Person Protection System, Method and System for Localizing a Wirelessly Communicating Object Transponder
20230062514 · 2023-03-02
Inventors
- Reinhard HLADIK (Wien, AT)
- Ulrike GLÄNZER (Neubiberg, DE)
- Lennart KILIAN (Gauting, DE)
- Corina Kim SCHINDHELM (Gröbenzell, DE)
- Guido SCHRÖER (München, DE)
- Joachim WAHRBICHLER (Graz, AT)
- Stefan SCHWARZER (Nürnberg, DE)
Cpc classification
G01S5/0244
PHYSICS
G01S2013/468
PHYSICS
B25J9/1676
PERFORMING OPERATIONS; TRANSPORTING
G01S5/14
PHYSICS
G01S13/876
PHYSICS
F16P3/147
MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
International classification
G01S13/87
PHYSICS
Abstract
A method for determining a protection zone with a protection radius about a wireless communication object transponder, wherein the method includes a) ascertaining a first indefinite position of the object transponder using a first locating system, b) ascertaining at least two definite anchor object distances between the object transponder and at least two anchor gateways with respective known positions via a definite distance measuring device using a two-way ranging method, and c) ascertaining the protection radius using a failsafe computing device which receives the first indefinite position from the first locating system and the at least two definite anchor object distances from the distance measuring device and determines the protection radius therefrom using the known positions of the at least two anchor gateways.
Claims
1.-16. (canceled)
17. A method for determining a protection zone (S) with a protection radius (r.sub.p) around a wirelessly communicating object transponder (T), the method comprising: a) ascertaining a first unsafe position (Tag_calc) of the object transponder (T) via a first localizing system; b) ascertaining at least two safe anchor-object distances (d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3) between the object transponder (T) and at least two anchor gateways (G1-G3) with respective known positions in accordance with a two-way ranging method via a safe distance measuring device; c) ascertaining the protection radius (r.sub.p) via a failsafe computing device (F-CPU) which receives the first unsafe position (Tag_calc) from the first localizing system and the at least two safe anchor-object distances (d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3) from the distance measuring device and which determines the protection radius (r.sub.p) therefrom aided by the respective known positions of the at least two anchor gateways (G1-G3).
18. The method as claimed in the claim 17, wherein a minimum of the at least two anchor-object distances (d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3) is determined as a minimum distance (d.sub.TWRmin); wherein a respective geometric distance between an anchor gateway (G1-G3) and the first unsafe position (Tag_calc), and also a difference with respect to the anchor-object distances are each ascertained, and a maximum from the differences is determined as a maximum distance difference (delta.sub.max); and wherein the protection radius (r.sub.p) is determined from the minimum distance (d.sub.TWRmin) and the maximum distance difference (delta.sub.max).
19. The method as claimed in claim 17, wherein the protection radius (r.sub.p) is determined in accordance with the relationship:
r.sub.p=2*d.sub.TWRmin+delta.sub.max
20. The method as claimed in claim 17, wherein the protection radius (r.sub.p) is ascertained from the respective distance between the at least two anchor-object distances (d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3) and the first position (Tag_calc).
21. The method as claimed in claim 17, wherein at least one first intersection point at a distance of the respective anchor-object distance (d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3) is formed around the at least two anchor gateways (G1-G3); and wherein the protection radius (r.sub.p) is determined by a largest distance between the at least one first intersection point and the first unsafe position (Tag_calc).
22. The method as claimed in claim 17, wherein positions of three anchor gateways (G1-G3) define a triangle area in a triangle plane, and an imaginary area normal to the triangle plane passes through the first unsafe position (Tag_calc) of the transponder (T), and an intersection point between the imaginary area normal and the triangle plane represents a projected transponder position which is utilized to determine the protection radius (r.sub.p).
23. The method as claimed in claim 17, wherein the at least two safe anchor-object distances (d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3) between the object transponder (T) and two anchor gateways of the at least two anchor gateways (G1-G3) with known positions are ascertained in accordance with the two-way ranging method via a safe distance measuring device; wherein the object transponder (T) and also at least two anchor gateways (G1-G3) each comprise time stamp acquirers, the method further comprising: d) acquiring transmission and reception time stamps (TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL) for a respective communication message on a part of the transponder (T) and the at least two anchor gateways (G1-G3), e) transferring respective time stamps (TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL) from the transponder (T) and the at least two anchor gateways (G1-G3) with at least one respective item of time stamp check information (CRC1, CRC2) to a failsafe computing device (F-CPU), the item of time stamp check information (CRC1, CRC2) being an item of parity information; f) implementing at least one check via the failsafe computing device (F-CPU) selected from: f1) a check of a correctness of the respective time stamps (TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL) based on the at least one item of time stamp check information (CRC1, CRC2), and f2) a check of the calculated time duration for the processing times of the transponder (T) and that of one anchor gateway (G1-G3) based on known empirical values; g) determining the safe distance (d.sub.TWR) with the aid of the checked time stamps (TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL) by means of the failsafe computing device (F-CPU); wherein during acquisition of the time stamps (TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL), time stamp errors are caused only by the transponder (T) or only by one anchor gateway of the at least two anchor gateways (G1-G3); and wherein during the wireless communication between the object transponder (T) and the at least one anchor gateway (G1-G3) for localization polling, a poll, a response and a final message (MP, MR, MF) are transmitted and received.
