Portal system for a controlled space

ABSTRACT

Systems, devices, and methods are provided for monitoring and tracking an item in a controlled space. In one embodiment, a portal system that monitors the controlled space includes a radio frequency tag that is attached to inventory and a portal device, which includes a computing device, a receiver and a locking door. The receiver is configured to receive a signal from radio frequency tag, and send the signal to the computing device. The locking door is coupled to the computing device. The computing device is configured to verify whether the user is authorized to be taking inventory in and out of the controlled space through the locking door based on the received signal, and to unlock the locking door based on the received signal. The computing device has a database that includes the total value of the inventory that the user has taken out of the controlled space. The computing device determines whether the user have exceeded a threshold value of inventory based on the total value of inventory that the user has taken out of the controlled space, and provides a notification signal to an administrator based on the total value of inventory.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. patent application Ser. No.11/969,350, filed on Jan. 4, 2008, entitled “Portal System for aControlled Space,” which is a continuation of U.S. patent applicationSer. No. 10/990,907, filed on Nov. 17, 2004 entitled “Portal System forA Controlled Space” and which claims the benefit of U.S. provisionalpatent application entitled “A System for Tracking Inventory” filed onApr. 23, 2004 and accorded Ser. No. 60/565,089, which is entirelyincorporated herein by reference.

TECHNICAL FIELD

The present invention is generally related to monitoring and trackingobjects and items, and more particularly, to systems, devices andmethods for monitoring and tracking objects and items in a controlledspace.

BACKGROUND OF THE DISCLOSURE

Companies typically have difficulties tracking inventory items and theirusage within their facilities. Many inventory items are misused,misplaced, and improperly tracked and replenished by the employees ofthe companies. Therefore, companies have incentives to track the items,hold employees responsible for missing items, properly account costs,and replenish the missing items based on demand. Typically items of theinventory are kept in a controlled space that is monitored. Somecompanies have used locking doors with keypads that allow only employeeswith authorized code to enter the controlled space. In addition,computers and bar code tags have been used to track the items in and outof the controlled space. However, these systems still lack trackinginformation, cost accounting information, security methods, andreplenishment information in the process of tracking and monitoring theitems stored in the controlled space and linking the responsibleemployee with the items being taken in and out of the controlled space.Therefore, from the above, it can be appreciated that it would bedesirable to have a system, device and method for monitoring andtracking items stored in a controlled space.

SUMMARY OF THE INVENTION

The present invention provides systems, devices and methods formonitoring and tracking an item in the controlled space. Brieflydescribed, in architecture, one embodiment of the system, among others,can be implemented as follows. A portal system that monitors acontrolled space includes a radio frequency tag that is attached to anitem in inventory and a portal device, which includes a computingdevice, a receiver and a locking door. The item is typically materialthat is used to make or maintain a product (e.g., aircraft, automotiveparts, facilities, etc.). The item can be, for example but not limitedto, a rivet gun, screwdriver, gage, spare part, fluids, etc. Thereceiver is configured to receive signals from the radio frequency tag,and send the signal to the computing device. The locking door is coupledto the computing device. The computing device is configured to verifywhether the user is authorized to be taking inventory in and out of thecontrolled space through the locking door based on the received signals.The computing device is configured to lock and unlock the locking doorbased on the determination that the user is authorized.

In another embodiment, the computing device has a user database inmemory. The user database includes a total value of inventory that theuser has taken out of the controlled space. The computing devicedetermines whether the user and/or the cost center have exceeded athreshold value of inventory based on the total value of inventory thatthe user has taken out of the controlled space. The computing device isconfigured to provide a notification signal, such as an electronicreporting, to an administrator based on the total value of inventorythat the user has taken out of the controlled space. The notificationsignal indicates that the budget usage of the inventory has exceeded athreshold value.

In another embodiment, a portal device that monitors a controlled spaceincludes a computing device and a locking door. The computing device iselectrically coupled to a graphical user interface, which is locatedoutside the controlled space. The locking door is coupled to thecomputing device, which is configured to lock and unlock the lockingdoor based on code inputted by a user through the graphical userinterface upon entering and exiting the controlled space.

In another embodiment, a method of monitoring a controlled spaceincludes the steps of receiving data from a user via a graphical userinterface located outside of the controlled space; determining whetherthe user is authorized to unlock a locking door based on the receiveddata; unlocking the locking door based on the received data; andtracking inventory based on the received data when the user enters andexits the controlled space.

In another embodiment, a method of monitoring a controlled spaceincludes the steps of receiving data from a user that identifies theuser; associating the user with a total value of inventory that the userhas taken out of the controlled space; determining whether the user isauthorized to unlock a locking door based on the received data;determining whether the user has exceeded a threshold value of inventorybased on the total value of inventory; unlocking the locking door basedon the received data; and providing a notification signal based on thetotal value of inventory associated to the user.

