Method for monitoring lockout procedures

ABSTRACT

In a method of monitoring lockout procedures, a first lockout device is secured with a first component in a lockout condition to block operation of the first component, and a corresponding first data signal is received, with the first data signal including at least a first identification code corresponding to the first lockout device. A second lockout device is secured with a second component in a lockout condition to block operation of the second component, and a corresponding second data signal is received, with the second data signal including at least a second identification code corresponding to the second lockout device. The first and second data signals are monitored to determine an order in which the first and second lockout devices have been locked out, which is compared with a predefined lockout procedure. An alert is provided if the order is inconsistent with the predefined lockout procedure.

CROSS-REFERENCE TO RELATED APPLICATION

The present application is a continuation of U.S. patent applicationSer. No. 15/461,965, filed Mar. 17, 2017, entitled “ELECTRONICALLYMONITORED SAFETY LOCKOUT DEVICES, SYSTEMS AND METHODS”, which is acontinuation of U.S. patent application Ser. No. 13/884,282, filed Oct.17, 2013, entitled “ELECTRONICALLY MONITORED SAFETY LOCKOUT DEVICES,SYSTEMS AND METHODS”, now U.S. Pat. No. 9,600,696, issued on Mar. 21,2017, which is a national phase entry under 35 U.S.C. § 371 of, andclaims priority to, International Application No. PCT/US2011/059935filed on Nov. 9, 2011, entitled “ELECTRONICALLY MONITORED SAFETY LOCKOUTDEVICES, SYSTEMS AND METHODS”, which claims benefit of U.S. ProvisionalApplication No. 61/411,591, filed Nov. 9, 2010, entitled “ELECTRONICALLYMONITORED SAFETY LOCKOUT DEVICES, SYSTEMS AND METHODS,” the entiredisclosures of which are fully incorporated herein by reference.

BACKGROUND

Security devices, such as padlocks and other types of conventionallocks, are known in the art. Many security devices are provided forrestricting access to equipment and control instruments, including, forexample, electrical components, such as switches, dials and pushbuttons, and fluid system components, such as valves and pressureregulators. Industrial and commercial equipment are often provided witha lockout feature (e.g., a locking bracket or similar structure) tofacilitate the restriction of access to, or lockout of, the equipment.The equipment's lockout feature typically includes a hasp or other suchapertured member or members configured to receive a shackle (or cable orother retaining member) of one or more locks to prevent movement of theapertured member with respect to another portion of the lockout feature,thereby preventing access to, or operation of, the equipment.

SUMMARY

The present application describes safety lockout devices, systems, andmethods for electronically monitoring safety lockout procedures.

Accordingly, in one exemplary embodiment of the present application, amethod of monitoring lockout procedures is contemplated. In an exemplarymethod, a first lockout device is secured with a first component in alockout condition to block operation of the first component, and acorresponding first data signal is received, with the first data signalincluding at least a first identification code corresponding to thefirst lockout device. A second lockout device is secured with a secondcomponent in a lockout condition to block operation of the secondcomponent, and a corresponding second data signal is received, with thesecond data signal including at least a second identification codecorresponding to the second lockout device. The first and second datasignals are monitored to determine an order in which the first andsecond lockout devices have been locked out, which is compared with apredefined lockout procedure. An alert is provided if the order isinconsistent with the predefined lockout procedure.

According to another exemplary embodiment, a system for monitoring alockout condition of a component includes a lockout device, a lock unit,and a reader. The lockout device is moveable between a lockout conditionblocking operation of the component and an access condition permittingoperation of the component. The lock unit is configured to be secured toa lockout interface of the lockout device to secure the lockout devicein the lockout condition. One of the lockout device and the lock unitincludes a communication module configured to communicate a data signalincluding an identification code identifying the one of the lockoutdevice and the lock unit. The reader is remote from the one of thelockout device and the lock unit, and is configured to receive the datasignal at least when the lockout device is assembled with the componentand the lock unit is secured to the lockout interface of the lockoutdevice.