24. The method as claimed in claim 17, wherein an indicator value (safe_twr_value) for a safe distance measurement is ascertained via the failsafe computing device (F-CPU) in accordance with the following relationship, which comprises a measure of a safety of the calculated safe distance (d.sub.TWR):
T.sub.Round1=2.Math.TOF.sub.1+T.sub.GW_REPLY
T.sub.Round2=2.Math.TOF.sub.2+T.sub.TAG_REPLY
T.sub.GW_REPLY=TS.sub.GW_TX_RESP−TS.sub.GW_RX_POLL
T.sub.TAG_REPLY=TS.sub.TAG_TX_FINAL−TS.sub.TAG_RX_RESP and TOF.sub.1 and TOF.sub.2 are respective signal times of flight between the transponder (T) and one anchor gateway of the at least two anchor gateways (G1-G3); and wherein time stamps TS.sub.TAG_TX_POLL, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL are acquired by the transponder (T), and time stamps TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.GW_RX_FINAL are acquired by the anchor gateway of the at least two anchor gateways (G1-G3).
25. The method as claimed in claim 23, wherein a process number (RNR) is generated by the failsafe computing device (F-CPU) and is transferred by the latter with the response message (MR), the process number (RNR) comprising a random number.
26. The method as claimed in claim 24, wherein a process number (RNR) is generated by the failsafe computing device (F-CPU) and is transferred by the latter with the response message (MR), the process number (RNR) comprising a random number.
27. The method as claimed in claim 23, wherein a communication address of one of the object transponder (T) and the at least one anchor gateway (G1-G3) is taken into account during calculation of the time stamp check information (CRC1, CRC2).
28. The method as claimed in claim 24, wherein a communication address of one of the object transponder (T) and the at least one anchor gateway (G1-G3) is taken into account during calculation of the time stamp check information (CRC1, CRC2).
29. The method as claimed in claim 25, wherein a communication address of one of the object transponder (T) and the at least one anchor gateway (G1-G3) is taken into account during calculation of the time stamp check information (CRC1, CRC2).
30. A warning system for determining a protection zone (S) around a wirelessly communicating object transponder (T), comprising: a safe distance measuring device; a failsafe computing device (F-CPU) having a memory; a localizing system; and at least two anchor gateways (G1-G3); wherein the warning system (WS) is configured to: a) ascertain a first unsafe position (Tag_calc) of the object transponder (T) via a first localizing system; b) ascertain at least two safe anchor-object distances (d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3) between an object transponder (T) and the at least two anchor gateways (G1-G3) with respective known positions in accordance with a two-way ranging method via the safe distance measuring device; and c) ascertain the protection radius (r.sub.p) via the failsafe computing device (F-CPU) which receives the first unsafe position (Tag_calc) from the first localizing system and the at least two safe anchor-object distances (d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3) from the distance measuring device and which determines the protection radius (r.sub.p) therefrom aided by the respective known positions of the at least two anchor gateways (G1-G3); and wherein the warning system (WS) is configured to determine the protection zone (S) for the object transponder (T).
31. A protection system (SS) for a person or an object, comprising a hazardous system (GS) and a warning system (WS) as claimed in claim 17 with a wirelessly communicating object transponder (T) which is carried by a person (P) or is comprised by an object; wherein the protection system (SS) is configured, when the hazardous system (GS) is in operation, to initiate a process of termination of operation of the hazardous system (GS) aided by the protection zone (S) ascertained by the warning system (WS) for the object transponder (T) for at least that part of the hazardous system (GS) whose part encroaches on the protection zone (S).
32. The protection system (SS) as claimed in the claim 31, wherein the hazardous system (GS) comprises an industrial production system with movable subsystems
33. The protection system (SS) as claimed in claim 32, wherein the movable subsystems comprise assembly robots (R).
34. A protection system (SS) for a vehicle, comprising a hazardous system and a warning system (WS) as claimed in claim 30 with a wirelessly communicating object transponder (T) which is comprised by the vehicle which implements locomotion; wherein the protection system (SS) is configured to initiate a process of termination of the locomotion aided by the protection zone (S) ascertained by the warning system (WS) for the object transponder (T) of the vehicle when the hazardous system (GS) encroaches on the protection zone (S).
35. The protection system (SS) as claimed in claim 34, wherein the hazardous system (GS) comprises a static infrastructure object, and wherein the object transponder (T) comprises a vehicle or a flying traffic object.