In another embodiment, a method of monitoring a controlled spaceincludes the steps of receiving a signal from a radio frequency tag, theradio frequency tag being attached to a user; determining whether thesignal from the radio frequency tag authorizes the user to be takinginventory in and out of the controlled space; and unlocking a lockingdoor based on the signal from the radio frequency tag that is attachedto the user.

Other systems, methods, features, and advantages of the presentinvention will be or become apparent to one with skill in the art uponexamination of the following drawings and detailed description. It isintended that all such additional systems, methods, features, andadvantages be included within this description, be within the scope ofthe present invention, and be protected by the accompanying claims.

BRIEF DESCRIPTION OF THE DRAWINGS

Many aspects of the invention can be better understood with reference tothe following drawings. The components in the drawings are notnecessarily to scale, emphasis instead being placed upon clearlyillustrating the principles of the present invention. Moreover, in thedrawings, like reference numerals designate corresponding partsthroughout the several views.

FIG. 1 is a perspective view of a portal system.

FIG. 2 is a schematic view of the portal system shown in FIG. 1.

FIG. 3 is a block diagram of the computing device shown in FIGS. 1 and2.

FIG. 4 is a block diagram of an embodiment of a database maintained inthe memory of the computing device shown in FIG. 3.

FIG. 5 is a block diagram of an embodiment of the database shown in FIG.4.

FIG. 6 is a flow diagram that illustrates an embodiment of operation ofthe portal system shown in FIG. 1.

FIG. 7 is a flow diagram that illustrates an embodiment of operation ofthe portal system shown in FIG. 1.

FIG. 8 is a flow diagram that illustrates an embodiment of operation ofan inventory manager of the computing device shown in FIG. 3.

FIG. 9 is a flow diagram that illustrates an embodiment of operation ofan inventory manager of the computing device shown in FIG. 3.

DETAILED DESCRIPTION OF THE DISCLOSURE

Disclosed herein are systems, devices, and methods that monitor acontrolled space and track materials or items in inventory carried orotherwise transported in and out of the controlled space. Referring nowin more detail to the figures in which like reference numerals identifycorresponding parts, FIG. 1 is a perspective view of an embodiment of aportal system that tracks and monitors the items in a controlled space.The portal system 1 includes a portal device 12 and radio frequency tag14, 16. The portal device 12 includes a left section 7, a top section 8,and a right section 9. The ends of the top section 8 are fixedly coupledto the top ends of the left and right sections 7, 9. The portal device12 is placed at an entrance or exit of the controlled space (not shown),typically outside of the entrance or exit of the controlled space.

The portal device 12 is coupled to a locking door 3, typically betweenthe portal device 12 and the controlled space. The locking door 3prevents a user that is not authorized from entering and exiting thecontrolled space. The portal device 12 forms a portal area 17 that theuser enters and interacts with the portal device 12 to unlock thelocking door 3. The portal area 17 is typically between the left section7 and right section 9 of the portal device 12. The portal area 17 is anarea that the portal device 12 can receive data from the user eitherwirelessly via radio frequency tag 14 or mechanically via a graphicaluser interface 4.

The portal device 12 includes an electro-magnetic lock 10 that isfixedly coupled to the portal device 12. More particularly, theelectro-magnetic lock 10 is fixedly coupled to the back of the leftsection 7 of the portal device 12 to engage the locking door 3 such thatthe lock 10 can lock or unlock the locking door 3. It should be notedthat the electro-magnetic lock 10 can be fixedly coupled anywhere on theportal device 12 so long that the electro-magnetic lock 10 engages thelocking door 3.

The portal device 12 includes two presence sensing mats 6A-B that areplaced at or near the portal area 17. One presence sensing mat 6A isfixedly coupled to the floor between the left section 7 and rightsection 9 of the portal device 12. Another presence sensing mat 6B isfixedly coupled to the floor behind the locking door 3 and in thecontrolled space. The presence sensing mat 6 determines whether the userand inventory are entering or exiting the controlled space. For example,when the user enters the controlled space, the presence sensing mat 6Aon the floor between sections 7, 9 detects the user entering the portalarea 17. When the user is verified by the portal device 12 that the useris authorized to enter, the presence sensing mat 6B located behind thelocking door 3 and in the controlled space verifies that the user hasentered the controlled space. When the user exits the controlled space,the presence sensing mat 6A located between the sections 7, 9 of theportal device 12 detects the user exiting the controlled space andverifies that the user has exited the portal area 17 of the portaldevice 12 and out of the controlled space.

