System for Recording an Inventory of Monitoring Objects of a Plant

20170220995 · 2017-08-03

Assignee

Inventors

Cpc classification

International classification

Abstract

Systems and methods for recording an inventory of monitoring objects (1) of a plant (4) having a multiplicity of fixed or non-fixed areas (5) where monitoring objects (1) can be located. The plant (4) is suitable for carrying out sequences of operations using the monitoring objects (1) and has a multiplicity of detection devices (6) which are each assigned to an area (5) of the plant (4). The monitoring objects (1) are in each case provided with preferably contactlessly readable identification elements (3), which have a unique identifier. The detection devices (6) have a data connection to an arithmetic unit (7), which manages an inventory database (8).

Claims

1. A system for recording an inventory of monitoring objects of a plant having a multiplicity of fixed or non-fixed areas where monitoring objects can be located, wherein the plant is suitable for carrying out sequences of operations using the monitoring objects, wherein the plant has a multiplicity of detection devices which are each assigned to an area of the plant, and the monitoring objects are in each case provided with preferably contactlessly readable identification elements which have a unique identifier, wherein the detection devices have a data connection to an arithmetic unit which manages an inventory database.

2. The system according to claim 1, wherein the plant has at least one detection device or a group of detection devices which is/are suitable for determining position.

3. The system according to claim 1, wherein the system has a multiplicity of object groups which can comprise one or more monitoring objects.

4. The system according to claim 1, wherein the arithmetic unit has means for checking whether a given sequence of operations of the plant can be implemented with the existing monitoring objects or object groups.

5. The system according to claim 1, wherein the plant is part of an intelligent manufacturing line and the sequence of operations is a production process.

6. The system according to claim 1, wherein the plant is part of a test environment and the sequence of operations is the implementation of a test, an experiment and/or a measuring process,

7. The system according to claim 3, wherein the system comprises a bridging device for a housing of an object group, which has a plurality of monitoring objects, wherein the housing has a shielding effect, wherein the bridging device has an internal antenna, an external antenna and a gateway, which enable identification elements arranged in the housing to be detected via the external antenna.

8. A method for mapping an inventory of monitoring objects of a plant in an inventory database, wherein the plant has a multiplicity of detection devices which are each associated with an area of the plant, and wherein the monitoring objects have identifying elements which can be read, preferably contactlessly, by the detection devices, wherein the method has the following steps: reading out by means of a detection device assigned to an area of at least one unique identifier from at least one contactlessly readable identification element which is present in the appropriate area, determination of a particular monitoring object to which the identifier read from the identification element is assigned, determination of data which relate to the monitoring object, storage or updating of the data in the inventory database.

9. The method according to claim 8, wherein the method also has the following steps: determination of an object group to which a particular monitoring object is assigned, determination of data which relate to the object group, and storage or updating of the data in the inventory database.

10. The method according to claim 8, wherein the read-out is initiated at controlled intervals and/or on the occurrence of an event.

11. The method according to claim 8, wherein the method also has the step of checking the integrity of a monitoring object and/or an object group,

12. The method according to claim 8, wherein it is checked whether a planned activity with the plant can be carried out with the monitoring objects or object groups present in the plant and, if necessary, a warning is output.

13. The method according to claim 8, wherein data from the database are transmitted to a service provider remote from the plant.

14. A bridging device for a housing of an object group, which has a plurality of monitoring objects, which are each provided with contactlessly readable identification elements which have a unique identifier, wherein the housings has a shielding effect, wherein the bridging device has an internal antenna, an extern& antenna and a gateway, which enable identification elements arranged in the housing to be detected via the external antenna.

Description

[0031] The present invention is explained in more detail below with reference to FIGS. 1 to 3, which show advantageous embodiments of the invention in an exemplary, schematic and non-restricting form. In the drawing

[0032] FIG. 1 shows a schematic diagram of a plant which is provided with the system according to the invention;

[0033] FIG. 2 shows a schematic diagram of an object group in a housing which is provided with the bridging device according to the invention; and

[0034] FIG. 3 shows a schematic diagram of the bridging device.