According to another exemplary aspect of the present application, amethod of monitoring lockout procedures for a multi-process arrangementhaving first and second components is contemplated. In one exemplarymethod, a first lockout device is secured with the first component in alockout condition to block operation of the first component. A firstdata signal is generated as a result of the first lockout device beingsecured with the first component in the lockout condition, the firstdata signal including at least a first identification code correspondingto the first lockout device. A second lockout device is secured with thesecond component in a lockout condition to block operation of the secondcomponent. A second data signal is generated as a result of the secondlockout device being secured with the second component in the lockoutcondition, the second data signal including at least a secondidentification code corresponding to the second lockout device. Thefirst and second data signals are monitored to determine an order inwhich the first and second lockout devices have been locked out. Theorder in which the first and second lockout devices have been locked outis compared with a predefined lockout procedure, and an alert isprovided if the order is inconsistent with the predefined lockoutprocedure.

In another exemplary embodiment, a system is provided for monitoringlockout procedures for a multi-process arrangement having first andsecond components. The system includes first and second lockout devices,first and second communication modules, at least one receiver, and acentral computer. The first lockout device is configured to be securedwith the first component in a lockout condition to block operation ofthe first component. The first communication module is configured togenerate a first data signal as a result of the first lockout devicebeing secured with the first component in the lockout condition, withthe first data signal including at least a first identification codecorresponding to the first lockout device. The second lockout device isconfigured to be secured with the second component in a lockoutcondition to block operation of the second component. The secondcommunication module is configured to generate a second data signal as aresult of the second lockout device being secured with the secondcomponent in the lockout condition, with the second data signalincluding at least a second identification code corresponding to thesecond lockout device. The at least one receiver is configured toreceive the first and second data signals from the first and secondcommunication modules. The central computer is configured to receiveinformation corresponding to the first and second data signals from theat least one receiver, and to compare the information to a predefinedlockout procedure.

BRIEF DESCRIPTION OF THE DRAWINGS

Further features and advantages will become apparent from the followingdetailed description made with reference to the accompanying drawings,wherein:

FIG. 1 is a schematic representation of an electronically monitoredsafety lockout system, according to an exemplary embodiment;

FIG. 2 is a schematic representation of a lock having a communicationmodule to indicate a condition in the lock, according to an exemplaryembodiment;

FIG. 3 is a schematic representation of a lockout device having a readerto receive a data signal from a lock with a communication module,according to an exemplary embodiment; and

FIG. 4 is a schematic representation of a lockout device having acommunication module to indicate a condition in the lockout device,according to an exemplary embodiment.

DETAILED DESCRIPTION

The Detailed Description merely describes exemplary embodiments of theinvention and is not intended to limit the scope of the claims in anyway. Indeed, the invention is broader than and unlimited by theexemplary embodiments, and the terms used in the claims have their fullordinary meaning.

Also, while the exemplary embodiments described in the specification andillustrated in the drawings relate to padlocks and lockout devices usedwith padlocks in safety lockout systems, it should be understood thatmany of the inventive features described herein may be applied to otherlocking devices, arrangements, and systems, including, for example,equipment having integral lockout features (e.g., instrument-blockinglockout apertures), lockout devices with integral locking mechanisms,lock out stations, tag out stations, other padlock applications, doorlocks, cabinet locks, cargo locks, lock boxes, key safes, automotivelocks, cycle locks, and trailer locks.

The present application contemplates safety lockout devices and systemsconfigured to provide an electronic record or audit trail includinginformation regarding a specific safety lockout operation involving oneor more pieces of equipment and/or control instruments. For example, asafety lockout system may be configured to collect informationpertaining to the time and date that a lockout is initiated, theduration of the lockout, any interruptions in the lockout,identification of the individual or individuals conducting (e.g.,initiating or terminating) the lockout, and the sequence in whichmultiple control instruments or pieces of equipment are locked out orreturned to service. This information may be recorded as proof that alockout procedure was properly conducted, or to provide a warning that asystem has been improperly locked out or returned to service.