The left section 7 of the portal device 12 includes a computing device2, antenna 5A, and user graphical interface 4. The computing device 2 islocated inside the left section 7 of the portal device 12. The antenna5A and user interface 4 are fixedly coupled on the right of the section7. The right section 9 of the portal device 12 includes antenna 5B thatis fixedly coupled on the left of the section 9 and an unlock button 54that is fixedly coupled on the back of the section 9.

The top section 8 of the portal device 12 includes an antenna 5C that isfixedly coupled to the bottom of the top section 8. The antennas 5A-C,presence sensing mats 6A-B, and the user interface 4 are positioned inthe portal area 17 so that the user can interact with these componentsas the user enters the portal device 12. The portal area 17 is the areathat the antennas 5A-C and presence sensing mats 6A-B can detect theuser and radio frequency tags 14, 16, typically between the left section7 and right section 9 of the portal device 12.

The portal system 1 also includes radio frequency tags, particularlyuser tag 14 and inventory tag 16. The user tag 14 is typically attachedto a user and the inventory tag 16 is typically attached to inventory,which is stored in the controlled space. When the user brings theinventory into the controlled space, the user goes into the portal area17 to interact with the portal device 12. The user tag 14 attached tothe user transmits a signal that indicates the identification of theuser and the inventory tag 16 attached to the inventory transmits asignal that indicates the identification of the inventory. The portaldevice 12 wirelessly receives signals from the user tag 14 and theinventory tag 16 via antennas 5A-C of sections 7, 8, 9 of the portaldevice 12.

It should be noted that the electrical components, such as the antennas5A-C, presence sensing mats 6A-B, computing device 2, electro-magneticlock 10, antennas 5A-C and user interface 4 can be rearranged andpositioned anywhere on the portal device 12 other than the locationshown in FIG. 1 and described above. For example, the user interface canbe rearranged to be positioned in front of left section 7 of the portaldevice or on the left side of the right section 9 of the portal device.

In an alternative embodiment, the computing device 2 can be located in aremote location away from the portal device 12. In another alternativeembodiment, the portal system 1 can include a second user interface thatis located inside the controlled space so that the user can interactwith the second user interface before the user exits the controlledspace. In yet another alternative embodiment, the portal system 1 caninclude a second portal area inside the controlled space in which thesecond portal area is monitored by antennas 5 and presence sensing mat6.

FIG. 2 is an exemplary schematic view of a portal device 12 thatcommunicates with a user tag 14 and an inventory tag 16 as shown inFIG. 1. The portal device 12 includes a computing device 2 that iselectrically coupled to one or more graphical user interfaces 4, one ormore receivers 22, one or more presence sensing mats 6A-B, door 3 andlock 10. The receiver 22 is electrically coupled to one or more antennas5A-C that wirelessly receive signals from radio frequency tags 14, 16that are attached to the user and to the inventory. The computing device2 receives the radio frequency signals from the receiver 22. Thecomputing device 2 tracks and monitors the user and inventory based onthe radio frequency signals.

The computing device 2 is configured to lock or unlock the door 3 viathe lock 10 based on data entered by a user through the graphical userinterface 4 upon entering the controlled space. In an alternativeembodiment, the computing device is configured to lock or unlock thedoor 3 via the lock 10 based on data received from the signals receivedfrom the user tag 14, the inventory tag 16, and the presence sensing mat6.

The computing device 2 can determine from the radio frequency signal ofthe user radio frequency tag whether the user is authorized to enter andexit the controlled space. Further, the user may be required to enter acode through the graphical user interface along with having a user radiofrequency tag to determine whether the user is authorized to enter orexit the controlled space. The computing device 2 can determine whetherthe user has exceeded a threshold value of inventory based on the totalvalue of inventory that the user has taken out of the controlled space.The computing device 2 can provide a notification signal to anadministrator based on the total value of inventory.

The presence sensing mat 6 detects the user exiting and entering thecontrolled space. The presence sensing mat 6 is configured to transmit amotion signal to the computing device 2 indicating whether the user andthe inventory are exiting or entering the controlled space. Based on themotion signal of the presence sensing mat 6 and the signals from theradio frequency tags 14, 16, the computing device 2 can monitor andtrack which inventory the user has taken in and out of the controlledspace.

In an alternative embodiment, the portal device 12 can be connected to aremote computing device 28 via a network 26 so that the portal device 12can communicate with the remote computing device 28. The remotecomputing device 28 can transmit new or updated user information, costaccount information, security information, replenishment information,and inventory information to the portal device 12. The computing device2 can transmit monitored and tracked information to the remote computingdevice 28 so that the information can be stored at a second location.

