MAKING A WORK ENVIRONMENT SAFE USING AT LEAST ONE ELECTRONIC BEACON AND AN ELECTRONIC TAG
20210056654 ยท 2021-02-25
Inventors
- Benoit BELLAVOINE (Forest-sur-Marque, FR)
- Mathieu CARON (Betton, FR)
- Sebastien DO (Lille, FR)
- Pierre DZIWNIEL (Chereng, FR)
Cpc classification
H04W4/80
ELECTRICITY
G06Q10/109
PHYSICS
G01S1/68
PHYSICS
H04L67/52
ELECTRICITY
H04W4/021
ELECTRICITY
H04L41/0806
ELECTRICITY
International classification
G01S1/68
PHYSICS
G06Q10/06
PHYSICS
Abstract
The present invention relates to a method and apparatus for making a work safe using at least one electronic beacon and an electronic tag carried by an operator. The beacon and the tag are capable of communicating with one another using a communication scheduler implementing a communication management algorithm. The work environment includes at least one exclusion zone for the operator.
Claims
1. A method for making a work environment safe using at least one electronic beacon and an electronic tag carried by an operator, said beacon and said tag being capable of communicating with one another using a communication scheduler implementing a communication management algorithm, wherein said work environment comprises at least one exclusion zone for said operator, said method, implemented by computer-based means and said communication scheduler, includes: a) an initial configuration phase comprising the following steps: beaconing in which said at least one electronic beacon is positioned in the work environment so as to delimit said exclusion zone; and modelling the exclusion zone by generating a virtual safety cordon according to the positioning of said at least one beacon in the work environment, b) followed by a subsequent use phase comprising the following steps: measuring the distance of the electronic tag relative to said at least one beacon; determining the relative position of said operator in the work environment according to the measured distance; and generating, via said tag, a warning signal for said operator when said operator crosses said virtual safety cordon.
2. The method according to claim 1, wherein the beaconing step comprises positioning a single electronic beacon to delimit the exclusion zone in order to generate, during the modelling step, a virtual safety cordon in the form of a virtual circle, the radius whereof corresponds to a determined safety distance around said beacon.
3. The method according to claim 1, wherein the beaconing step comprises positioning at least two beacons at the periphery of said at least one exclusion zone in order to generate, during the modelling step, a virtual safety cordon in the form of a corridor comprising at least one segment defined by said at least two beacons.
4. The method according to claim 1, wherein, during the measuring step, the distance between said electronic tag and each beacon is measured.
5. The method according to claim 1, wherein the at least one beacon and said tag are capable of communicating with one another according to a communication protocol of the UWB type configured so as to determine the distance between the tag and said at least one beacon.
6. The method according to claim 1, wherein, during the modelling step, the distances of the successive beacons, in pairs, are measured in the order in which they were configured so as to determine segments.
7. The method according to claim 3, wherein said at least two beacons are capable of communicating with one another according to a communication protocol of the UWB type configured so as to determine the distances between said at least two beacons.
8. The method according to claim 3, wherein the relative position of said operator in the work environment is determined as a function of the distances from said tag to the closest segments of said exclusion zone.
9. The method according to claim 1, wherein said operator is provided with a communication terminal implementing software functions configured so as to receive said warning signal and inform said operator by way of an audible, vibratory and/or light signal.
10. The method according to claim 1, wherein said operator is provided with a communication terminal implementing software functions configured so as to provide global position information for said operator in the work environment and display, during a display step, the digital model of said work environment with the position of said operator as a function of the global position information and the relative position of said operator determined during the determination step.
11. The method according to claim 1, wherein the electronic tag (T) is provided with at least one additional sensor of the accelerometer type for example, capable of detecting, during a step a fall and/or potential accident for example when said operator crosses the virtual safety cordon and penetrates said exclusion zone.
12. The method according to claim 11, wherein each operator is provided with a tag and is warned by an audible, vibratory and/or light signal when entering an exclusion zone, in the case of a fall and/or in the case of a possible accident suffered by one of said operators.
13. The method according to claim 1, which method comprises, during the use phase continuous self-diagnostics so as to detect the displacement and/or failure of at least one beacon and alert at least one operator thereof.
14. The method according to claim 1, wherein the relative position of said operator in the work environment is determined according to a period determined dynamically as a function of the distance measured between the last position of said operator and the virtual safety cordon.