According to an inventive aspect of the present application, asschematically shown in FIG. 1, a safety lockout system 100 includes oneor more lockout devices 110, 120 assembled to or integral with one ormore components 10, 20 of a system to be locked out (e.g., an electricalor fluid control system). To secure each piece of equipment in a lockedout condition, one or more locks 130 are locked in engagement with eachof the lockout devices 110, 120 (for example, through lock apertures111, 121). The secured lockout devices 110, 120 prevent access to orcontrol of the components 10, 20, for example, by blocking access to aport, conduit, or other connection, or by blocking access to or movementof a switch, dial, button, control handle, or other such instrument.Examples of lockout devices that are secured in a lockout condition by apadlock locked through a lock aperture are described in U.S. Pat. Nos.7,497,705; 7,501,593; 7,581,420; and 7,752,876, the entire disclosuresof which are fully incorporated by reference herein, to the extent thatthey are not inconsistent with the present application. Additional locks130 may be used with each lockout device 110, 120, for example, torequire an additional or backup verifications that a system component10, 20 may be safely returned to service.

To provide an electronic record or audit trail of the system lockoutprocedure, as shown in FIG. 2, a lock 130 may be provided with a sensor133 configured to identify when the lock 130 has been placed in a lockedor unlocked condition. In one embodiment, the sensor 133 is anelectronic component in electrical communication with anelectromechanical locking mechanism of a lock, such that an electricalsignal that initiates a change in the condition of the lock is alsoreceived by the sensor 133 to identify a locked or unlocked condition ofthe lock 130. Any suitable electromechanical locking arrangement may beutilized, including, for example, motor-driven, solenoid-driven, orshape memory alloy-driven locking mechanisms. Further, any suitableelectronic interface may be utilized to actuate the electromechanicallock, including, for example, a wireless or remote control transceiver,an electromechanical key or key card reader, a keypad, or a biometricsensor. In another embodiment, the sensor is an electromechanicalcomponent (e.g., a sensor switch) that is mechanically actuated when thelock is changed between locked and unlocked conditions. For example, asensor switch 133 may be positioned within a padlock 130 proximate to asurface of the shackle 139 (e.g., an end of the long leg of theshackle), such that movement of the shackle to a locked positionactuates the sensor switch. As such, a lock with a mechanical ornon-electrically operated locking mechanism may be configured to providean electronic data signal identifying the condition of the lock.

The sensor 133 may transmit information regarding the condition of thelock 130 to a processor 134 within the lock 130 to store informationregarding the condition of the lock 130. The lock 130 may additionallyinclude a clock unit 135 to identify the date, time, and/or duration ofa locked condition. In other embodiments, a clock 145, 155 isadditionally or alternatively provided in the central computer 140 orreader 150 to identify the time of the transmission of information fromthe lock. Other sensors (not shown) may be utilized to identify otherconditions, such as, for example, a low battery condition or attempts totamper with the lock 130. These sensors 133 may also activate indicators(e.g., LED indicators, sirens) on the lock to provide an indication atthe lock 130 of a change in the condition of the lock.

The sensor 133 and/or processor 134 may deliver a data signal to acommunication module 136 within the lock 130, to deliver informationabout the condition of the lock 130 to an external device. Manydifferent types of communication modules 136 may be utilized in thelocks 130. For example, the communication module 136 may be configuredto provide wireless communication utilizing one or more of WiFi(802.11), ZigBee (802.15), radio frequency (RF) communication, infrared(IR) transmission, near field communication (NFC), Bluetooth, or anyother suitable wireless data protocol. Additionally or alternatively,the communication module 136 may be configured to provide wiredcommunication, for example, through an Ethernet connection, USB cable,or other suitable connection. In one embodiment, the communicationmodule 136 communicates directly with a centralized computer 140 orother such device, which may collect information directly from multiplelocks 130 to evaluate the system lockout process. In another embodiment,the communication module 136 communicates with a reader or receiver 150,which collects information provided by one or more locks 130 forcontinuous, periodic, or selective communication with the centralcomputer 140, using a second communication module 156. The secondcommunication module 156 may be configured for any suitable wireless orwired communication (as listed above) with the central computer 140. Thesecond communication module 156 may be configured for automatic,continuous, or periodic communication with the central computer 140.Additionally or alternatively, the second communication module 156 maybe configured for selective communication with the central computer 140,for example, as initiated by a user operable switch or button, or bytransporting the reader 150 to the central computer for a direct wiredconnection of the reader 150 to the computer 140.