36. The protection system (SS) as claimed in claim 34, wherein the static infrastructure object comprises a building; wherein the vehicle comprises a motor vehicle, and wherein the flying object comprises one of an helicopter and a drone for conveyance of passengers or freight.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0059] The invention is explained in greater detail below on the basis of exemplary embodiments illustrated in the accompanying drawings, in which:
[0060]
[0061]
[0062]
[0063]
[0064]
[0065]
[0066]
[0067]
[0068]
[0069]
[0070]
[0071]
[0072]
[0073]
[0074]
[0075]
[0076]
[0077]
[0078]
[0079]
[0080]
[0081]
DETAILED DESCRIPTION OF THE EXEMPLARY EMBODIMENTS
[0082]
[0083] An object transponder or “tag” T carried, for example, by a person P wearing it on his/her body emits a respective poll signal P1-P3 comprising a poll message MP into a radio channel.
[0084] The respective poll signal P1-P3 is received from the radio channel by the respective gateway G1-G3, processed further and re-emitted as a respective response signal R1-R3 comprising a respective response message MR.
[0085] The response signals R1-R3 are received by the object transponder T, processed further and re-emitted into the radio channel as a respective final signal F1-F3 comprising the respective response message MF.
[0086] The final signals F1-F3 are received by the respective gateway G1-G3 and passed to a computing device F-CPU that effects failsafe computation, where computing device determines the protection radius r.sub.p of a protection zone S.
[0087] If a hazardous system in the form of a production installation, for example, is in operation, and in the course of this a robot arm R of the production installation encroaches on the protection zone S, then a termination process for the operation of the robot arm is initiated for the robot arm, as a result of which the robot arm immediately stops.
[0088] The encroachment on the protection zone S can occur, for example, by virtue of the person P getting impermissibly close to the robot arm R, and protection of the person no longer being safely ensured.
[0089] A method for determining a safe distance d.sub.TWR in accordance with the TWR principle between a wirelessly communicating object transponder T and at least one anchor gateway G1-G3, each comprising acquirers for acquiring time stamps, is described below based on an exemplary embodiment of the invention.
[0090] In general, the following steps are implemented here: [0091] a) acquiring transmission and reception time stamps TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL for a respective communication message on the part of the transponder T and at least two anchor gateways G1-G3, [0092] b) transferring the respective time stamps TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL from the transponder T and the at least two anchor gateways G1-G3 with at least one respective item of time stamp check information CRC1, CRC2, for example, an item of parity information, to a failsafe computing device F-CPU, [0093] c) implementing at least one check via the failsafe computing device F-CPU selected from: [0094] c1) check of the correctness of the respective time stamps TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL based on the at least one item of time stamp check information CRC1, CRC2, [0095] c2) check of the calculated time duration for the processing times of the transponder T and that of the at least one anchor gateway G1-G3 based on known empirical values, [0096] d) determining the safe distance d.sub.TWR with the aid of the checked time stamps TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL via the failsafe computing device F-CPU,
where during the acquisition of the time stamps TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL time stamp errors are caused only by the transponder T or alternatively only by one of the at least two anchor gateways G1-G3.
[0097] From this, an indicator value safe_twr_value for a safe distance measurement can be ascertained via the failsafe computing device F-CPU by way of the following relationship, which is a measure of the safety of the calculated safe distance d.sub.TWR:
wherein
T.sub.Round1=2.Math.TOF.sub.1+T.sub.GW_REPLY
T.sub.Round2=2.Math.TOF.sub.2+T.sub.TAG_REPLY
T.sub.GW_REPLY=TS.sub.GW_TX_RESP−TS.sub.GW_RX_POLL
T.sub.TAG_REPLY=TS.sub.TAG_TX_FINAL−TS.sub.TAG_RX_RESP
and TOF.sub.1 and TOF.sub.2 are the respective signal time of flight between the transponder T and one of the at least two anchor gateways G1-G3.
[0098] During the wireless communication between the object transponder T and the at least one anchor gateway G1-G3 for localization polling, a poll, a response and a final message MP, MR, MF are transmitted and received.
[0099] Moreover, a process number RNR can be generated by the failsafe computing device F-CPU, and is transferred with the response message MR by the failsafe computing device F-CPU. The process number RNR is a random number, for example.
[0100] Furthermore, an address of the object transponder T or of the at least one anchor gateway G1-G3 can be taken into account in the calculation of the time stamp check information CRC1, CRC2.
[0101]
[0102] A safe distance is a distance that is ascertained without systemic errors during a time-of-flight measurement.
[0103] Undesirable influences, for example, as a result of a fluctuating or inaccurate time base, which may occur during a time of flight measurement of signals are systemically precluded by a corresponding “safe” calculation.
[0104] The position of the object transponder T (also referred to as “tag”) in a three-dimensional space is intended to be ascertained in accordance with the further explanations, reference being made to the anchor or gateway transponders G1, G2, G3 with known positions.