[0035] The references of objects which occur several times in the figures are supplemented by lowercase letters to enable differentiation.

[0036] In a schematic diagram, FIG. 1 shows a plant 4 which is divided into five areas 5a-5e. These areas represent different spatially limited parts of the plant, for example machining centers, transport devices, storage areas, test rigs, etc. A multiplicity of different monitoring objects 1a-1h can be located in each area, wherein each monitoring object is provided with an identification element. (In FIG. 1, only the identification element 3a of the monitoring object 1a is provided with a reference for reasons of clarity.) Each identification element has a unique identifier which can be read by appropriate detection devices 6a-6l. Reading can preferably be carried out contactlessly, for example the identification element 3a can be an RFID tag and the detection device 6a can be an RFID scanner which detects the RFID tag in the appropriate area 5a and reads its identifier. The connections 14a-14e between the areas 5a-5e represent transport paths on which the monitoring objects 1 can pass from one area to another.

[0037] The areas can each have a plurality of detection devices 6a-6l. For example, five detection devices 6h, 6i, 6j, 6k, and 6l are arranged parallel to one another along the area 5e and each scan a certain part of the area 5e. The area 5e could represent a conveyor device or a production or test line, for example, wherein the position in which monitoring objects 1e to 1h present in the area 5e are currently located can be determined by the detection devices 6h to 6l. In the case of conveyor devices, the monitoring objects could be transport containers for example. On the other hand, the elongated area 5e could be a long workbench or laboratory bench on which the monitoring objects 1e to 1h, for example tools, analytical apparatus, sample holders or other monitoring objects, can be located. The alignment of the detection devices 6h to 6l enables the respective position of the monitoring objects to be determined very accurately, wherein a particularly high positional accuracy can be achieved by overlapping scanning areas, as is shown by way of example in the case of the monitoring object 1h, which is located both in the scanning area of detection device 6k and in the scanning area of detection device 6l.

[0038] The scanning operations of the individual detection devices can be matched to one another with regard to their time sequence and/or their wireless frequency such that they do not mutually interfere with one another.

[0039] Two detection devices 6f and 6g are arranged in area 5d such that their sensor directions intersect, wherein each of the two sensor ranges has substantially the same surface area as area 5d. The respective sensor ranges of the detection devices are shown in the figures as dotted wave patterns by way of example. The actual extent of the sensor ranges can differ considerably from the diagram, as is clear to a person skilled in the art. With the help of position-finding techniques, such as the TOA (“Time of Arrival”) method for example, with the help of phase shifts or using angle-dependent methods, the intersecting sensor ranges allow not only the presence but also the position of the monitoring objects located in area 5d to be determined (in the case shown, the monitoring object 1d). It is also possible to use other position-finding techniques which are based, for example, on the distance, wherein the position can be measured by means of the signal run time or the signal strength, for example (examples of this include the ToA, TDoA, E-OTD, RTT or RSSI methods), on the direction, wherein the position can be measured, for example, by means of angular relationships, for example by triangulation or trilateration (such as in the AOA or DOA method for example), on the neighborhood relationships (examples of these include the CoO “Cell of Origin” method), other methods known to the person skilled in the art or on combinations of these methods.

[0040] By measuring the position, not only can the position of an individual monitoring object be determined, but a plurality of monitoring objects and their respective relative positions to one another can also be determined. Evaluating these relative positions also enables very complex groupings of monitoring objects to be detected and evaluated accordingly. Determination of the position can be extended even to a three-dimensional area by providing one or more further detection devices, for example.

[0041] Areas 5a and 5c are in each case provided with only a single detection device 6a and 6e respectively, which in each case only determine the presence of the respective monitoring objects 1a, 1b and 1c in the respective area 5a, 5c.