FIG. 3 is a block diagram illustrating an exemplary architecture for thecomputing device 2 shown in FIG. 1. As indicated in FIG. 3, thecomputing device 2 comprises a processing device 18, memory 11, one ormore user interface devices 30, one or more I/O devices 19, and one ormore networking devices 21, each of which is connected to a localinterface 20. The processing device 18 can include any custom made orcommercially available processor, a central processing unit (CPU) or anauxiliary processor among several processors associated with thecomputing device 2, a semiconductor based microprocessor (in the form ofa microchip), or a macroprocessor. The memory 11 can include any one ora combination of volatile memory elements (e.g., random access memory(RAM, such as DRAM, SRAM, etc.)) and nonvolatile memory elements (e.g.,ROM, hard drive, tape, CDROM, etc.).

The one or more user interface devices 30 comprise those components withwhich the user (e.g., administrator) can interact with the computingdevice 2. Where the computing device 2 comprises a server computer orsimilar device, these components can comprise those typically used inconjunction with a PC such as a keyboard and mouse.

The one or more I/O devices 19 comprise components used to facilitateconnection of the computing device 2 to other devices and therefore, forinstance, comprise one or more serial, parallel, small system interface(SCSI), universal serial bus (USB), or IEEE 1394 (e.g., Firewire™)connection elements. The networking devices 21 comprise the variouscomponents used to transmit and/or receive data over a network 26, whereprovided. By way of example, the networking devices 21 include a devicethat can communicate both inputs and outputs, for instance, amodulator/demodulator (e.g., modem), a radio frequency (RF) or infrared(IR) transceiver, a telephonic interface, a bridge, a router, as well asa network card, etc.

The memory 11 normally comprises various programs (in software and/orfirmware) including an operating system (O/S) 13 and an inventorymanager 15. The O/S 13 controls the execution of programs, including theinventory manager 15, and provides scheduling, input-output control,file and data management, memory management, and communication controland related services. The inventory manager 15 facilitates the processfor monitoring and tracking of inventory and a user. Operation of theinventory manager 15 is described in relation to FIGS. 8 and 9.

The memory 11 further includes user database 53, cost center database59, and inventory database 61. The databases 53, 59, 61 facilitate thecomputing device 2 to determine whether the user are authorized to enteror exit the controlled space. The databases 53, 59, 61 furtherfacilitates the computing device 2 to associate the inventory and costof the inventory with the cost centers and the user as the user takesthe inventory into and out of the controlled space. The databases 53,59, 61 are described in relation to FIGS. 4 and 5.

FIG. 4 is high-level example of databases stored in memory shown in FIG.3. The databases in memory 11 (FIG. 3) include user database 53, costcenter database 59, and inventory database 61. Each database is linkedto each other. For example, the user database 53 is linked to centerdatabase 59 and inventory database 61. The cost center database 59 islinked to user database 53 and inventory 61. The inventory database 61is linked to cost center database 59 and user database 53.

The databases 53, 59, 61 provide information about the user, inventory,departments, work cells, shifts, costs, etc. For example, the userdatabase 53 has information about the user, the department that the useris in, the shift the user works, the work cell the user is in, the totalcharged value of the inventory that the user takes out of the controlledspace, the total credited value of the inventory that the user returnsto the controlled space, the cost threshold that the user is allowed totake from the controlled space, the time and date the user enters orexits the controlled space, etc. The cost center database 59 has costinformation about the departments, shifts, work cells, job, etc. Thecost information includes, but is not limited to, the total chargedvalue of the inventory associated to the departments, shifts, workcells, job, etc., the total credited value of the inventory associatedto the departments, shifts, work cells, job, etc., the cost threshold ofthe inventory associated to the departments, shifts, work cells, job,etc. The inventory database 61 has information about the inventory, thecost of the inventory, the time and date that the inventory enters orexits the controlled space, etc.

The databases facilitate the portal system 1 to monitor and track theuser, cost centers, and inventory. For example, if the user enters theportal area 17 of the portal system 1, the portal system 1 records thedate and time that the user and inventory enters and exits into theportal device 12. The portal system 1 also records the value of theinventory to credit or charge the user and/or cost centers. The portalsystem 1 links the detected inventory and the value of the inventory tothe user and cost centers.

FIG. 5 illustrates an exemplary database of the memory 11. The portalsystem can be used in the airplane industry. For example, John Doe 53Aworks for an airline company and maintains the wings of airplanes as hisjob 59A. John Doe 53A works in the maintenance department 59B of theairline. Therefore, the user database 53 includes John Doe 53A. John Doe53A is linked to job 59A and department 59B of the cost centers database59, and to the inventory 61A-C of the inventory database 61 that he tookfrom the controlled space.