The reader 150 may be provided at many different locations with respectto the lockout devices 110, 120 and system components 10, 20. In oneexample, the reader 150 is secured to or stationed proximate to eitherthe lockout device 110, 120 or the system component 10, 20. Bymaintaining the reader 150 at the lockout device or system component,with a range that does not extend beyond that system component, thelocation of the locks 130 secured to that lockout device 110, 120 can beidentified, as locks 130 secured to other locations in the system wouldnot be readable by the reader 150. In another example, the reader 150may be a portable unit (e.g., a cell phone/smart phone, or a dedicatedRFID reading device) that may be brought into proximity with a lockoutdevice 110, 120 to obtain information communicated by the communicationmodule 136. In such an embodiment, the lockout device 110, 120 or systemcomponent 10, 20, may also be provided with an RFID tag includinginformation about the location of the system component, or the type ofsystem component with which the lockout device is used. In such anarrangement, the portable reader may simultaneously or sequentially readthe RFID tags of the lockout device/system component and the locks 130,such that the lock identifying serial code is associated with thelocation or use identifying code of the lockout device or systemcomponent. In still another example, the reader 150 may be a centralizeddevice configured to receive information from the communication modules136 of locks 130 secured to multiple lockout devices 110, 120. Thepermissible distance between the reader 150 and the communication module136 may depend in part on the type of wired or wireless communicationutilized to transmit electronic data signals from the communicationmodule 136 to the reader 150, and/or the power source available to powerthe communication. Using a central reader 150, the location of the locks130 utilized within the system may be identified by some other method,such as, for example, dedicating certain locks 130 to certain systemcomponents 10, 20 (e.g., by labeling, color coding, or configuring thelock so that the lock will only be usable with one of the systemcomponents). By using dedicated locks 130, the RFID serial code data maybe used to identify the location or use of the lock.

In an exemplary embodiment of the present application, a lock for asafety lockout system is provided with a radio frequency identification(RFID) tag that communicates information about the identity and/orcondition of the lock to an RFID reader or interrogator. In one example,a lock 130 includes a passive (unpowered) RFID tag 136 that iscontinuously, periodically, or selectively interrogated by a nearby RFIDreader 150. To eliminate the need for a power supply to the lock, otherelectronic components, such as the sensor 133, processor 134, and clockunit 135 may be eliminated. In such an embodiment, the RFID reader 150may be secured at a location close enough to the lock 130 to ensure thatthe passive RFID tag 136 is properly read. For example, the RFID reader150 may be assembled with or provided in either the lockout device orthe system component to be locked out to ensure sufficient proximity tothe RFID tags 136 of any locks 130 secured to the lockout device 110. Inother embodiments, the RFID reader may be built into or provided with alockout or tag out station, in a portable unit that may be carried tothe system to be locked out (e.g., a cell phone/smart phone, ordedicated RFID interrogating device), in a safety lockout sign orplacard, in a tool box, or in a carrying case for the locks 130.

To provide an indication of the condition of the lock 130, the lock mayinclude an RFID tag configured to be detectable only when the lock is ina predetermined condition (e.g., a locked or unlocked condition). In onesuch embodiment, a lock may include a “locked condition” RFID tag havingan RFID chip, coded to identify the lock and its locked condition,connected to an RFID tag antenna by a sensor switch that is activatedwhen the lock is in a locked condition (and disconnected from the RFIDantenna when the lock is in an unlocked condition). In anotherembodiment, a lock may additionally or alternatively include an“unlocked condition” RFID tag having an RFID chip, coded to identify thelock and its unlocked condition, that is connected to an RFID antenna bya sensor switch that is activated when the lock is in an unlockedcondition (and disconnected from the RFID antenna when the lock is in alocked condition). Where both a locked condition RFID tag and anunlocked condition RFID tag are utilized in a lock, the RFID reader canobtain a positive indication of the presence of a locked lock proximateto the RFID reader, distinguishable from the presence of an unlockedlock proximate to the RFID reader or the absence of the lock from theproximity of the RFID reader.