[0105] The poll message MP is transmitted at the transponder T or tag at a point in time with a time stamp TS.sub.TAG_TX_POLL and is received at the respective anchor gateway G1-G3 at a point in time with a time stamp TS.sub.GW_RX_POLL.
[0106] The transfer of the poll message MP in the radio channel between the transponder T and the respective gateway of the three gateways G1-G3 requires a duration TOF.sub.1 (“time-of-flight”).
[0107] The poll message MP is processed by the anchor gateway within a time period T.sub.GW_REPLY and a corresponding response message MR is transmitted from the anchor gateway to the transponder T at a point in time with a time stamp TS.sub.GW_TX_RESP and is received at the tag at a point in time with a time stamp TS.sub.TAG_RX_RESP.
[0108] The time period T.sub.GW_REPLY is determined by the clock of the gateway components T.sub.GW_CLK and is known within certain and known limits.
[0109] The following can thus be specified:
T.sub.GW_REPLY=TS.sub.GW_TX_RESP−TS.sub.GW_RX_POLL
[0110] The time period T.sub.Round1 denotes the signal time of flight between the time stamp TS.sub.TAG_TX_POLL and the time stamp TS.sub.TAG_RX_RESP.
T.sub.Round1=TS.sub.TAG_RX_RESP−TS.sub.TAG_TX_POLL
[0111] The transfer in the radio channel requires the duration TOF.sub.2. If the transponder T was not moved, then correspondingly TOF.sub.1=TOF.sub.2.
[0112] The response message MR is processed by the tag within a time period T.sub.TAG_REPLY and a corresponding final message MF is transmitted from the anchor gateway to the transponder T at a point in time with a time stamp TS.sub.TAG_TX_FINAL.
[0113] The time period T.sub.TAG_REPLY is determined by the clock of the gateway components T.sub.TAG_CLK and is known within certain and known limits.
[0114] The transfer in the radio channels requires the duration TOF.sub.3. If the transponder T was not moved, then correspondingly TOF.sub.1=TOF.sub.2=TOF.sub.3.
[0115] The anchor gateway receives the final message MF at a point in time with a time stamp TS.sub.GW_RX_FINAL.
[0116] The time period T.sub.Round2 denotes the signal time of flight between the time stamp TS.sub.GW_TX_RESP and the time stamp TS.sub.GW_RX_FINAL.
T.sub.Round2=TS.sub.GW_RX_FINAL−TS.sub.GW_TX_RESP
[0117] The following can thus be specified:
T.sub.TAG_REPLY=TS.sub.TAG_TX_FINAL−TS.sub.TAG_RX_RESP
[0118] The time stamps are acquired by a tag counter CT in the object transponder and respectively a gateway counter CG in the anchor gateway.
[0119] From the ascertained times of flight, it is possible to determine the signal time of flight in the radio channel TOF=TOF.sub.1=TOF.sub.2=TOF.sub.3 and, by way of the speed of light c, the corresponding distance d.sub.TWR.
[0120] The computing device F-CPU can then detect a first error if the time stamps of the transponder and of the gateways that are required for the distance calculation are falsified.
[0121] It is assumed here that only errors on the part of the transponder T or alternatively only errors on the part of one of the gateways G1-G3 occur at the same time, excluding the occurrence of errors on the part of the transponder and a gateway simultaneously.
[0122] A systemic error is understood to mean an error that unfavorably influences the generation or acquisition of time stamps, for example, an undesirably deviating time base in an electronic component, which can be caused by changing temperature, aging, component tolerances or the like. Such an error can occur between individual components in a system, such as the transponder T and a gateway G1-G3, by virtue of nonuniform variation of a local time base in the form of clock generation for a digital electronic circuit.
[0123] Time stamps or a drift of a respective timer clock in a component such as the transponder T1 or the gateways G1-G3 are independent of one another. Consequently, an error influences only the own time stamp and not that of the other components.
[0124] TWR has integrated error detection. This assumes the following relationship:
T.sub.Round1=2.Math.TOF.sub.1+T.sub.GW_REPLY
T.sub.Round2=2.Math.TOF.sub.2+T.sub.TAG_REPLY
[0125] A deviation of TOF, i.e., the difference between TOF.sub.1 and TOF.sub.2, as a result of errors in the transponder or in the anchor gateway can then be calculated by
[0126] A TWR result is valid for safe.sub.twr.sub.
[0127] The value safe_twr_value_limit=825 ps restricts a clock drift for the transponder with <±200 ppm.
[0128] The figure furthermore provides a simplified illustration of a program P_T of the transponder T with method steps PT1-PT3 for the transponder T as part of the flowchart.
[0129] Moreover, a program P_G of a respective gateway G1-G3 with method steps PG1-PG3 for the respective anchor gateway G1-G3 is discernible, as is a program P_F of the failsafely computing device F-CPU with method steps PF1-PF4 for the computing device F-CPU.
[0130] In step PT1, the poll message MP is initiated and transmitted by the transponder T.
[0131] In step PG1, the respective gateway receives the poll message MP and determines the transmission point in time for the response message MR.