If John Doe 53A exits a controlled space with a screwdriver 61A, drillbits 61B, and powerdrill 61C, the portal system links the inventory61A-C to John Doe 53A. The portal system further charges the total value(e.g, $150) of the inventory 61A-C to John Doe 53A and to the costcenters 59A-B that the user is associated with. John Doe 53A can beassigned a cost threshold of $500, the job 59A can be assigned a costthreshold of $1,000 and the maintenance department 59B can be assigned acost threshold of $10,000. John Doe 53A can take inventory (individuallyand in combination) not exceeding $500. Many users can be assigned tojob 59A and maintenance department 59B. Thus, the users (individuallyand in combination) associated to the job 59A and maintenance department59B can take inventory (individually and in combination) not exceeding$1,000 and $10,000, respectively.

FIG. 6 illustrates an example of operation of the portal system thatmonitors and tracks inventory and user entering in a controlled space.In block 23, the user is detected entering the portal area 17 of theportal system 1 via the presence sensing mat 6. The computing device 2determines whether there is a user radio frequency tag 14 in the portalarea 17 of the portal device 12, as indicated in block 25. If there isno radio frequency signals, the user is requested to input a code viagraphical user interface 4, as indicated in block 27. The code can beany numerical, alphabetical, alphanumerical, and/or symbols that can beentered into the graphical user interface 4. If the computing device 2determines that a user radio frequency tag is detected, the receiver 22receives a signal from the user radio frequency tag, as indicated inblock 29. The receiver 22 sends the radio frequency signal to thecomputing device 2, as indicated in block 31.

In block 33, once the code or the radio frequency signal is received bythe computing device 2, the computing device 2 verifies whether the useris authorized to enter the controlled space. In an alternativeembodiment, the computing device 2 can require the user to input a codevia graphical user interface 4 even when the computing device 2 detectsa radio frequency tag. The computing device 2 can verify whether theuser is authorized based on both the radio frequency signal and thecode.

If the user is not authorized to enter the controlled space, thecomputing device 2 does not unlock the door 3, as indicated in block 35.If the user is authorized to enter the controlled space, the computingdevice 2 unlocks the door 3 via the electro-magnetic lock 10, asindicated in block 37. The computing device 2 then detects for any radiofrequency signal related to inventory that is with the user in theportal area 17, as shown in block 39. If the computing device 2 detectsinventory in the portal area 17, the computing device 2 links thedetected inventory to the user entering the portal area 17, as indicatedin block 41.

The computing device 2 then credits the accounts of the user and/or costcenters the value of the inventory that the user returns inventory tothe controlled space, as indicated in block 43. For example, when theuser returns a screwdriver and rivet gun that are both worth $100, theuser, the user's work cell, and the user's department are credited $100.If the computing device 2 does not detect inventory in the portal area17, the computing device 2 does not link or credit the user and/or costcenters.

FIG. 7 illustrates an example of operation of the portal system 1 thatmonitors and tracks inventory and user exiting a controlled space. Inblock 47, the user is detected exiting the portal area 17 of the portalsystem 1 via the presence sensing mat 6. The user presses an unlockbutton 54 and unlocks the door for the user to exit the controlledspace, as indicated in block 49. The computing device 2 determineswhether there is a user radio frequency tag in the portal area 17 of theportal device 12, as indicated in block 51. If there is no radiofrequency signal, the user is requested to select a user identificationcode via graphical user interface located inside the portal area 17, asindicated in block 55. If the computing device 2 determines that a userradio frequency tag 14 is detected, the receiver 22 receives a signalfrom the user radio frequency tag 14, as indicated in block 57. Thereceiver 22 sends the radio frequency signal to the computing device 2,as indicated in block 60.

In block 63, the computing device 2 then detects for any radio frequencysignal related to inventory that are with the user in the portal area17. If the computing device 2 detects inventory in the portal area 17,the computing device 2 links the detected inventory to the user exitingthe portal area 17, as indicated in block 65. The computing device 2 canfurther charge the account of the user and/or the cost centers the valueof the inventory that the user takes out of the controlled space, asindicated in block 67. For example, when the user takes a screwdriverand rivet gun that are both worth $100 out of the controlled space, theuser, the user's work cell, and the user's department are charged $100.If the computing device 2 does not detect inventory in the portal area17, the computing device 2 does not link or charge the user and/or costcenters.

In the case where the user enters the controlled space with a firstinventory item(s) and exits with a second inventory item(s), thecomputing device 2 unlinks the user from the first inventory item(s) andlinks the user to the inventory item(s). The computing device creditsthe user (or the work cell, department, etc.) the value of the firstinventory item(s) and then charges the user (or the work cell,department, etc.) the value of the second inventory item(s).