To preserve power (e.g., from an internal battery or an externalsource), the RFID reader 150 may be configured such that the reader isonly powered when a lock 130 has been applied to the lockout device. Forexample, as shown in FIG. 3, lock apertures 211 in a lockout device 210,powered by a rechargeable internal battery 258 (or any other suitablepower source) may be provided with one or more sensor switches 253 thatare actuated when a lock shackle is inserted through one of theapertures to initiate powered operation of a reader 250 assembled withor integral to the lockout device 210. These same sensor switches 253may be connected with a communication module 256 within the reader 250to initiate communication of information regarding the condition of thelockout device 210 to a central computer. In such an arrangement, anindication of a lock assembled with the lockout device 210 that is notaccompanied by an indication of the presence of a lock in a lockedcondition may trigger an alert that an unauthorized lock or a defectivelock has been used with the lockout device 210. Likewise, an indicationof the presence of a lock in a locked condition that is not accompaniedby an indication of a lock assembled with the lockout device may triggeran alert that the device was not properly locked out or that the lockoutdevice is defective.

In another embodiment, a lock 130 may utilize an active (powered) RFIDtag 136 that continuously, periodically, or selectively delivers an RFIDsignal to an RFID reader 150. Using an active RFID tag 136, the lock 130may deliver information about the identity and/or condition of the lockto a reader 150 disposed at a greater distance from the lock 130 andlockout device 110. For example, an active RFID tag 136 may deliverinformation to a reader 150 that is centrally located to multiplecomponents of a system being locked out to read active RFID tags 136associated with locks 130 secured to multiple lockout devices 110, 120on multiple system components 10, 20. To preserve power (e.g., from aninternal battery or an external source), the lock 130 may be configuredsuch that the RFID tag 136 is only powered when the lock 130 experiencesa change in condition (e.g., a change from an unlocked condition to alocked condition, a change from a locked condition to an unlockedcondition, a low battery condition, or a sensed attempt to tamper withthe lock), as may be identified, for example, by a lock sensor switch133. To power the RFID tag 136, processor 134, clock unit 135, and/orsensor switch 133, the lock 130 may be provided with an internal battery138 selected to provide sufficient power to operate the electricalcomponents of the lock 130. In one embodiment, the battery 138 may berechargeable, with the lock 130 including an external connection orcontact 132 for charging the battery 138 when the lock 130 is not inuse. Further, the external connection 132 may additionally provide dataconnectivity (e.g., a serial port or USB port) to download lock usageinformation from the lock 130 to a central computer, docking station, orother such device. Other power sources may additionally or alternativelybe utilized to power to lock 130, including, for example, solar cells,piezoelectric cells (e.g., generating power when the shackle is pushedclosed), or the harvesting of electromagnetic waves received by the RFIDantenna in the lock.

As with the passive RFID tags, to provide an indication of the conditionof the lock 130, the lock may include an RFID tag configured to bedetectable only when the lock is in a predetermined condition (e.g., alocked or unlocked condition). In one such embodiment, a lock mayinclude a “locked condition” RFID tag having an RFID chip, coded toidentify the lock and its locked condition, connected to an RFID tagantenna and/or an internal battery by a sensor switch that is activatedwhen the lock is in a locked condition (and disconnected from the RFIDantenna and/or the internal battery when the lock is in an unlockedcondition). In another embodiment, a lock may additionally oralternatively include an “unlocked condition” RFID tag having an RFIDchip, coded to identify the lock and its unlocked condition, that isconnected to an RFID tag antenna and/or an internal battery by a sensorswitch that is activated when the lock is in an unlocked condition (anddisconnected from the RFID antenna and/or the internal battery when thelock is in a locked condition). Where both a locked condition RFID tagand an unlocked condition RFID tag are utilized in a lock, the RFIDreader can obtain a positive indication of the presence of a locked lockproximate to the RFID reader, distinguishable from the presence of anunlocked lock proximate to the RFID reader or the absence of the lockfrom the proximity of the RFID reader.

While the locks 130 may be constructed of any suitable material, in oneembodiment, a lock 130 is provided with a plastic body selected tominimize interference with the transmitted RF signals.

