 1, wherein theinstructions, when executed by the processor, are configured to causethe processor to enable certain functionalities on a graphical userinterface when the lockout procedures are performed by the user and thedata corresponds to the authorized user.
 9. The computer readable mediumof claim 1, wherein the instructions, when executed by the processor,are configured to cause the processor to wirelessly communicate directlywith the electronic lock.
 10. The computer readable medium of claim 1,wherein the instructions, when executed by the processor, are configuredto cause the processor to disable one or more functionalities of agraphical user interface when the lockout procedures are not performedby the user or the data does not correspond to the authorized user. 11.A system, comprising: an electronic lock, comprising: a first processorconfigured to receive an actuation signal; a power source; and a lockingmechanism configured to physically lock out a machine from beingoperational; and a computing device comprising a second processorconfigured to send the actuation signal to the electronic lock, whereinthe actuation signal is configured to cause the locking mechanism toactuate when one or more access rights associated with the electroniclock correspond to one or more credentials of a user and one or moresteps of a lockout-tagout procedure have been performed.
 12. The systemof claim 11, wherein the electronic lock comprises a display configuredto display information using electronic ink.
 13. The system of claim 12,wherein the first processor is configured to cause the power source tosupply current to a magnet to attract or repel an adjustable cable tolock or unlock the locking mechanism.
 14. The system of claim 11,wherein the power source comprises a pre-charged battery, a rechargeablebattery, an energy-harvesting device, a continuous power source, or somecombination thereof.
 15. The system of claim 14, wherein theenergy-harvesting device is configured to convert motion, ambient light,thermal differences, or some combination thereof into electrical energy.16. The system of claim 11, wherein the first processor is configured tostore a record of times when the electronic lock is locked and unlocked,determine a user who operated the electronic lock at the respectivetimes, and store an identity of the user.
 17. The system of claim 11,wherein the electronic lock comprises a radio-frequency identificationreader configured to receive a radio-frequency identification tagassociated with a user that is operating the electronic lock.
 18. Thesystem of claim 11, wherein the first processor is configured todetermine whether the electronic lock is subject to tampering andperform one or more actions when the electronic lock is subject totampering, wherein the one or more actions comprise sending one or moresignals to shut down the machine or another machine in a facility havingthe machine and the another machine, send an alert notification to thecomputing device, trigger an alarm of the electronic lock, or somecombination thereof.
 19. The system of claim 11, wherein the electroniclock comprises a display that is configured to display informationrelated to an identity of the user and a timestamp at which theelectronic lock is actuated.
 20. An electronic lock configured tophysically lock out a machine from being operational, comprising: alocking mechanism; a processor configured to perform an action when theelectronic lock is subject to tampering; a transceiver configured toreceive an actuation signal configured to actuate the locking mechanismand to send data associated with the locking mechanism to a cloud-basedcomputing system; and a memory configured store the data associated withthe locking mechanism.
 21. The electronic lock of claim 20, wherein thedata associated with the locking mechanism comprises a record of one ormore times when the locking mechanism was locked and unlocked, one ormore identities of users that operated the locking mechanism, or both.22. The electronic lock of claim 20, wherein the actuation signal issent from a processor of a computing device when the processordetermines that one or more steps of a lockout-tagout procedure havebeen performed and a user requesting to lock the electronic lock is anauthorized user.