Group call management
10336575 ยท 2019-07-02
Assignee
Inventors
Cpc classification
B66B2201/4615
PERFORMING OPERATIONS; TRANSPORTING
B66B2201/4676
PERFORMING OPERATIONS; TRANSPORTING
B66B2201/4684
PERFORMING OPERATIONS; TRANSPORTING
B66B1/3476
PERFORMING OPERATIONS; TRANSPORTING
International classification
B66B1/34
PERFORMING OPERATIONS; TRANSPORTING
Abstract
In elevator journey prioritization often calls for larger groups are prioritized. This is often misused by placing elevator calls for larger groups that are actually travelling. This problem can be reduced by identifying the calling person when placing the call and again in the elevator. The number of people in the elevator can be estimated by using machine vision or weight-based approximation methods. When the number of passengers is not known the possible misuse can be suspected if a person places considerably more group calls as than average.
Claims
1. A method for controlling groups calls in an elevator system, the method comprising the steps of: receiving a first identification of a user from an elevator calling panel, then; receiving a call from the elevator calling panel from the user, the call indicating that a group of people will be entering an elevator and a number of passengers will be in the group, then; after the user and the group enters a called elevator car, requesting a second identification of the user via the elevator system, and performing a second identification of the user via an RFID-based keycard or near field communication implemented on a mobile phone of the user; determining the number of passengers in the group entering into the elevator using a weighing device or machine vision; if the determined number of passengers matches the indicated number of passengers, then starting an elevator ride of the called elevator car; and if the determined number of passengers does not match the indicated number of passengers, preventing the starting of the elevator ride of the called elevator car.
2. The method according to claim 1, wherein said method further comprises receiving an image comprising the passengers in said called elevator car.
3. The method according to claims 2, wherein the said received image is used to recognize the user from said image.
4. The method according to claim 1, wherein the method further comprises receiving a weight of said elevator car from the weighing device coupled to said elevator car and estimating a number of people in said elevator car based on the known elevator car weight and a predetermined average weight of a person.
5. A computer program embodied on a non-transitory computer readable medium and comprising code adapted to perform the method according to claim 1 when executed on a computing system.
6. An apparatus comprising at least one memory and at least one processor, wherein said apparatus is configured to communicate with an elevator calling panel and an elevator control panel, and wherein said at least one memory and a computer program code work together, with the at least one processor, to cause the apparatus to perform the method according to claim 1.
7. An elevator system comprising: an elevator car coupled to a hoisting machine by a hoisting rope; an elevator calling panel; an elevator control panel; and the apparatus according to claim 6.
8. The system according to claim 7, wherein the machine vision includes a camera configured to take images from said called elevator car.
9. The system according to claims 7, wherein the weighing device is configured to weigh said called elevator car.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The accompanying drawings, which are included to provide a further understanding of the invention and constitute a part of this specification, illustrate embodiments of the invention and together with the description help to explain the principles of the invention. In the drawings:
(2)
(3)
DETAILED DESCRIPTION OF THE INVENTION
(4) Reference will now be made in detail to the embodiments of the present invention, examples of which are illustrated in the accompanying drawings.
(5) In
(6) In the embodiment of
(7) When the elevator car 10 arrives at the calling floor the group enters to the elevator car 10. After entering the calling person is identified again, for example, by introducing the keycard 13 to the control panel 11 of the elevator car 10. After identification the journey typically begins. The processing associated with the second identification is explained in more detail together with referral to
(8) In another embodiment instead of keycard 13 a mobile phone is used as an identification device. In such case it is possible to use any suitable local communication means for identification. Examples of such communication means are near field communication, Bluetooth, and wireless local area network. Thus, it is not necessary to introduce the device to the receivers located together with panels 11 and 13 but the device can be recognized from the pocket of the caller. When more than one mobile device is in the vicinity a confirmation or other method for securing the identity of a person may be used.
(9) In embodiment of
(10) The elevator car 11 is connected to the hoisting machine with rope 15. In another embodiment the number of passengers is estimated from the weight of the elevator car 10. The weight is measured with the weighing device of the hoisting arrangement and it can be implemented in various ways and is a common component in most of the elevator systems even if it is not always necessary.