The computing device 2 can determine whether the user and/or the costcenter have exceeded the budget usage or threshold value of inventory,as indicated in block 69. The computing device can provide anotification signal, such as an electronic reporting, to anadministrator based on the total value of inventory that the user hastaken out of the controlled space, as indicated in block 71. Thenotification signal indicates that the budget usage of the inventory hasexceeded a threshold value. For example, the user has a limit of $100value of inventory, the work cell has a $1,000 value of inventory andthe department has a $10,000 value of inventory. If the user takesinventory exceeding the $100 value, the computing device 2 can providean electronic reporting to an administrator that supervises the user. Ifone or more users that works in the same work cell takes inventoryexceeding the $1,000 value, the computing device 2 can provide anelectronic reporting to an administrator that supervises the work cell.If one or more users that works in the same department takes inventoryexceeding the $10,000 value, the computing device 2 can provide anelectronic reporting to an administrator that supervises the department.

FIG. 8 illustrates an example of operation of the inventory manager 15of the portal device 12 that facilitates monitoring and trackinginventory entering a controlled space. In block 75, the inventorymanager 15 receives data from the user in a portal area 17 either asignal from a user radio frequency tag 14 or code that is entered by theuser via a graphical user interface 4. The inventory manager 15determines whether the user is authorized to enter the controlled spacebased on the received data, as indicated in block 77.

If the user is not authorized to enter the controlled space, theinventory manager 15 sends no signal to unlock the door preventing theuser from entering the controlled space, as indicated in block 79. Ifthe user is authorized to enter the controlled space, the inventorymanager 15 unlocks the door via the electro-magnetic lock 10, asindicated in block 81. The inventory manager 15, in block 83, determineswhether any inventory is detected in the portal area 17. The inventorymanager 15 detects for any radio frequency signal related to inventorythat is with the user in the portal area 17. If the inventory manager 15detects any inventory in the portal area 17, the inventory manager 15links the detected inventory to the user exiting the portal area 17, asindicated in block 85.

In block 87, the inventory manager 15 credits the accounts of the userand/or the cost centers the value of the inventory that the user returnsto the controlled space. For example, when the user returns ascrewdriver and rivet gun that are both worth $100, the user, the user'swork cell, and the user's department are credited $100. If the inventorymanager 15 does not detect inventory in the portal area 17, theinventory manager 15 does not link or credit the user or cost centers.

FIG. 9 illustrates an example of operation of the inventory manager 15of the portal device 12 that facilitates monitoring and trackinginventory exiting a controlled space. In block 91, the inventory manager15 detects the user unlocking the door at the exit of the controlledspace by pressing an unlock button 54. The unlock button 54 sends signalto the locking door 3 to unlock, as indicated in block 93. The inventorymanager 15, in block 95, determines whether any inventory is detected inthe portal area 17. The inventory manager 15 detects for any radiofrequency signal related to inventory that is with the user in theportal area 17.

In block 97, if the inventory manager 15 detects inventory in the portalarea 17, the inventory manager 15 links any detected inventory tags withthe user when exiting through the portal area 17. The inventory manager15 charges the accounts of the user and/or cost centers the value of theinventory that the user takes out of the controlled space, as indicatedin block 99.

If no inventory is detected, the inventory manager 15 does not link theuser to any inventory nor charge the user, work cell, department, etc.In the case where the user enters the controlled space with a firstinventory item and exits with a second inventory item, the inventorymanager 15 unlinks the user from the first inventory item and links theuser to the second inventory item. The inventory manager 15 furthercredits the user (or work cell, department, etc.) the value of the firstinventory and charges the user (or work cell, department, etc.) thevalue of the second inventory.

The inventory manager 15 can determine whether the user and/or the costcenter have exceeded the budget usage or threshold value of inventory,as indicated in block 101. The inventory manager 15, as indicated inblock 103, can provide a notification signal, such as an electronicreporting, to an administrator based on the total value of inventorythat the user has taken out of the controlled space.

It should be emphasized that the above-described embodiments of thepresent invention, particularly, any “preferred” embodiments, are merelypossible examples of implementations, merely set forth for a clearunderstanding of the principles of the invention. Many variations andmodifications may be made to the above-described embodiment(s) of theinvention without departing substantially from the spirit and principlesof the invention. All such modifications and variations are intended tobe included herein within the scope of this disclosure and the presentinvention and protected by the following claims.