15. The method according to claim 14, wherein the greater the distance measured between the last position of said operator and the virtual safety cordon, the longer the period for carrying out the next determination step.
16. The method according to claim 1, wherein the generation of said warning signal is carried out as a function of the determined authorisation level associated with the operator carrying said electronic tag, said authorisation level being previously recorded in storage means of said tag.
17. A computer program comprising instructions suitable for executing the steps of the method according to claim 1, when said program is executed by at least one processor.
18. A non-transitory computer-readable recording medium on which a computer program is recorded, said computer program comprising instructions for executing the steps of the method according to claim 1.
19. A computer system for making a work environment safe using at least one electronic beacon and an electronic tag carried by an operator, said at least one beacon and said tag being capable of communicating with one another using a communication scheduler implementing a communication management algorithm, wherein said work environment comprises at least one exclusion zone for said operator, said system including: at least one electronic beacon positioned in the work environment so as to delimit said exclusion zone; and computer modelling means configured to digitally model the exclusion zone by generating a virtual safety cordon according to the positioning of said at least one beacon in the work environment, measuring means configured to measure the distance from the electronic tag to said at least one beacon; computer processing means configured to determine the relative position of said operator in the work environment according to the measured distance; and generating means integrated into said tag, for generating a warning signal for said operator when said operator crosses said virtual safety cordon.
20. (canceled)
Description
BRIEF DESCRIPTION OF THE ACCOMPANYING FIGURES
[0129] Other features and advantages of the present invention will be better understood upon reading the description hereinbelow with reference to the accompanying
[0130]
[0131]
[0132]
[0133]
DETAILED DESCRIPTION OF ONE ADVANTAGEOUS EXAMPLE EMBODIMENT
[0134] The present invention will be described hereinbelow with joint reference to
[0135] Pro memoria, one of the purposes of the present invention is to propose an innovative approach for making safe a work environment ZT of the worksite type for example, comprising one or more exclusion zones ZD corresponding, for example, to a danger zone in which a hazard to the operator is present, such as, for example, an electrocution or other hazard.
[0136] In the example described here, reference is made to a situation of the type involving making safe an industrial worksite with a work environment ZT corresponding to a work zone and comprising a danger zone ZD (
[0137] In this example, this more particularly involves defining, within the worksite ZT, the danger zone ZD in a substation in order to make safe the intervention of technicians during maintenance works on the worksite ZT.
[0138] It is understood here that this is a simple example among others and that the invention applies to other situations and other fields such as those listed hereinabove.
[0139] In the example described here and shown in
[0140] In this case, each operator moving on the worksite ZT must be equipped with a tag T and optionally with a communication terminal SP of the Smart Phone type for example, capable of communicating with the tag T.
[0141] One of the purposes of the present invention is to allow for the deployment of a system 100 that is easy to install, autonomous with regard to power and that does not require the use of a master device of the gateway type, the challenge in this case being to quickly and easily make potential danger zones able to communicate with the operators by way of connected objects.
[0142] To achieve this, the underlying concept of the present invention is to use the beacons B to delimit the danger zones ZD and determine a virtual safety cordon CSV that the operator must not cross.
[0143] Thus, the use of a software application is provided to configure the system 100, during an initial phase P1, and in particular to digitally model the segments SC of the virtual safety cordon CSV corresponding to the different danger zones ZD.
[0144] Thus, during this phase P1, a beaconing step S1 is provided, during which the safety manager on the worksite ZT positions a plurality of electronic beacons B on the worksite to delimit the one or more danger zones ZD of the worksite ZT.
[0145] The former thus positions the beacons B in order to virtually recreate the danger zones ZD on the worksite ZT thanks to specific computer-based means and in particular a dedicated software application installed on the communication terminal SD thereof.
[0146] More specifically, in this example, the manager positions a first beacon B on the worksite ZT at the periphery of the danger zone ZD.
[0147] Once installed, the manager powers the beacon using one of the external batteries provided. The manager then scans the beacon using the dedicated software installed on his/her communication terminal SP: [0148] either, for example, via NFC by simply placing the terminal SP on this first beacon B, [0149] or via a QR Code by scanning the code present on the beacon B.
[0150] After a few seconds, the software application informs the manager that the beacon B has been detected and configured.
[0151] The manager then carries out the same operations for the other beacons B.
[0152] Once all of the beacons B have been positioned on the worksite ZT, the manager confirms the creation of the danger zone ZD using the software application.