(11) In
(12) The journey begins when the elevator arrives at the calling floor and the group enters to the elevator. As the number of persons is known the system needs to count or estimate the number of persons entered to the elevator and compare the counted or estimated number of persons to the call information, step 22. This can be done by several ways. For example, each elevator typically comprises a weighing device. The number of persons can be estimated by dividing the measured weight by average person weight, which is often 80 kg but may be adjusted, for example, according to the geographical area. Instead of weighing device a machine vision detection system may be used. In such system an image is taken when the beginning of the journey, for example, when the doors are closed but the elevator does not move yet. Then, from the image the number of persons may be count. Based on the call information the elevator system always knows how many people should be in the elevator. This number can be verified and corrected when the machine vision counting gives different result than the accumulated call information.
(13) The procedure described above may include the detection of calling person. This may be done, for example, by introducing the same means as when calling the elevator. In a further embodiment the person is detected from the machine vision image described above. For machine vision matching the system needs an image of the person who called the elevator. The image may be taken by digital camera arranged to the calling panel or it may be stored in to the profile of the person. The profile may include other relevant information for placing call, such as access rights.
(14) When the number of people who have entered and the identities of persons having made the calls are known the gathered information may be compared with the call information, step 23. If the information matches the elevator ride starts normally, step 24. When starting normally the information may be stored statistics system. When the information does not match the result is processed, step 25.
(15) The processing may include various actions. For example, if the person who made the call cannot be identified in the elevator car the elevator system may show on a screen a message asking the identification. If the identification is not made within a time limit the call is cancelled. The purpose of this is to reduce unauthorized access to possibly locked floors. When the number of persons in the elevator does not match with the call information may be used to detect people misusing the system. For example, if the elevator car is staring from a floor and only one person has been identified with a call to ten people and only one person enters to the elevator the system immediately detects possible misuse of the system. The system may be configured such that after certain number of possible misuses the possibility to place group calls is reduced or the person placing possible misuses is investigated or interviewed. When two or more people have identified themselves but the number of persons in the elevator is considerably less than it should be all identified persons may be added to the statistics but not counted as possible misuse as described above as it is very difficult to detect who placed the possible misuse call. Instead these persons may be placed into separate second statistics. If a person continuously misuses call system by placing group calls the misuse may be detected even if the person is in the second statistics only as the person who is misusing will be placed to the second statistics on every journey and others are random travelers and typically will be stored considerably less frequently in the statistics.
(16) Furthermore, these two statistics may be combined by using different methods. For example, a hit in the first statistics may give ten points and in the second statistics only 1 point. Then the system may be configured to perform an action, such as reducing the possibility to place group calls after 50 points.
(17) In a simpler embodiment the statistics include only the number of group calls a person has placed without using the number of passengers. In this embodiment the misuse may be suspected from the fact a person places considerably more group calls than average person.
(18) After processing the information the elevator system acts in accordance with the processing result, which typically means the start of the journey. Even if the misuse has been detected the normal operation is often desired as it is not intention to disturb other people who are not misusing the system by causing unnecessary delays, step 27. However, even if in the embodiment of
(19) In an embodiment the controller 16 of
(20) The above mentioned method may be implemented as computer software which is executed in a computing device able to communicate with a mobile device. When the software is executed in a computing device it is configured to perform the above described inventive method. The software is embodied on a computer readable medium so that it can be provided to the computing device.
(21) As stated above, the components of the exemplary embodiments can include computer readable medium or memories for holding instructions programmed according to the teachings of the present inventions and for holding data structures, tables, records, and/or other data described herein. Computer readable medium can include any suitable medium that participates in providing instructions to a processor for execution. Common forms of computer-readable media can include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, any other suitable magnetic medium, a CD-ROM, CDR, CDRW, DVD, DVD-RAM, DVDRW, DVDR, HD DVD, HD DVD-R, HD DVD-RW, HD DVD-RAM, Blu-ray Disc, any other suitable optical medium, a RAM, a PROM, an EPROM, a FLASH-EPROM, any other suitable memory chip or cartridge, a carrier wave or any other suitable medium from which a computer can read.
(22) It is obvious to a person skilled in the art that with the advancement of technology, the basic idea of the invention may be implemented in various ways. The invention and its embodiments are thus not limited to the examples described above; instead they may vary within the scope of the claims.