1. A portal device associated with a controlled space comprising: acomputing device having a user database that includes informationassociated with inventory, the inventory including at least one item,the computing device being configured to: assign an item value to eachitem in the inventory, calculate the item value based on a purchaseprice of the item, determine whether the item has been taken into thecontrolled space by a user in response to determining that the item hasbeen taken into the controlled space, credit an item value of the itemagainst a total value of the inventory that the user has taken out ofthe controlled space, determine whether the item has been taken out ofthe controlled space the user, in response to determining that the itemhas been taken out of the controlled space, add the item value of theitem to a total value of the inventory that the user has taken out ofthe controlled space, and compare the total value of the inventory thatthe user has taken out of the controlled space with a threshold value.2. The portal device as defined in claim 1, wherein comparing the totalvalue with the threshold value includes determining whether the totalvalue has exceeded the threshold value, responsive to determining thatthe total value has exceeded the threshold value, the computing deviceis further configured to provide a notification signal to anadministrator.
 3. The portal device as defined in claim 2, furthercomprising a locking door being coupled to the computing device, thecomputing device being configured to unlock the locking door responsiveto determining that the total value has not exceeded the thresholdvalue.
 4. The portal device as defined in claim 3, wherein the computingdevice comprises a graphical user interface, the graphical userinterface being located outside the controlled space, wherein thecomputing device is configured to unlock the locking door based on codeinputted by a user through the graphical user interface upon enteringand exiting the controlled space.
 5. The portal device as defined inclaim 4, wherein the computing device determines whether the user isauthorized to enter the controlled space based on a first signal and/orcode entered by the user through the graphical user interface.
 6. Theportal device as defined in claim 3, wherein the controlled spacecontains inventory, the portal device further comprising: a receiverbeing configured to receive a first signal from a first radio frequencytag and a second signal from a second radio frequency tag, the receiverbeing configured to send the first and second signals to the computingdevice, the first radio frequency tag being attached to the user and thesecond radio frequency tag being attached to the inventory; and whereinthe computing device is configured to lock and unlock the locking doorbased on the first signal from the first radio frequency tag, thecomputing device being configured to link the inventory to the user andtrack the inventory and the user via the first and second signals as theuser takes the inventory in and out of the controlled space through thelocking door.
 7. The portal device as defined in claim 6, wherein thecomputing device comprises a user database that facilitates thecomputing device to determine whether the user is authorized to enterthe controlled space based on the first signal.
 8. The portal device asdefined in claim 3, further comprising an unlock button thatautomatically unlocks the locking door, wherein the unlock button islocated inside the controlled space.
 9. The portal device as defined inclaim 1, wherein the computing device is further configured to calculatethe total value of the inventory that the user has taken out of thecontrolled space.
 10. The portal device as defined in claim 9, whereinthe computing device comprises a cost centers database that includes thetotal value of the inventory assessed to one of cost centers, whereinthe cost centers database facilitates the computing device to determinewhether the user has exceeded a threshold value of inventory based onthe total value of inventory that the user has taken out of thecontrolled space, wherein the cost centers database facilitates thecomputing device to provide a notification signal to an administratorbased on the total value of inventory that the user has taken out of thecontrolled space.
 11. The portal device as defined in claim 1, furthercomprising a presence sensing mat that detects the user exiting andentering the controlled space, the presence sensing mat being coupled tothe computing device and configured to transmit a motion signalindicating whether the user is exiting or entering the controlled space.12. A portal system for use in connection with a controlled spacecomprising: inventory; and a portal device comprising: a computingdevice having a user database that includes information associated withinventory, the inventory including at least one item, the computingdevice being configured to: assign an item value to each item in theinventory, calculate the item value based on a purchase price of theitem, determine whether the item has been taken into the controlledspace by a user, in response to determining that the item has been takeninto the controlled space, credit an item value of the item against atotal value of the inventory that the user has taken out of thecontrolled space, determine whether the item has been taken out of thecontrolled space by the user, in response to determining that the itemhas been taken out of the controlled space, add the item value of theitem to a total value of the inventory that the user has taken out ofthe controlled space, and compare the total value of the inventory thatthe user has taken out of the controlled space with a threshold value.13. The portal system as defined in claim 12, wherein comparing thetotal value with the threshold value includes determining whether thetotal value has exceeded the threshold value, responsive to determiningthat the total value has exceeded the threshold value, the computingdevice is further configured to provide a notification signal to anadministrator.