[0132] In step PF1, a random number RNR is generated by the failsafely computing device F-CPU and is transmitted to the respective gateway.
[0133] In step PG2, the gateway transmits a response message MR containing the random number RNR to the transponder T.
[0134] In step PT2, the response message MR is received by the transponder T and the transmission point in time for the final message MF is calculated.
[0135] In step PT3, the transponder T determines a first checksum CRC1 from the time stamps and the address of the transponder T and the random number and transmits a final message MF containing the first checksum CRC1 from the transponder T to the gateway.
[0136] In step PG3, the gateway receives the final message MF and determines a second checksum CRC2 from the time stamps and the address of the gateway and the first checksum CRC1 and communicates the time stamps and the address of the gateway and of the transponder T and also the second checksum CRC2 to the device F-CPU.
[0137] In step PF2, the device F-CPU calculates a third checksum CRC3 and compares the third checksum CRC3 with the second checksum CRC2.
[0138] In step PF3, the device F-CPU calculates a safe value safe_twr_value for the distance between the gateway and the transponder T via the TWR method and checks the values for plausibility.
[0139] In step PF4, the device F-CPU calculates the safe distance sought on the basis of the preceding relationship with regard to the signal time of flight in the radio channel TOF.
[0140]
[0141]
[0142]
[0143] The random number RNR is additionally contained.
[0144]
[0145] The final message MF additionally comprises a data element for a time difference MFRXTX, denoting the time duration between the transmission of the poll message MP and the reception of the response message MR on the part of the transponder T.
[0146] Moreover, the final message MF comprises a data element for a time difference MFTXRX, denoting the time duration between the reception of the response message MR and the transmission of the final message MF on the part of the transponder T.
[0147]
[0148] The final message MP furthermore contains a respective data element in the form of a time stamp for a poll transmission point in time MF_PTX, a response reception point in time MF_RRX, and a final transmission point in time MF_FTX.
[0149] Moreover, the final message MP comprises the first checksum CRC1 formed by way of the time stamps of the transponder T and by way of the random number RNR.
[0150]
[0151] The anchor or gateway transponders are arranged at the following coordinates:
TABLE-US-00001 TABLE 1 Positions of the anchor gateways Gateway x-Position y-Position z-Position transponder [m] [m] [m] G1 5.0 10.0 2.3 G2 11.0 14.0 2.3 G3 12.0 6.0 2.3
[0152] The gateway transponders G1-G3 are all arranged in the same plane at 2.3 m. However, it is also clear that an arrangement of the object transponders T and G1-G3 for which the further explanations can be correspondingly applied is possible in three-dimensional space as well.
[0153] In this case, it is necessary to perform a corresponding transformation via an area normal of the transponder T into that triangle plane or triangle area that is spanned by three anchor gateways G1-G3. This transformation can be disregarded, however, for small distances between the triangle plane and a transponder T spaced apart therefrom.
[0154] Conventional methods make it possible to implement a position determination of the object transponder T, for example, at the position Tag_calc (10.0,11.0,1.6), the actual position Tag_true being (9.0,8.0,1.6), in this example.
[0155]
[0156] These distance measurements are subjected to a temporal latency check, for example by means of a “challenge-response” method.
[0157]
[0158] An independent localizing system performs an unsafe calculation 200, for example, via the TDoA method (“Time Difference of Arrival”, TDoA) and ascertains an unsafely calculated position Tag_calc at the location (x,y,z).
[0159] This calculated position can be caused, for example, by errors in the algorithm or in the underlying computing device, such as rounding errors or inaccurate calculations. Moreover, physical effects such as multipath propagation or undesirable reflections of the radio signal can lead to errors. As a result, the calculated position Tag_calc at the location (x.sub.calc,y.sub.calc) can deviate from the actual position Tag_true at the location (x.sub.true,y.sub.true) of the object transponder T.
[0160] An incorrect position is thereby defined if the calculated position deviates from the actual position of the object transponder T by more than the specified accuracy of the localizing system. This accuracy can be approximately 30 cm, for example, in the case of an ultra-wideband-based localizing system.
Error=√{square root over ((x.sub.calc−x.sub.true).sup.2+(y.sub.calc−y.sub.true).sup.2)}
[0161] The computing device F-CPU that effects failsafe computation performs a failsafe calculation 210 of distant measurements with a known latency and ascertains failsafely calculated distances 211-213.
[0162] Tuples (d.sub.Gn,x.sub.Gn,y.sub.Gn,Latency.sub.Gn) are generated for each anchor gateway G1-G3, i.e., for n=1 . . . 3.
[0163] The unsafely calculated position 201 and the failsafely calculated distances 211-213 are checked and assessed by an ambiguity assessment 220 to the effect of whether ambiguities are possible.
[0164] A calculation 230 of a protection radius r.sub.p is subsequently effected. The protection radius r.sub.p describes a protection zone in which the object transponder T is safely situated.