[0042] In an advantageous manner, not only the areas themselves, but also the transitions between areas can be monitored. In FIG. 1, the connection 14a between the areas 5a and 5b is monitored by a dedicated detection device 6b which detects when a monitoring object changes from one area to another. The detection device 6b can be arranged in a door opening between two rooms, for example, or in another place which a monitoring object must necessarily pass to get from one area to the next. Basically, a system according to the invention can be continuously monitored by scanning for monitoring objects only at the connections 14a-14e between the individual areas 5a-5e. In doing so, it is not essential for the detection devices arranged at the connections to be able to also determine the direction of movement of the detected monitoring object, as, in a closed system, it is known where each monitoring object is currently located at all times and therefore the origin of the monitoring object which is currently moving through a detection gate is known. However, the provision of redundant detection devices can reduce the susceptibility to errors and increases the reliability of the system.

[0043] In order to enable an overall picture of the monitoring objects in the plant 4 to be obtained at any time, all detection devices 6a to 6l are connected to an arithmetic unit 7 which records and stores all detection events in an inventory database 8, from which the system state of the plant 4, i.e. the monitoring objects present in the areas 5a-5e and possibly their positions, can be determined at any time. The arithmetic unit can also be used for coordinating the timing of the scanning operations carried out by the individual detection devices.

[0044] The exact design of the areas is dependent on the particular application, and the arrangement of the detection devices can be adapted specifically to suit the particular conditions of use. The configurations shown here constitute only exemplary and not restricting embodiments. Different types of detection devices and identification elements can also be used, wherein contactless and tactile systems can be used in any combination.

[0045] The evaluation of the detected monitoring objects in the arithmetic unit 7 enables a plurality of monitoring objects, which are part of a functional unit for example, to be combined to form an object group. For example, the monitoring objects 1b and 1c, which are detected by the detection device 6e in area 5c, form an object group 2a.

[0046] A further object group 2b, which is arranged in area 5b in the sensor range of detection device 6d, is shown enlarged and in more detail in FIG. 2. The object group 2b shown in FIG. 2 comprises the monitoring objects 1u, 1v, 1w and 1x, which in each case are provided with a detection element 3u, 3v, 3w and 3x, respectively. The detection elements are RFID tags which can be read contactlessly per se by the detection device 6d, an RFID sensor. However, the monitoring objects 1u, 1v, 1w and lx are arranged in a common housing 9 which is provided with its own identification element 3i. The housing 9 with the identification element 3i therefore likewise constitutes a monitoring object. The object group 2b therefore consists of the monitoring objects 1u, 1v, 1w and lx and the housing 9, which form a common unit.

[0047] As indicated by the schematically shown sensor range of the detection device 6d, the RFID signals are shielded by the housing 9. This has the consequence that, although the detection device 6d is able to read the identification element 3i attached to the outside of the housing 9, it cannot read the identification elements 3u, 3v, 3w and 3x of the monitoring objects 1u, 1v, 1w and 1x, which are enclosed in the housing.

[0048] If, for example, the object group 2b is a device to be tested which is arranged in a test environment, it would therefore be possible with a fixed detection device 6d to detect that the device (that is to say the object group 2b) were located on the test rig (that is to say, for example, the area 5b shown in FIG. 1), however it would not be possible to draw conclusions relating to the exact configuration of the measuring sensors located inside the device (that is to say the housing 9), and their identification elements are therefore shielded and cannot be read.

[0049] To solve this problem, according to the invention, the housing has a bridging device 13 which enables the detection device 6d to also read the identification elements 3u, 3v, 3w and 3x present inside the housing from the outside. In a simple embodiment, this device consists substantially of an external antenna 11 arranged on the outside of the housing, an internal antenna 10 arranged on the inside of the housing, and a gateway 12 which provides a transmission of signals between the external antenna 11 and the internal antenna 10.

[0050] In a very simple form, the gateway could be formed as a simple connecting cable between external antenna and internal antenna; however, this simple embodiment would quickly come up against technical limits.