[0153] This phase P1 for configuring the worksite then includes a modelling step S2. In this example, a tag T carried by the manager is ideally connected in this step to the terminal SP thereof, for example via a wired connection (USB) or via a wireless connection (Bluetooth).
[0154] This tag T connected to the communication terminal SP is used to detect each of the beacons B installed and determine the location thereof relative to one another.
[0155] This modelling S2 carried out by computer modelling means and the dedicated software application allows the composition and the features of the segments SC of the virtual safety corridor CSV delimiting the danger zone ZD to be determined.
[0156] This is referred to as a perimetric approach.
[0157] During this step S2, the distances d2 between each of the beacons B are measured then compared to determine segments SC of the corridor between the beacons B.
[0158] This distance d2 between each beacon B corresponds to the distance between two successive beacons, in pairs, in the order in which they were configured. It is these successive beacons that allow the shortest segments SC to be determined.
[0159] Once the configuration is complete, the modelling of this corridor CSV is confirmed by the manager, then shared with the other users. This danger zone ZD is instantly transmitted to the other technicians present on the worksite ZT.
[0160] The manager continues this configuration phase P1 and repeats these different steps for all of the danger zones ZD that he/she would like to define and model by way of a virtual safety cordon CSV.
[0161] It should be noted here that, in this example, the electronic beacons B are positioned to complement an existing physical marker producing used integrated adhesive tapes.
[0162] Preferably, the beacons B are positioned at height for maximal system precision. The minimum height is preferably equal to about 50 cm.
[0163] In this example, the manager ensures that, during this phase P1, certain rules are respected, in particular the spacing between the beacons B. This is flexible and depends on the restrictions of the environment (presence of obstacles, electromagnetic fields, etc.). This spacing generally varies between five and twenty metres.
[0164] The Applicants have observed that the installation and the configuration of a beacon B within the scope of the present invention take less than a minute.
[0165] Once the beaconing operation S1 has been configured and the modelling operation S2 of all of the danger zones ZD has been completed, the staff can safely work on the worksite ZT.
[0166] This is when the so-called use phase P2 begins.
[0167] During this phase P2, each operator working on the worksite ZT connects the electronic tag T that he/she is carrying with his/her communication terminal SP; this can be carried out either via a wired connection of the USB type for example, or via a wireless connection of the Bluetooth type.
[0168] Preferably, the operator carries the tag T on his/her person in the most practical location possible (arm, torso, helmet, pocket, etc.).
[0169] Using the software application, the operator inputs his/her electronic tag T then starts the location service.
[0170] The operator can then put his/her terminal SP away; the operator's safety is now assured.
[0171] The tag T of the carrier more specifically procures the location thereof with respect to the danger zones ZD previously defined using the beacons B.
[0172] In the example described here, a measurement S3 of the distance d1 from the electronic tag T to each beacon B is made using measuring means.
[0173] This measurement S3 is made thanks to the establishment of communications between the beacons B and the tag T via UWB-type radio technology.
[0174] This UWB technology more specifically allows the distance between two objects to be calculated thanks to the ToF (Time of Flight): the propagation delay of a radio wave between two objects is measured to determine the distance separating them.
[0175] In the example described here, it should be noted that the tag T only seeks to calculate the distance d1 thereof from a limited number of beacons B (depending on the last position calculated and the positioning of the beacons on the site) so as to limit the number of messages exchanged and thus prevent the network from becoming congested while limiting power consumption.
[0176] In the example described here, the distance d1 between the tag T and each relevant beacon B is known.
[0177] In the example described here, the TWR (Two Way Ranging) mechanism based on the ToF is implemented to determine the distance between two objects.
[0178] This works as described below:
[0179] The tag T exchanges messages with all nearby beacons B to determine the distance thereof from each of the latter.
[0180] In this case, it is thus the tag T that carries the positioning logic. It calculates the distance information relative to the beacons B and then determines the relative position thereof on the worksite ZT.
[0181] Such an approach requires neither a master entity, nor a network connection.
[0182] Alternatively, a TDoA (Time Difference of Arrival) mechanism can be used. In this alternative, the tag transmits a single message. This message is received by the nearby beacons B and it is the time difference between when the message is received by the different beacons B that allows the position of the tag T to be determined.