[0165] In order to be able to implement the calculation of the protection radius 240, distances between the stationarily fixed anchors or gateways and the object transponder T are determined based on radio locating.
[0166] In general, the following method steps for determining a protection zone S with a protection radius r.sub.p around a wirelessly communicating object transponder T can be specified: [0167] a) ascertaining a first, unsafe position Tag_calc of the object transponder T via a first localizing system, [0168] b) ascertaining at least two, in this example three, safe anchor-object distances d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3 between the object transponder T and at least two, in this example three, anchor gateways G1-G3 with respective known positions according to the TWR principle via a safe distance measuring device, [0169] c) ascertaining the protection radius r.sub.p via a failsafe computing device F-CPU, which receives the first position Tag_calc from the first localizing system and the at least two safe anchor object distances d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3 from the distance measuring device and determines the protection radius r.sub.p therefrom with the aid of the known positions of the at least two anchor gateways G1-G3.
[0170] Three anchor-object distances d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3 are ascertained, and the minimum thereof is determined as a minimum distance d.sub.TWRmin.
[0171] Furthermore, the respective geometric distance between an anchor gateway G1-G3 and the first position Tag_calc, and also the difference with respect to the anchor-object distances are ascertained in each case, and the maximum from the differences is determined as a maximum distance difference delta.sub.max.
[0172] The protection radius r.sub.p is determined from the minimum distance d.sub.TWRmin and the maximum distance difference (delta.sub.max) in accordance with the relationship
r.sub.p=2*d.sub.TWRmin+delta.sub.max.
[0173] The positions of the three anchor gateways G1-G3 define a triangle area in a triangle plane.
[0174] If the transponder T does not lie in the triangle plane, an imaginary area normal to the triangle plane passes through the first position Tag_calc of the transponder (T).
[0175] The intersection point between the area normal and the triangle plane represents a projected transponder position that is used in the determination of the protection radius r.sub.p.
[0176] On the basis of the geometric arrangement with respect to the unsafe position Tag_calc, an intersection point is ascertained from two of the measured anchor-object distances d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3.
[0177] An ambiguity in the determination of the intersection point of the object transponder T in the case of two anchor gateways G1-G3 is resolved via a check as to whether an ascertained position of the object transponder T is located within the triangle area spanned by the object transponder T and the two anchor gateways G1-G3.
[0178] The ambiguity can also be resolved with the aid of a third anchor gateway.
[0179] If the area normal is placed on or outside the triangle area, then the ascertained protection radius is increased by the maximum distance difference delta.sub.max.
[0180] The safe anchor-object distances d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3 between the object transponder T and an anchor gateway G1-G3 with a known position according to the TWR principle can be effected by the safe distance measuring device described above, the object transponder T and also the anchor gateway G1-G3 each comprising acquirers for acquiring time stamps.
[0181]
TABLE-US-00002 TABLE 2 Distances and times of flight of the anchor gateways Gateway d.sub.TWR.sub.
[0182] The distances and times of flight are proportional to one another.
[0183] From the distances and times of flight, the computing device F-CPU, with the aid of geometric relationships, assesses whether ambiguities are possible and calculates the protection radius r.sub.p around the position Tag_calc at the location (x.sub.Tag_calc, y.sub.Tag_calc, z.sub.Tag_calc).
[0184] For a safe distance between the object transponder and an anchor gateway determined without errors by means of a failsafely operating computing unit, it holds true that:
d.sub.TWR=d.sub.Tag_calc
[0185] With a localizing error, the following relationship holds true:
error=d.sub.GW_Tag_calc−d.sub.TWR
[0186] The protection radius r.sub.p can be increased by a correction value composed of the latency of the distance measurements and the maximally defined speed of the object transponder T.
[0187] The protection radius r.sub.p is determined using the two-way ranging method, which determines the time of flight of a UWB RF signal and then calculates the distance between the nodes by multiplying the time by the speed of light. The TWR process is employed between the object transponder and the requested anchor; only one anchor is permitted to participate in the TWR at a specific point in time.
[0188] The protection radius r.sub.p for the worst-case scenario can be determined by the F-CPU by way of the relationship
r.sub.p=2*d.sub.TWRmin+delta.sub.max
where
d.sub.TWRmin=min.sub.n=1 . . . #gatewaysd.sub.TWRn
[0189]
[0190] The distance d.sub.true corresponds to the distance between the actual person transponder position Tag_true (10.0, 13.0, 1.6) and the anchor position G1 (10.0, 10.2, 2.3).
[0191] The distance d.sub.TWR corresponds to the radius of the circle 111 around the anchor position G1 used.
[0192] The circle 112 has its center point around the anchor position G2 (10.0, 9.8, 2.3) used.
[0193]
[0194] The circle 121 has its center point around the anchor position G1 (10.0, 10.2, 2.3) used.
[0195] The circle 122 has its center point around the anchor position G2 (10.0, 9.8, 2.3) used.