[0051] The transmission device 13 is shown once more in more detail in FIG. 3. The external antenna 11 and the internal antenna 10 can in each case be conventional RFID antennae, which can be integrated into a label or another non-shielded housing, for example. The gateway 12 can be supplied by the energy received by the external antenna, or it can operate from its own current source, such as a battery 15, for example, or some other alternative energy source, such as a solar cell, for example, which uses the ambient lighting for generating energy. The gateway can receive and transmit RFID signals both via the external antenna 11 and the internal antenna 10. In the exemplary embodiment shown in FIG. 3, the gateway is arranged on the outside of the housing; however, it can also be provided inside the housing with the internal antenna. The internal antenna 10, and also the external antenna 11, could in each case be provided with a transponder element, wherein the two transponder elements communicate with one another and by this means form the gateway.

[0052] The gateway 12 is connected to the internal antenna by means of the connection 16. The connection can be designed as a simple cable connection which is fed via a hole. At the same time, the connection 16 can also be designed as a fixing element, by means of which the internal elements of the transmission device (in the case shown, the internal antenna 10) are connected to the external elements (in the case shown, the gateway 12 and the external antenna 11). Such connections, such as screw, plug-in, riveted or adhesive connections for example, are well known by the person skilled in the art. If necessary, the material of the housing 9 can also be used for the communication between internal antenna 10 and external antenna 11, for example by making use of the metallic conductivity of a metal housing for transmitting the data. In this case, an internal transponder connected to the internal antenna 11 and an external transponder connected to the external antenna, which together form the gateway 12, could be mounted opposite one another on the metal surface of the housing and communicate with one another across the housing wall via metal contacts. The internal and external elements of the gateway could be stuck to the housing, wherein they can also each be integrated into an adhesive label.

[0053] If the external antenna 11 is now activated by an RFID sensor signal 17a, which is emitted by the detection device 6d, the gateway 12 receives the signal and emits a corresponding signal 17b via the internal antenna 10 into the interior of the housing. The internal signal 17b can therefore be received by an RFID tag (e.g., the identification element 3u) inside the housing, as a result of which the identification element 3u is activated and outputs a response signal 17c which, in turn, can be received by the internal antenna 10. The response signal 17c of the RFID tag is processed in the reverse direction by the gateway 12 and emitted as a corresponding response signal 17d via the external antenna 11, thus enabling it to be received by the detection device 6d.

[0054] To avoid interference, the signals 17b and 17c can use a different frequency internally from that of the signals 17a and 17b processed by the detection device 6d. In conjunction with multiband RFID systems, this enables very complex and functionally stable systems to be created.

[0055] The gateway serves as a “hub” between the interior of a device, typically therefore inside a metal housing, and the exterior, typically the test rig cell in which the device is located. This enables communication between a read station (fixed to the test rig, that is to say mounted externally) and an RFID tag fixed to a component (located inside the housing). As the metallic housing of the device acts as a Faraday cage and shields HF fields, this communication would not normally be possible, that is to say without bridging device.

[0056] For RFID tags which are mounted directly on metal surfaces or which are to be read in a metal-rich environment, it is possible to use special RFID tags which are designed for this purpose. Such RFID tags are known to the person skilled in the art and they normally use special antenna arrangements which are less affected by the disturbing effects of the metallic environment.

[0057] The steps of a method, which can be carried out with the help of the described devices, are now described below by way of example. The method serves to map the inventory of monitoring objects, which are located in a plant, in a database and to keep this map up to date, preferably in real time.

[0058] With reference to the example shown in FIGS. 1 to 3, the unique identifiers of the identification elements (3a-3x) present in the areas (5a-5e) are read by means of the detection devices (6a-6l) assigned to the areas, if necessary using appropriate gateways 12. Alternatively and/or in addition, starting from a previously initialized starting status, all movements of detection elements between the areas (5a-5e) and across appropriately defined system boundaries are recorded in order to track the operating state of the plant. In areas which support position determination, movements within the area can also be recorded.