[0183] In this alternative, the beacons B carry the positioning logic for the tag T. The tag T transmits a message; the beacons B receive this message and transmit it to a master entity via a network communication (generally Wi-Fi or Ethernet), which determines the position of the tag T. However, this alternative is less advantageous since it requires a master device for synchronising the clocks of the beacons, as well as a dedicated network over which all beacons B and the master device are connected.
[0184] It should be noted in this case that a communication scheduling solution should ideally be set up, allowing each entity to communicate in turns so that a radio communication over a given frequency is functional. More specifically, two messages cannot be exchanged at the same time.
[0185] Collisions between messages are thus avoided in the example described here by implementing a communication scheduler integrated into each of the beacons B and the tags T.
[0186] In the description below, a time slot is thus defined as a time unit required to ensure that a message is transmitted and received by the entity to which it is addressed. This slot corresponds to the maximum time required, the transmission time for a message being dependent on the size thereof. In other words, this slot is not equal to the transmission time of the message, but to the time required to ensure that this message does not collide with another message.
[0187] In this example, the communication scheduler is configured as follows:
[0188] The communication cycle of a beacon B during a phase P2 is broken down into six periods ranging from 1) to 6): [0189] 1) the beacon B is in an active waiting state for a random period of time (defined in tenths of the time slot). During this waiting period, it listens to the radio exchanges around it; [0190] 2) the beacon B transmits a message of the BeaconStart type indicating to the other entities around it that it is available for receiving messages; [0191] 3) the beacon listens for a determined number of time slots to the messages sent by the other entities; [0192] 4) It transmits a message of the BeaconEnd type indicating that it is no longer available for receiving messages and that it is going to reply to the messages received since the transmission of the BeaconStart message; [0193] 5) It transmits the replies linked to the messages received during the period 3); and [0194] 6) It goes to sleep for a given period of time, allowing the other beacons B the possibility of carrying out their communication cycle in turn (during this period, it can neither send nor receive any messages).
[0195] The random waiting period is defined in 1) as follows:
[0196] During the period 1), if the beacon B detects a message transmitted by another entity, it reacts accordingly: [0197] It detects a message of the BeaconStart type transmitted by another beacon. In such a case, it ends its random active waiting state and awaits a message of the BeaconEnd type. [0198] It detects a message of the BeaconEnd type transmitted by another beacon. In such a case, it resets its active waiting time (it restarts its phase 1). [0199] It receives any other type of message. In such a case, if the active waiting time remaining is less than a communication time slot, it increments the latter by one slot.
[0200] For certain messages of the chain message type (messages to be relayed by the beacons on the network), the beacon can temporarily place itself in tag operating mode (refer to the operation of the tag T).
[0201] The power consumption of each beacon can be optimised.
[0202] In this example, the duration of the active listening period 3) can be dynamically adapted as a function of the number of messages received during the period 3) of the previous communication cycle by retaining a number of slots equal to the number of messages received +1.
[0203] A period of inactivity (period 6) can also be provided, which is dependent on the number of beacons B used and on the number of beacons B and of tags T within communication range. It thus dynamically adapts gradually over time between a minimum duration allowing all elements of the devices to communicate without colliding and a maximum duration ensuring that the system 100 is reactive enough to locate nearby tags. After a certain number of cycles during which no messages were received, the beacon switches to a partial standby state (maximum time of inactivity).
[0204] Finally, a filtering of the MAC type can also be provided so as not to process the messages received if they are not addressed thereto and thus reduce power consumption.
[0205] The communication cycle of a tag T is broken down into five periods ranging from 1) to 5): [0206] 1) the Tag T listens to the transmission of a BeaconStart type message transmitted by one of the beacons B with which it would like to communicate; [0207] 2) upon receiving a BeaconStart message, it randomly chooses a communication slot and sends a message to the beacon B having transmitted the message; [0208] 3) the tag T switches to an active waiting state until it receives and processes the reply from the beacon; [0209] 4) if it has to communicate with another beacon B, it returns to period 1); [0210] 5) it goes to sleep for a determined period of time (during this period, it can neither send nor receive any messages).
[0211] In the example described here, certain power consumption optimisations can also be provided as regards the operation of the tag T.
[0212] As a function of the last calculated position thereof, the period of inactivity is dynamically updated. The greater the distance from the tag T to the closest danger zone ZD, the longer the period of inactivity.