[0196]
[0197] Here, a maximum distance delta.sub.max is calculated by the computing device F-CPU.
delta.sub.max=max.sub.n=1 . . . #gateways|d.sub.GWn_Tag_calc−d.sub.GWn_TWR|
[0198] Given an actual position Tag_true (6.0, 8.0, 1.6), gateway positions G1 (10.0, 14.0, 2.3), G2 (10.0, 6.0, 2.3) and G3 (4.0, 10.0, 2.3), and also the ascertained position Tag_calc (9.0, 10.1, 1.6), the corresponding distances can be ascertained.
delta.sub.G1=delta.sub.Tag_G1−d.sub.TWR_G1
delta.sub.G2=delta.sub.Tag_G2−d.sub.TWR_G2
delta.sub.G3=delta.sub.Tag_G3−d.sub.TWR_G3
[0199] This results in the following for this example:
delta.sub.max=delta.sub.G1
[0200]
delta.sub.max=max.sub.n=1 . . . #gateways|d.sub.GWn_Tag_calc−d.sub.GWn_TWR|
[0201] Given an actual position Tag_true (12.0, 10.0, 1.6), gateway positions G1 (10.0, 14.0, 2.3), G2 (10.0, 6.0, 2.3) and G3 (4.0, 10.0, 2.3), and also the ascertained position Tag_calc (8.0, 10.0, 1.6), the corresponding distances can be ascertained.
delta.sub.G1=delta.sub.Tag_G1−d.sub.TWR_G1
delta.sub.G2=delta.sub.Tag_G2−d.sub.TWR_G2
delta.sub.G3=delta.sub.Tag_G3−d.sub.TWR_G3
[0202] This results in the following for this example:
delta.sub.max=delta.sub.G3
[0203] The protection radius r.sub.p is discernible as a circle 140.
[0204] The measured distances between the object transponder T and the gateways G1-G3 are represented as circles 141-143 around the gateways G1-G3.
[0205]
[0206] The use of sectors is a simple method for establishing whether the transponder T is situated within the triangle spanned by the anchor gateways G1-G3. This is advantageous particularly when a cost-effective, but low-performance, failsafe computing device F-CPU is used, which may have a reduced instruction set.
[0207] The computing device F-CPU calculates a maximum free consecutive sector count FCS.sub.max, and also the relevant sectors that are taken into account in order to optimize the calculation of the protection radius r.sub.p.
[0208] The worst case for ascertaining the protection radius r.sub.p can lead to an unexpected switch-off as a result of side effects of UWB technology. By using those gateways that are best suited in the sense of a best possible geometry arrangement, this reduces the probability of incorrectly determined distances and directions.
[0209] The parameter FCS.sub.max describes the geometric situation by way of a corresponding arrangement with measured distances between different combinations of gateways and the object transponder, the determination of which necessitates determining the sectors in which the gateways are arranged.
[0210]
[0211] In the illustrated example, FCS.sub.max=31 and the geometric situation is poor.
[0212]
[0213] In the illustrated example, FCS.sub.GW1_GW3=10 and FCS.sub.GW3_GW1=20, as a result of which FCS.sub.max=20. The geometric situation is somewhat better than with one gateway.
[0214]
[0215] In the illustrated example, FCS.sub.GW1_GW3=10, FCS.sub.GW3_GW2=7 and FCS.sub.GW2_GW1=12, as a result of which FCS.sub.max=12. The geometric situation is better than with two gateways.
[0216] Those gateways which define FCS.sub.max are used for calculating the protection radius r.sub.p.
[0217] In this example, the gateways G1 and G2 define FCS.sub.max.
Δx.sub.GWn=x.sub.GWn−x.sub.Tag calc
Δy.sub.GWn=y.sub.GWn−y.sub.Tag_calc
[0218] The parameters x.sub.GWn and x.sub.Tag_calc are not used in the sector determination.
[0219] The protection radius r.sub.p can then be calculated by the computing device F-CPU for [0220] FCS.sub.max≥N/2, in this example FCS.sub.max≥16 in the case of 32 segments, i.e., 180°
in accordance with the relationship:
r.sub.p=√{square root over (y.sub.diff.sup.2+(h.sub.TWR+h.sub.Tag_calc).sup.2)}.
[0221]
[0222] The protection radius r.sub.p is discernible as a circle 150.
[0223]
[0224]
[0225] The figure shows the object transponder T at the calculated position Tag_calc (9.0, 10.2, 1.6) and at the actual position Tag_true (6.0, 8.0, 2.6), and also the gateway G1 at the position (10.0, 14.0, 2.3), the gateway G2 at the position (10.0, 6.0, 2.3) and the gateway G3 at the position (4.0, 10.0, 2.3).
[0226] The configuration chosen in this example leads to an FCS.sub.max=12.