Additionally or alternatively, as shown in FIG. 4, a lockout device 310may be provided with an active or passive RFID tag 316 configured tocontinuously, periodically, or selectively deliver a data signal to anRFID reader. The RFID tag 316 may provide information about thecondition of the lockout device 310 (e.g., locked or unlocked condition,locks secured to multiple lock apertures, attempts to tamper with thelockout device, or a low battery condition), along with identificationof the system component 10 with which the lockout device 310 isassembled, and the time at which the condition is identified. In oneexample, lock apertures 311 in the lockout device 310 are provided withsensor switches 313 that are actuated when a lock shackle is insertedthrough one of the apertures to activate the RFID tag 316 identifying alocked condition (e.g., by connecting the RFID tag antenna and/orinternal battery with the RFID tag chip). Additionally or alternatively,a data signal may be provided to a processor 314 within the lockoutdevice 310, to store the lockout event information for future auditing.The electrical components of the lockout device 310 may be powered by aninternal battery 318 (e.g., a rechargeable battery), or by any othersuitable power source.

Once the reader 150, 250 has obtained information related to conditionsor usage of the locks 130 and/or the lockout devices 110, 120, 210, acommunication module 156, 256 within the reader 150, 250 delivers theinformation to the central computer 140 (for example, using any of thewired or wireless data communication protocols identified above). Inother embodiments, the sensor switches 133, 253, 313 in the locks 130and/or the lockout devices 210, 310 may transmit data signals directlyto a central computer 140 (for example, using any of the wired orwireless data communication protocols identified above), eliminating theneed for an RFID tag and reader to communicate the sensed condition.Depending on the frequency of the delivery of information to the centralcomputer 140, the central computer may be configured to track the statusof a locked out system in real time, at periodic intervals, or whenprompted (for example, as part of an audit).

The central computer 140 may be provided with software configured tomaintain a database of safety lockout conditions and procedures. Forexample, using serial codes assigned to each lock and/or lockout device,the database may identify the individuals or groups to whom locks andlockout devices have been issued. These same serial codes may beidentified in each data transmission originating from the correspondinglock and/or lockout device, such that each step in the lockout processmay be associated with a known individual or group. By identifyingsafety lockout procedure events in the order that they occur, thedatabase can identify the order in which multiple system components havebeen locked out or brought back into service, or the order in whichindividuals have locked out a system component or withdrawn the lockout(e.g., to identify the individual that initiated the lockout orterminated the lockout). Any deviations from standard safety lockoutprocedure may be recorded for immediate alert or identification in asubsequent audit (e.g., as communicated directly from the centralcomputer, or to an administrator's computer or smart phone).

EXAMPLE I Locks with Passive RFID Tags

In an exemplary lockout procedure using locks 130 having passive RFIDtags 136, an individual locks a first lock 130 to a first lockout device110 assembled with a first system component 10, by inserting a shackle139 of the lock 130 through a lock aperture 111 in the lockout device110 and moving the shackle to the locked condition. The inserted shackle139 actuates a sensor switch 253 in the lockout device 210 to connectthe RFID antenna with the RFID chip in a passive “locked condition” RFIDtag 136 to identify the locked condition. An RFID reader 150 proximateto the system component 10 (e.g., affixed to the component 10 orintegral with the lockout device 110) interrogates the passive RFID tag136 to identify the condition and identification code of the lock 130(stored in the RFID tag 136) and the locked condition of the lock 130.Depending in part on acceptable power usage, this interrogation may beperformed continuously, periodically (e.g., every 5 seconds), or inresponse to a triggering condition, such as movement detected by amotion or vibration sensor, or a sensor switch actuated by assembly ofthe lock 130 with the lockout device 110. The RFID reader 150communicates the lock identification code, condition code, a componentidentification code (corresponding to the system component or a lockoutdevice dedicated to that system component), and a time code(corresponding the time at which the RFID tag 236 was interrogated, asobtained from a clock unit 155 in the RFID reader 150) to a centralcomputer 140. The central computer 140 stores this information in adatabase, which associates the serial code with the individual or groupto which the serial code has been assigned. Where lockout of a device bymultiple individuals or groups is desired, this process is repeated foreach additional lock 130 that is locked onto the lockout device 110. Theindividual (or another individual) may then lock one or more locks 130to a second lockout device 120 assembled with a second system component20 of the system to be locked out, for communication with a second RFIDreader 150 proximate to the second lockout device 120, using the processdescribed above.