[0059] The identifiers read by the detection devices are evaluated by the arithmetic unit 7 to which the detection devices are connected, wherein, in each case, the particular monitoring objects to which the identifier read from the identification element is assigned is determined. The data relating to the particular monitoring object are then determined from the database 8, and the database is updated based on the detection event should updating be necessary. Updating is necessary in particular when the location of the monitoring object has changed, when the state of the monitoring object has changed, or when the monitoring object is added to an object group or removed therefrom. In order to determine whether the state of a monitoring object has changed, other data can also be taken into account, for example data which are derived from the sequences of operations that have been implemented. In this way, for example, the wear of a monitoring object can be determined based on the period of use. Maintenance and calibration intervals, for example, can also be determined in this way and warnings automatically output as soon as maintenance, calibration or replacement of a monitoring object has to be carried out.

[0060] Certain monitoring objects can be defined in the database as object groups. If a monitoring object which is assigned to an object group is now scanned, the method can carry out a check as to whether all other monitoring objects which are assigned to this object group are also present. If this is not the case, the system can output a warning, for example, or initiate a different workflow which has previously been defined for this case.

[0061] In other cases, the system can draw conclusions concerning the whole object group from the detection of a single monitoring object. If, for example, a change of location of individual monitoring objects or object groups is detected, the method can also change the location of all other monitoring objects of the same group. This can be expedient when the object group is permanently assembled and can only be moved together, and/or when there is a probability that some monitoring objects in a group cannot be detected due to shielding operations. Such a conclusion is permissible particularly when none of the monitoring objects of the group is simultaneously detected in a different area.

[0062] On the other hand, when a change in location of an individual monitoring object of an object group is detected, the conclusion could be drawn that an element of the object group has been removed from the group and the group is therefore no longer complete. This is the case particularly when other monitoring objects of the same group are detected in a different area at the same time.

[0063] In all cases, the detection of a certain event can lead to a warning being output or some different, previously defined workflow can be initiated.

[0064] The identification elements can be read on a timed basis, for example at certain intervals, and/or initiated on the occurrence of a certain event, for example when the status of the plant is requested during the scheduling of resources, or when an identification element is moved through a certain area (e.g., an RFID gate).

[0065] Furthermore, the method can provide steps for checking the integrity of monitoring objects and/or object groups. An integrity check can be carried out automatically, for example by scanning all identification elements of the group in the same area, wherein the spatial arrangement of the monitoring objects can also be checked as long as the system is equipped with appropriate position-finding techniques. If necessary, operator intervention may also be necessary to check the integrity. To this end, the system can output an alarm, for example, and request the user to take the necessary steps and to then rectify the matter. The database can then be supplemented/modified based on the confirmation. The integrity check can also include monitoring of the maintenance and/or replacement intervals of individual monitoring objects in an object group.

[0066] As, in this way, the inventory and state of the monitoring objects in a plant in the database is always kept up to date, it can be checked at any time whether a planned activity on the plant can be carried out with the monitoring objects or object groups present in the plant. This simplifies resource planning and also enables anticipatory planning of future deployment in distributed organizational structures. A team that takes over a plant, for example to implement a particular test sequence, can immediately check whether a previously defined operating state of the plant has been established. This considerably simplifies the handover from one team to the next. If necessary, automatic warnings can be output when the operating state differs from the planning state.

[0067] In an advantageous manner, monitoring of the maintenance state of the plant or individual parts thereof can also be realized by third-party providers with the system according to the invention, wherein the data which are to be transmitted to this service provider or which can be accessed by him, and which cannot, can be accurately controlled. In this way, for example, the data which serve to localize the monitoring objects remain locally with the proprietor or user of the plant, and only consistency data are passed on to the service provider. This considerably simplifies the planning of maintenance operations for the service provider, as he can make use of the relevant data at any time, and, in spite of this, the proprietor or user of the plant has the security that sensitive data, such as the structure of experimental and test systems for example, do not get into the hands of third parties.

[0068] The consistency data can also be used to detect possible fake products which are used in a system. Original products can be detected based on the serial number associated with the identification element, for example. Merely the fact that an object is provided with an identification element enables a conclusion to be drawn as to whether it is an original object. In order to detect fake identification elements, an encrypted code, the encryption of which can only be decrypted by the service provider or the producer of the original component, can also be stored on the identification element.