[0227] In contrast to the previously mentioned relationship, the protection radius r.sub.p can be calculated by the computing device F-CPU for [0228] FCS.sub.max<N/2, in this example FCS.sub.max<16 in the case of 32 segments, i.e. 180°, and also
h.sub.Tag_calc.Math.0.7<delta.sub.max
but in accordance with the relationship:
r.sub.p=√{square root over (y.sub.diff.sup.2+(h.sub.TWR+h.sub.Tag_calc).sup.2)}+delta.sub.max.
[0229] The protection radius r.sub.p is discernible as a circle 160.
[0230]
[0231]
[0232] In this case, the computing device F-CPU calculates the distances h.sub.TWR and h.sub.Tag_calc in accordance with the mathematical relationships:
[0233] The following therefore arises in this example:
[0234]
[0235] The gateways are arranged at the positions G1 (10.0, 14.0, 2.3), G2 (10.0, 6.0, 2.3) and G3 (4.0, 10.0, 2.3).
[0236] The object transponder is arranged at the actual position Tag_true (6.0, 8.0, 1.6) and the ascertained position Tag_calc (16.0, 12.0, 1.6).
[0237] The following mathematical relationships are determined for this purpose:
d.sub.Gateways=√{square root over ((x.sub.G1−x.sub.G2).sup.2+(y.sub.G1−y.sub.G2).sup.2)}
y.sub.Tag_G1=√{square root over ((d.sub.Tag_G1.sup.2−h.sub.Tag_calc.sup.2)}
y.sub.Tag_G1=√{square root over ((d.sub.Tag_G2.sup.2−h.sub.Tag_calc.sup.2)}
y.sub.TWR_G1=√{square root over ((d.sub.TWR_G1.sup.2−h.sub.TWR.sup.2)}
y.sub.TWR_G2=√{square root over ((d.sub.TWR_G2.sup.2−h.sub.TWR.sup.2)}
[0238] As long as all the following conditions are true:
y.sub.TWR_G1<d.sub.Gateways
y.sub.TWR_G2<d.sub.Gateways
y.sub.Tag_G1<d.sub.Gateways
y.sub.Tag_G2<d.sub.Gateways
[0239] The following relationship holds true:
y.sub.diff=y.sub.TWR_G1−y.sub.Tag_G1
Otherwise, the protection radius r.sub.p is determined by:
r.sub.p=2*d.sub.TWR+delta.sub.max
[0240] The figure illustrates the geometric relationship for the distance y.sub.diff if
y.sub.Tag_G2>d.sub.Gateways
y.sub.TWR_G2>d.sub.Gateways
[0241] The protection radius r.sub.p is discernible as a circle 150.
[0242] The measured distances between the object transponder T and the gateways G1-G3 are represented as circles 151-153 around the gateways G1-G3.
[0243]
y.sub.Tag_G2>d.sub.Gateways
y.sub.TWR_G1>d.sub.Gateways
[0244] The protection radius r.sub.p is discernible as a circle 170.
[0245] The measured distances between the object transponder T and the gateways G1-G3 are represented as circles 171-173 around the gateways G1-G3.
[0246]
y.sub.Tag_G2>d.sub.Gateways
y.sub.TWR_G2<d.sub.Gateways
[0247] The protection radius r.sub.p is discernible as a circle 180.
[0248] The measured distances between the object transponder T and the gateways G1-G3 are represented as circles 181-183 around the gateways G1-G3.
[0249]
y.sub.Tag_G2<d.sub.Gateways
y.sub.TWR_G1<d.sub.Gateways
[0250] The protection radius r.sub.p is discernible as a circle 190.
[0251] The measured distances between the object transponder T and the gateways G1-G3 are represented as circles 191-193 around the gateways G1-G3.
[0252] The computing device F-CPU can then correct the protection radius r.sub.p in accordance with the following relationship:
r.sub.p′=r.sub.pv.sub.maxTag.Math.Δt
[0253] Where Δt is the time difference with respect to the last successful implementation of latency monitoring, and also the safe calculation of distance and protection radius r.sub.p.
[0254] By way of example, the person P who is carrying the object transponder T by wearing it may move at a speed of v.sub.maxTag if the two-way data acquisition is effected, for example, every 400 ms or preferably every 100 ms. Here, the protection radius r.sub.p is possibly not large enough to cover the position of the object transponder T.
[0255] Thus, while there have been shown, described and pointed out fundamental novel features of the invention as applied to a preferred embodiment thereof, it will be understood that various omissions and substitutions and changes in the form and details of the methods described and the devices illustrated, and in their operation, may be made by those skilled in the art without departing from the spirit of the invention. For example, it is expressly intended that all combinations of those elements and/or method steps which perform substantially the same function in substantially the same way to achieve the same results are within the scope of the invention. Moreover, it should be recognized that structures and/or elements and/or method steps shown and/or described in connection with any disclosed form or embodiment of the invention may be incorporated in any other disclosed or described or suggested form or embodiment as a general matter of design choice. It is the intention, therefore, to be limited only as indicated by the scope of the claims appended hereto.