When a lock 130 is unlocked and removed from one of the lockout devices110, 120, the corresponding reader 150 interrogates an “unlockedcondition” RFID tag 136 of the lock 130 (activated by a sensor switchconnecting the RFID antenna with the RFID chip when the lock is removedfrom the lockout device) to identify the unlocked condition (oralternatively, recognizes the absence of a data signal from the openedor removed lock 130). The RFID reader 150 then communicates the lockidentification code, condition code, component serial code, and timecode to the central computer 140.

As the condition code, identification code, component code, and timecode are identified for each lockout event, the database may be used totrack and determine the individuals and system components involved inthe lockout process, the order in which the individuals participated,and the order in which the components were locked out or brought backinto service. The central computer 140 may be configured to issue analert if any of these lockout events deviates from a standard acceptedpractice. Other condition codes associated with a condition of the lock130, for example, a lower battery condition, or sensed tampering withthe lock 130, may likewise be communicated to the central computer 140for recording in the database and/or issuance of an appropriate alert.

EXAMPLE II Locks with Active RFID Tags

In an exemplary lockout procedure using locks 130 having active RFIDtags 136, an individual locks a first lock 130 to a first lockout device110 assembled with a first system component 10, by inserting a shackleof the lock 130 through a lock aperture 111 in the lockout device 110and moving the shackle to the locked condition. The locked shackle 139actuates a sensor switch 133 in the lock 130 to connect an RFID antennaor internal battery with an RFID chip of a “locked condition” activeRFID tag 136 to identify the locked condition. Activation of the sensorswitch 133 also prompts the RFID tag to transmit a data signal to anRFID reader 150 spaced apart from the system component 10. The datasignal identifies the identification code and condition code(corresponding to a locked condition) of the lock 130. The RFID reader150 communicates the lock identification code, condition code, acomponent identification code (corresponding to the system component ora lockout device dedicated to that system component), and a time code(corresponding the time at which the RFID reader 150 received the datasignal, as obtained from a clock unit 155 in the RFID reader 150) to acentral computer 140. The central computer 140 stores this informationin a database, which associates the identification code with theindividual or group to which the corresponding lock has been assigned.Where lockout of a device by multiple individuals or groups is desired,this process is repeated for each additional lock 130 that is lockedonto the lockout device 110. The individual (or another individual) maythen lock one or more locks 130 to a second lockout device 120 assembledwith a second system component 20 of the system to be locked out, usingthe process described above. The active RFID tag 136 in the second lock130 may transmit a data signal to a second RFID reader 150 proximate tothe second system component 20. Additionally or alternatively, theactive RFID tag 136 may transmit a data signal to the same RFID reader150, which may be centrally located to receive data signals from locks130 secured to multiple lockout devices 110, 120.

When a lock 130 is unlocked for removal from the lockout device 110,deactivation of the sensor switch 133 disconnects the RFID antenna fromthe RFID chip of the locked condition RFID tag 136 to identify theunlocked condition, based on the absence of the data signal from thelocked condition RFID tag. Additionally or alternatively, unlocking thelock 130 may result in activation of a sensor switch to connect an RFIDantenna and/or internal battery to an RFID chip of an unlocked conditionRFID tag, such that the unlocked condition RFID tag communicates thelock identification code, condition code, component code, and time codeto the RFID reader, for communication to the central computer 140.

As discussed above, the central computer database may be used to trackand determine the individuals and system components involved in thelockout process, the order in which the individuals participated, andthe order in which the components were locked out or brought back intoservice. The central computer 140 may be configured to issue an alert ifany of these lockout events deviates from a standard accepted practice.Other condition codes associated with a condition of the lock 130, forexample, a low battery condition, or sensed tampering with the lock 130,may likewise be communicated to the central computer 140 for recordingin the database and/or issuance of an appropriate alert.