 14. The portal system as defined in claim 13, furthercomprising a locking door being coupled to the computing device, thecomputing device being configured to unlock the locking door based ondetermining whether the total value has exceeded the threshold value.15. The portal system as defined in claim 14, further comprising asecond radio frequency tag that is attached to the user, wherein thereceiver is configured to receive a signal from the second radiofrequency tag and send the signal to the computing device, wherein thecomputing device is configured to unlock the locking door based on thesignal from the second radio frequency tag, the computing device beingconfigured to link the inventory to the user and track the user andinventory via the signals as the user takes the inventory in and out ofthe controlled space through the locking door.
 16. The portal system asdefined in claim 14, wherein the portal device further comprises anunlock button that automatically unlocks the locking door, wherein theunlock button is located inside the controlled space.
 17. The portalsystem as defined in claim 12, wherein the computing device is furtherconfigured to calculate the total value of the inventory that the userhas taken out of the controlled space.
 18. The portal system as definedin claim 17, wherein the computing device comprises a cost centersdatabase that includes the total value of the inventory assessed to oneof cost centers, wherein the cost center database facilitates thecomputing device to determine whether the user has exceeded a thresholdvalue of inventory based on the total value of inventory that the userhas taken out of the controlled space, wherein the cost centers databasefacilitates the computing device to provide a notification signal to anadministrator based on the total value of inventory associated to theone of the cost centers.
 19. The portal system as defined in claim 12,wherein the portal device comprises: a receiver being configured toreceive a signal from a first radio frequency tag, and send the signalto the computing device; and an inventory manager linking the firstradio frequency tag to a specific inventory item in the inventory. 20.The portal system as defined in claim 12, further comprising a presencesensing mat that monitors the user exiting and entering the controlledspace, the presence sensing mat being coupled to the computing deviceand configured to transmit a motion signal indicating whether the useris exiting or entering the controlled space.
 21. The portal system asdefined in claim 20, wherein the portal device further comprises a userdatabase that facilitates the computing device to determine whether theuser has exceeded a threshold value of inventory based on the totalvalue of inventory that the user has taken out of the controlled space,wherein the user database facilitates the computing device to provide anotification signal to an administrator based on the total value ofinventory that the user has taken out of the controlled space.
 22. Theportal system as defined in claim 20, wherein the portal device furthercomprises the computing device that determines whether the user isauthorized to enter the controlled space based on a second signal and/orcode entered by the user through a graphical user interface.
 23. Amethod of monitoring a controlled space, the method comprising the stepsof: assigning an item value to an item in inventory, the item valuebeing calculated based on a purchase price of the inventory; determiningwhether the item has been taken into the controlled space by a user: inresponse to determining that the item has been taken into the controlledspace, crediting an item value of the item against a total value of theinventory that the user has taken out of the controlled space;determining whether the item has been taken out of the controlled spaceby the user; in response to determining that the item has been taken outof the controlled space, adding the item value of the item to a totalvalue of the inventory that the user has taken out of the controlledspace; determining whether the total value of the inventory that hasbeen taken out of the controlled space has exceeded a threshold value ofinventory and responsive to determining that the total value hasexceeded the threshold value, storing the determination that the totalvalue exceeded the threshold value in memory of a computing device. 24.The method as defined in claim 23, further comprising responsive todetermining that the total value has exceeded the threshold value,providing a notification signal to an administrator.
 25. The method asdefined in claim 23, further comprising unlocking a locking doorresponsive to determining that the total value has not exceeded thethreshold value.
 26. The method as defined in claim 23, furthercomprising calculating the total value of the inventory that the userhas taken out of the controlled space.
 27. The method as defined inclaim 26, further comprising: associating the total value of inventorythat the user has taken out of the controlled space to a cost center;determining whether the cost center has exceeded a threshold value ofinventory based on the total value of inventory; and providing anotification signal to an administrator based on the total value ofinventory associated to the cost center.
 28. The method as defined inclaim 23, further comprising receiving data from the user via agraphical user interface located outside of the controlled space. 29.The method as defined in claim 28, further comprising tracking inventorybased on the received data when the user enters and exits the controlledspace.
 30. The method as defined in claim 23, further comprising:receiving signals from multiple radio frequency tags, respectively; aradio frequency tag being attached to the user and a radio frequency tagbeing attached to the inventory; locking and unlocking a locking doorbased on a signal from the radio frequency tag that is attached to theuser; linking the inventory to the user; and tracking the inventory andthe user as the user takes the inventory in and out of the controlledspace through the locking door.
 31. The method as defined in claim 23,further comprising monitoring the user exiting and entering thecontrolled space via a presence sensing mat, the presence sensing matbeing configured to transmit a motion signal indicating whether the useris exiting or entering the controlled space.
 32. The method as definedin claim 23, further comprising determining whether provide anotification signal based on a cost centers database.
 33. The method asdefined in claim 23, further comprising determining whether the user isauthorized to enter the controlled space based on a signal and/or codeentered by the user through the graphical user interface.
 34. The methodas defined in claim 23, further comprising automatically unlocking alocking door via an unlock button, wherein the unlock button is locatedinside the controlled space.