SYSTEM AND METHOD OF NEAR FIELD TRACKING, FEEDBACK AND CONTROL
20200125813 ยท 2020-04-23
Inventors
Cpc classification
G08B21/0275
PHYSICS
G08B21/0211
PHYSICS
G08B21/0269
PHYSICS
G08B7/06
PHYSICS
G06K7/10366
PHYSICS
G06K7/12
PHYSICS
G08B21/0261
PHYSICS
G08B29/188
PHYSICS
International classification
G06K7/12
PHYSICS
G06K7/14
PHYSICS
Abstract
The current system and method relate to a tracking and feedback system. More specifically, the system and method comprise a tracking apparatus attached to a tracked entity, reader nodes, a central management database including software platform, and a feedback system incorporated within the tracking apparatus and the central management database.
Claims
1. A system of tracking and communicating with a target in a designated zone, the system comprising: a wearable badge member having a synchronization module and a battery; said badge member mounted to said target and synchronized with a central management database and at least one reader node; said central management database communicatively coupled with said badge member and said at least one reader node; and said at least one reader node positioned in said designated zone.
2. The system according to claim 1 wherein said badge member includes a charging module.
3. The system according to claim 1 wherein said badge member includes an alert module.
4. The system according to claim 3 wherein said alert module includes visual, audio, tactical or haptic feedback.
5. The system according to claim 1 wherein said badge member includes a wearer input module to include monitoring of vital signs, namely, a blood pressure monitoring sensor, a body temperature sensor, or a pulse rate sensor.
6. The system according to claim 1 wherein said at least one reader node has a determined tolerance level.
7. The system according to claim 6 wherein multiple reader nodes with set tolerances are placed in said designated zone.
8. The system according to claim 1 wherein said designated zone includes at least one infra-red sensor.
9. A system of identifying barrier breaks and alerting a central database comprising: at least one tag member synchronized with said central database; at least one reader node located near a designated zone and synchronized with said tag member; said at least one reader node synchronized with said central database; said tag member comprising an alert feature and said alert feature providing feedback information to said central database.
10. The system according to claim 9 wherein said designated zone includes at least one infra-red beam.
11. The system according to claim 9 wherein said at least one reader node comprises a tiered barrier break system.
12. The system according to claim 11 wherein said reader nodes are placed at designated access points for determined tolerance levels.
13. A method of near field tracking, management and control of a target in a designated zone, the steps comprising: identifying said designated zone; placing at least one reader node within or near said designated zone based upon tolerance modules; entering tracking data into a central management database; synchronizing said central management database with at least one tag module; connecting said at least one reader node and said at least one tag module with said central management database; and providing a feedback loop between said at least one tag module, said at least one reader node and said central management database.
14. The method according to claim 13 wherein said method includes incorporating an infra-red sensor.
15. The method according to claim 13 wherein said tracking data includes permissions for said target.
16. The method according to claim 13 wherein said feedback loop provides data on said target location.
17. The method according to claim 13 wherein said feedback loop provides data on hazard locations.
18. The method according to claim 13 wherein said at least one reader node may be set at variable tolerances.
19. The method according to claim 13 wherein said at least one tag module provides signaling to said target.
20. The method according to claim 13 wherein said at least one tag module and said at least one reader node are dimensionalized on said database.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
[0023]
DETAILED DESCRIPTION
[0024] The system and method are directed to a form of tracking with feedback and more particularly toward a system and method of identifying zones of risk within an environment and placing signal devices such as reader nodes and infra-red beams within the area of risk, identifying individuals or equipment, hereinafter referred to generally as entities, that may enter the zone of risk and entering key information into a central database including identification of individuals or entities, synching identification tags with the central database and placement of tags on entities that have pre-set permissions within identified access points, alerting with a feedback system if a tag crosses a zone of risk, providing real time data on zone information as well as data visualization and reporting. The program is capable of tracking, alerting and managing tracked entities within identified zones. Oil rigs, construction sites as well as any other type of high-risk sites need to monitor data real time for managing zones of risk as well as entities entering the zones to ensure maximum compliance with precautions.
[0025] As shown in
[0026] The badge includes a printed circuit board 13, that is a synchronization module, a lithium polymer rechargeable battery 17 and an inductive charger 19 which together comprise a charging module and are coupled to the device to charge the lithium battery and run the circuit board. As shown in
[0027] The central management system 21, to be discussed in further detail, can be set up with a system administrator that sets rules and permissions that may allow or restrict access for certain tracked entities within set geographic or positional spaces. An administrator can restrict or grant access to a certain geographic space according to GPS, facility or asset schematic, or other means as defined by the system administrator.
[0028] Once the zone of interest 29 is identified, as shown in
[0029] A second form of wearer input tag or module (not shown) is a wristband equipped with an RFID tag and/or blood pressure monitoring sensor, body temperature sensor, smart device and/or pulse rate sensor. This particular embodiment allows for direct contact with personnel making it possible to monitor vital signs, send text alerts and provide an audible alert.