While various inventive aspects, concepts and features of the inventionsmay be described and illustrated herein as embodied in combination inthe exemplary embodiments, these various aspects, concepts and featuresmay be used in many alternative embodiments, either individually or invarious combinations and sub-combinations thereof. Unless expresslyexcluded herein all such combinations and sub-combinations are intendedto be within the scope of the present inventions. Still further, whilevarious alternative embodiments as to the various aspects, concepts andfeatures of the inventions--such as alternative materials, structures,configurations, methods, circuits, devices and components, software,hardware, control logic, alternatives as to form, fit and function, andso on--may be described herein, such descriptions are not intended to bea complete or exhaustive list of available alternative embodiments,whether presently known or later developed. Those skilled in the art mayreadily adopt one or more of the inventive aspects, concepts or featuresinto additional embodiments and uses within the scope of the presentinventions even if such embodiments are not expressly disclosed herein.Additionally, even though some features, concepts or aspects of theinventions may be described herein as being a preferred arrangement ormethod, such description is not intended to suggest that such feature isrequired or necessary unless expressly so stated. Still further,exemplary or representative values and ranges may be included to assistin understanding the present disclosure; however, such values and rangesare not to be construed in a limiting sense and are intended to becritical values or ranges only if so expressly stated. Moreover, whilevarious aspects, features and concepts may be expressly identifiedherein as being inventive or forming part of an invention, suchidentification is not intended to be exclusive, but rather there may beinventive aspects, concepts and features that are fully described hereinwithout being expressly identified as such or as part of a specificinvention. Descriptions of exemplary methods or processes are notlimited to inclusion of all steps as being required in all cases, nor isthe order that the steps are presented to be construed as required ornecessary unless expressly so stated.

What is claimed is:
 1. A method of monitoring lockout procedures for amulti-process arrangement having first and second components, the methodcomprising: securing a first lockout device with the first component ina lockout condition to block operation of the first component; receivinga first data signal corresponding to the first lockout device beingsecured with the first component in the lockout condition, the firstdata signal including at least a first identification code correspondingto the first lockout device; securing a second lockout device with thesecond component in a lockout condition to block operation of the secondcomponent; receiving a second data signal corresponding to the secondlockout device being secured with the second component in the lockoutcondition, the second data signal including at least a secondidentification code corresponding to the second lockout device;monitoring the first and second data signals to determine an order inwhich the first and second lockout devices have been locked out; andcomparing the order in which the first and second lockout devices havebeen locked out with a predefined lockout procedure, and providing analert if the order is inconsistent with the predefined lockoutprocedure.
 2. The method of claim 1, further comprising deliveringinformation corresponding to the first and second data signals to acentral computer.
 3. The method of claim 1, wherein the first and seconddata signals further include a condition code identifying a lockoutcondition of the first and second lockout devices.
 4. The method ofclaim 1, wherein the first and second data signals are generated by thefirst and second lockout devices.
 5. The method of claim 1, whereinsecuring the first and second lockout devices in the lockout conditionscomprises securing first and second lock units to first and secondlockout interfaces of the first and second lockout devices.
 6. Themethod of claim 5, wherein the first and second data signals aregenerated by the first and second lock units.
 7. The method of claim 5,further comprising receiving a third data signal corresponding to thefirst lockout device being secured with the first component in thelockout condition, the third data signal including at least a thirdidentification code corresponding to the first lock unit, and receivinga fourth data signal corresponding to the second lockout device beingsecured with the second component in the lockout condition, the fourthdata signal including at least a fourth identification codecorresponding to the second lock unit.
 8. The method of claim 5, whereinthe first lock unit comprises a first padlock and the second lock unitcomprises a second padlock.
 9. The method of claim 5, wherein the thirdand fourth data signals are generated when the first and second lockunits are placed in a locked condition.
 10. The method of claim 5,wherein the first and second data signals are generated when the firstand second lock units are secured to the first and second lockoutinterfaces.
 11. The method of claim 5, further comprising identifyingsystem users that locked out the first and second components based onthe third and fourth identification codes.
 12. The method of claim 1,wherein the first and second data signals are generated when the firstand second lockout devices are moved to the lockout condition.
 13. Themethod of claim 1, wherein the first and second data signals aregenerated by first and second RFID tags.
 14. The method of claim 1,wherein the first and second data signals are received at a receiverproximate to the first and second components.
 15. The method of claim14, wherein the receiver comprises one of a smart phone and an RFIDreading device.
 16. The method of claim 1, wherein the first data signalis received at a first receiver proximate to the first component, andthe second data signal is received at a second receiver proximate to thesecond component.