[0213] So as to affect neither the reactivity of the system, nor the performance thereof, the maximum displacement rate of a tag T from a danger zone ZD (if associated with a moving object) is taken into account when calculating the duration of the next period of inactivity.
[0214] It should be noted that the tag T can also be switched to a standby state for an indefinite period of time through an action taken by a user.
[0215] In the example described here, MAC filtering is applied so as not to process the messages received that are not addressed thereto and thus reduce power consumption.
[0216] The determination of the measurement S3 of the distances between the tag T and each relevant beacon B is used to determine S4 the relative position of the operator in the work environment ZT as a function of the distance measured d1.
[0217] The approach proposed here more specifically focuses on locating the operators in the vicinity of the danger zones ZS only, i.e. where this is the most relevant and most important, and not on spatial location as such.
[0218] When crossing a segment SC of the virtual safety cordon CSV, the tag T of the carrier carries out an operation S6 of generating a warning signal s intended for said operator.
[0219] In this example, the signal s is transmitted to the communication terminal SP, which then generates the alert (audible and/or visual and/or vibratory alert).
[0220] It should be noted here that external connectivity is not required for the system to function correctly, however it allows crossed perimeter alerts to be transmitted outside the worksite.
[0221] In the nominal case, the alerts are local and transmitted via the UWB tag and beacon network. However, it should be noted that, if a network connectivity is available, the alert can be sent directly to the rescue services or to a control room for example.
[0222] The present invention provides an advantageous securing system allowing a worksite to be quickly and easily made safe, without the restrictions encountered to date. The system does not impose any specific restrictions as regards the installation of the beacons: any need for prior site inspection or a specific configuration is thus avoided (the system does not need to comply with strict installation and calibration rules).
[0223] The system transmits alerts in all situations: [0224] intentional crossing or as the result of a confused user; [0225] deterioration of the beaconing system or system failure (beacon or tag); and [0226] crossing or fall of a third party (shared alert).
[0227] The system set up is also resilient, i.e. it is capable of performing continuous self-diagnostics to detect the displacement or failure of any beacon B and transmit, where appropriate, the information to the operators.
[0228] Since the beaconing is able to communicate; it can thus, in an active manner, inform all operators, even in cases of confusion.
[0229] During the phase P2, it should be noted that an operation S5 can be provided to display the digital model of the work environment ZT, the beaconing of the danger zone ZS and the relative position of the operator.
[0230] This display can also take into account the global position information from a GPS or other device in the communication terminal.
[0231] It should also be noted that the tag T can be equipped with additional sensors of the accelerometer type for example, to detect, during a step S7, any fall and/or accident when an operator crosses the virtual safety cordon CSV and enters said exclusion zone ZD.
[0232] The implementation example shown in
[0233] With conventional approaches (volumetric approaches), the displacement of the danger zone inevitably involves the displacement of the beacons and that of the gateway. This displacement of the danger zone also involves a reconfiguration and/or recalibration thereof to redefine the new danger zone.
[0234] It is understood here that this operating mode is highly restrictive and prevents the solution from being a real option in such an application since the installation, configuration, power supply and network connectivity restrictions are very high.
[0235] This is especially so, since for this type of worksite, displacements are frequent and the danger zone can extend over long distances.
[0236] With the perimetric approach proposed within the scope of the present invention, the danger zone ZD can be translated T by a simple translational displacement of the beacons B along the road VC.
[0237] According to this approach, for a moving worksite, there is no longer any need to reconfigure the gateway and repeat the entire installation process.
[0238] Similarly, worksites spanning a large area can be made safe.
[0239] With the techniques known to date, according to the volumetric approach, a very high number of beacons and of gateways around the work zone and each danger zone needed to be configured.
[0240] The volumetric approach was thus highly restrictive for worksites spanning a large area. More specifically, as explained hereinabove, the restrictions regarding the installation, configuration, power supply and network connectivity are very high.
[0241] With the perimetric approach proposed within the scope of the present invention, and as shown in
[0242] It should be noted that this detailed description concerns one specific example embodiment of the present invention, however in no way does this description limit the subject matter of the invention in any way: on the contrary, it aims to remove all possible imprecisions or all incorrect interpretations of the claims provided hereafter.
[0243] It should also be noted that the reference signs placed in brackets in the claims provided hereafter are in no way limiting; the sole purpose of these signs is to improve the intelligibility and understanding of the claims provided hereafter, in addition to the desired scope of protection.