[0030] As mentioned above and shown in
[0040] For example, the above described badge 15 is shown in
[0041] Referring to
[0042] There are illustrated in
[0043] A zone location feature may be integrated with a web-based program such as Google maps incorporating variables such as the location of various identified zones. The system can receive daily location and tracking updates via GPS, for example, through use of trackers on the equipment or with personnel. When personnel, for example, are logged in, the following may be available: personnel location, hazard zone location, personnel details including clearance for identified zones, history of personnel and location, automated location update, zone breaches, personnel vital signs, etc. The system provides the ability to link multiple zones and personnel or equipment for a single site and the ability to generate a status report on personnel and/or equipment.
[0044] The system may also be integrated with certain equipment to automatically restrict certain zones or areas during various operations. Examples of integration with possible equipment may include but are not limited to:
[0045] i. Derrick mounted top drive
[0046] ii. Traveling block
[0047] iii. Crane boom
[0048] iv. Charging of iron lines
[0049] v. Iron roughnecks
[0050] vi. Casing perforation guns
[0051] Incorporation of a module or tag on one of the above allows tracking of the entity or equipment within zones of interest and providing audible or visual feedback to operators of such equipment regarding potential hazards in the area. Further, equipment may be tracked in workspaces for reasons other than hazard management. Equipment may also be tracked to determine location and operational status.
[0052] The system and method also function to allow tracking and tracing of personnel for accountability purposes. A badge 15 with an RFID module 13, for example, may be placed on an asset or entity giving a supervisor or administrator the real time tracking data of all entities or assets in a proposed zone or workspace during real emergency situations and or simulated emergencies/drills. The badge/RFID modules may also be equipped with various sensors to continuously monitor routine vital signs such as body temperature, pulse rate, and respiration rate to continuously relay the health and well-being of all entities within the system and generate real time health data.
[0053] A separate function of the system is the relaying of logistics reports during routine operations as well as secondary and tertiary operations. All or particularly selected entities and/or assets may be tracked throughout parts of or during an entire operation to generate the production of raw data that may be analyzed by the software or by the user or users of the system and further correlated to show possible improvements in efficiency of operations or organizational patterns and practices.
[0054] The subject matter of this application may be practiced in a variety of embodiments as systems, devices, and other articles of manufacture or as methods. Embodiments may be implemented as hardware, software, computer readable media, or a combination thereof. The embodiments and functionalities described herein may operate via a multitude of computing systems including, but not limited to, desktop computer systems, wired and wireless computing systems, mobile computing systems (e.g., cell phones, netbooks, tablets or slate type computers, notebook computers, and laptop computers), hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, and mainframe computers.
[0055] User interfaces and information of various types may be displayed via on-board computing device displays or via remote display units associated with one or more computing devices. Interaction with the multitude of computing systems with which embodiments may be practiced include, keystroke entry, touch screen entry, voice or other audio entry, gesture entry where an associated computing device is equipped with detection (e.g., camera) functionality for capturing and interpreting user gestures for controlling the functionality of the computing device, and the like.
[0056] The figures provide illustrations of a variety of operating environments in which embodiments may be practiced. However, the devices and systems illustrated and discussed are for purposes of example and illustration and are not limiting of a vast number of computing device configurations that may be utilized for practicing embodiments of the invention described above.
[0057] In a basic configuration, the computing device 40 may include at least one processing unit 42 and a system memory 44. Depending on the configuration and type of computing device, the system memory 44 may comprise, but is not limited to, volatile storage (e.g., random access memory), non-volatile storage (e.g., read-only memory), flash memory, or any combination of such memories. The system memory 44 may include an operating system 45 and one or more program modules 46 suitable for running software applications 52 such as an engine 53 which may be configured implement one or more of the operations, features, processes or graphical user interface elements. The system may also include additional data storage devices 49 and 50 (removable and/or non-removable) such as, for example, magnetic disks, optical disks, or tape, input and output devices 51 and 54.
[0058] As stated above, a number of program modules and data files may be stored in the system memory 44. While executing on the processing unit 42, the software applications 52 may perform processes including, but not limited to, one or more of the processes, steps, features or functions. Other program modules that may be used may include electronic mail applications, database applications, or other conventional applications. Furthermore, embodiments may be practiced in an electrical circuit comprising discrete electronic elements, packaged or integrated electronic chips containing logic gates, a circuit utilizing a microprocessor, or on a single chip containing electronic elements or microprocessors. The computing device 40 may include one or more communication connections 56 allowing communications with other computing devices 58. Examples of communication connections 56 include, but are not limited to, RF transmitter, receiver, and/or transceiver circuitry; universal serial bus (USB), parallel, and/or serial ports.
[0059] The term computer readable media as used herein may include computer storage media. Computer storage media may include random access memory (RAM), read only memory (ROM), electrically erasable read-only memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other article of manufacture which can be used to store information and which can be accessed by the computing device 40. Any such computer storage media may be part of the computing device 40.
[0060] The system may also include a radio that performs the function of transmitting and receiving radio frequency communications. The radio facilitates wireless connectivity between the system and the outside world via a communications carrier or service provider. Transmissions to and from the radio are conducted under control of the operating system. In other words, communications received by the radio may be disseminated to the application programs via the operating system, and vice versa. A visual indicator may be used to provide visual notifications, and/or an audio interface may be used for producing audible notifications via an audio transducer.
[0061] In one form, the visual indicator can be a light emitting diode (LED) and the audio transducer is a speaker. These devices may be directly coupled to a power supply so that when activated, they remain on for a duration dictated by the notification mechanism even though the processor and other components might shut down for conserving battery power. The LED may be programmed to remain on indefinitely until the user takes some action to indicate the powered-on status of the device. The audio interface may be used to provide audible signals to and receive audible signals from the user. For example, in addition to being coupled to the audio transducer, the audio interface may also be coupled to a microphone to receive audible input, such as to facilitate a telephone conversation. The microphone may also serve as an audio sensor to facilitate control of notifications. The system may further include a video interface that enables an operation of an on-board camera to record still images, video streams, and the like.
[0062] Data/information generated or captured may be stored via the system or the data may be stored on any number of storage media that may be accessed by the device via the radio or via a wired connection between the badge or tag and a separate computing device associated with the tag, for example, a server computer in a distributed computing network, such as the Internet. As should be appreciated such data/information may be accessed via the badge via the radio or via a distributed computing network. Similarly, such data/information may be readily transferred between computing devices for storage and use according to well-known data/information transfer and storage means, including electronic mail and collaborative data/information sharing systems. The central management database can be updated from time to time to add rules and restrictions to tracked apparatuses inside the system. The updates will occur in real time to enable an administrator to track and control the movements of the tracked entities.
[0063] In use, there are preferably four major hardware components:
[0064] 1. Communication Tags
[0065] 2. Reader Nodes
[0066] 3. PC Reader
[0067] 4. Alarm or Alert Module
[0068] The communication tags (also described as badges preferably incorporating RFID modules) 15 may be given a unique character ID and dimensionalized on the software platform. Reader Node(s) 23 are mounted at entrances or selected locations and dimensionalized on the software platform. The PC Reader relays data from the Reader Node(s) 23 to the software routine, which then gives a live feed of all entities equipped with an RFID Tag via the positioning algorithms in the software previously described to show the position of the tag relative to the Reader Node 23 in closest proximity. A schematic of the work area may be drafted and integrated into the software platform to provide a live visual display of the system performing tracking and controlling functions including the personnel tracking aspect of the system. The GUI also has the ability for the administrator or supervisor to activate selected reader nodes restricting access for certain or all RFID tags executing the function of an exclusion zone. Geo-fencing may be used to set up a secure perimeter with a virtual fence that provides information about entry and exit from a defined physical location. This requires Reader Nodes 23 and RFID tags or sensors in order to provide feedback information.
[0069] The sequencing of an access point provides the ability for geo-fencing the exclusion zone 29 while also having redundancies in place to avoid false barrier breaks with use of a tiered barrier break system. If all access points to an area are monitored then the entire area can be monitored. For example, as shown in
[0070] If an RFID tag exceeds the allowable tolerance for Reader 1 it can be assumed that the tag is in that area. If the same RFID tag exceeds the allowable tolerance for Reader 1 and then Reader 2, it can be assumed that the tag is approaching that access point. Finally, if an RFID tag exceeds the allowable tolerance for Reader 1, Reader 2, and Reader 3 in that order, it can be assumed that the RFID tag is in the location of the access point and has broken the barrier and the appropriate actions may be executed. The tolerance modules may be used in or near a designated zone and may be varied according to the desired tolerance in a designated zone or with a known target.
[0071] The addition of an infrared sensor 31 into the system is to provide greater reliability and precision. The use of the RFID sensors provides triangulation, meaning each reader calculates the location of the tag using the signal strength relative to it and ultimately can provide a location. The addition of the IR sensor 31 provides a line for a barrier. The RFID continues to track the location as described above and holds the raw data (name of work, position, etc.), but once the criteria for the readers is satisfied in the software system, permission is given for the IR beam to be tripped and once the beam is tripped, the tag ID can be recorded as the one that tripped the system. For example, as shown in
[0072] The foregoing description has been presented for purposes of illustration and description. It is not intended to be exhaustive nor to limit the method and system to the precise forms disclosed. Many alternatives, modifications, and variations will be apparent to those skilled in the art in light of the above. Accordingly, the method and system disclosed are intended to embrace all alternatives, modifications, and variations that fall within the spirit and broad scope of the claims.