Person Protection System, Method and System for Localizing a Wirelessly Communicating Object Transponder

20230062514 · 2023-03-02

    Inventors

    Cpc classification

    International classification

    Abstract

    A method for determining a protection zone with a protection radius about a wireless communication object transponder, wherein the method includes a) ascertaining a first indefinite position of the object transponder using a first locating system, b) ascertaining at least two definite anchor object distances between the object transponder and at least two anchor gateways with respective known positions via a definite distance measuring device using a two-way ranging method, and c) ascertaining the protection radius using a failsafe computing device which receives the first indefinite position from the first locating system and the at least two definite anchor object distances from the distance measuring device and determines the protection radius therefrom using the known positions of the at least two anchor gateways.

    Claims

    1.-16. (canceled)

    17. A method for determining a protection zone (S) with a protection radius (r.sub.p) around a wirelessly communicating object transponder (T), the method comprising: a) ascertaining a first unsafe position (Tag_calc) of the object transponder (T) via a first localizing system; b) ascertaining at least two safe anchor-object distances (d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3) between the object transponder (T) and at least two anchor gateways (G1-G3) with respective known positions in accordance with a two-way ranging method via a safe distance measuring device; c) ascertaining the protection radius (r.sub.p) via a failsafe computing device (F-CPU) which receives the first unsafe position (Tag_calc) from the first localizing system and the at least two safe anchor-object distances (d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3) from the distance measuring device and which determines the protection radius (r.sub.p) therefrom aided by the respective known positions of the at least two anchor gateways (G1-G3).

    18. The method as claimed in the claim 17, wherein a minimum of the at least two anchor-object distances (d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3) is determined as a minimum distance (d.sub.TWRmin); wherein a respective geometric distance between an anchor gateway (G1-G3) and the first unsafe position (Tag_calc), and also a difference with respect to the anchor-object distances are each ascertained, and a maximum from the differences is determined as a maximum distance difference (delta.sub.max); and wherein the protection radius (r.sub.p) is determined from the minimum distance (d.sub.TWRmin) and the maximum distance difference (delta.sub.max).

    19. The method as claimed in claim 17, wherein the protection radius (r.sub.p) is determined in accordance with the relationship:
    r.sub.p=2*d.sub.TWRmin+delta.sub.max

    20. The method as claimed in claim 17, wherein the protection radius (r.sub.p) is ascertained from the respective distance between the at least two anchor-object distances (d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3) and the first position (Tag_calc).

    21. The method as claimed in claim 17, wherein at least one first intersection point at a distance of the respective anchor-object distance (d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3) is formed around the at least two anchor gateways (G1-G3); and wherein the protection radius (r.sub.p) is determined by a largest distance between the at least one first intersection point and the first unsafe position (Tag_calc).

    22. The method as claimed in claim 17, wherein positions of three anchor gateways (G1-G3) define a triangle area in a triangle plane, and an imaginary area normal to the triangle plane passes through the first unsafe position (Tag_calc) of the transponder (T), and an intersection point between the imaginary area normal and the triangle plane represents a projected transponder position which is utilized to determine the protection radius (r.sub.p).

    23. The method as claimed in claim 17, wherein the at least two safe anchor-object distances (d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3) between the object transponder (T) and two anchor gateways of the at least two anchor gateways (G1-G3) with known positions are ascertained in accordance with the two-way ranging method via a safe distance measuring device; wherein the object transponder (T) and also at least two anchor gateways (G1-G3) each comprise time stamp acquirers, the method further comprising: d) acquiring transmission and reception time stamps (TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL) for a respective communication message on a part of the transponder (T) and the at least two anchor gateways (G1-G3), e) transferring respective time stamps (TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL) from the transponder (T) and the at least two anchor gateways (G1-G3) with at least one respective item of time stamp check information (CRC1, CRC2) to a failsafe computing device (F-CPU), the item of time stamp check information (CRC1, CRC2) being an item of parity information; f) implementing at least one check via the failsafe computing device (F-CPU) selected from: f1) a check of a correctness of the respective time stamps (TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL) based on the at least one item of time stamp check information (CRC1, CRC2), and f2) a check of the calculated time duration for the processing times of the transponder (T) and that of one anchor gateway (G1-G3) based on known empirical values; g) determining the safe distance (d.sub.TWR) with the aid of the checked time stamps (TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL) by means of the failsafe computing device (F-CPU); wherein during acquisition of the time stamps (TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL), time stamp errors are caused only by the transponder (T) or only by one anchor gateway of the at least two anchor gateways (G1-G3); and wherein during the wireless communication between the object transponder (T) and the at least one anchor gateway (G1-G3) for localization polling, a poll, a response and a final message (MP, MR, MF) are transmitted and received.

    24. The method as claimed in claim 17, wherein an indicator value (safe_twr_value) for a safe distance measurement is ascertained via the failsafe computing device (F-CPU) in accordance with the following relationship, which comprises a measure of a safety of the calculated safe distance (d.sub.TWR): safe_twr _value = ( T Round 1 - T GW _ REPLY ) - ( T Round 2 - T TAG _ REPLY ) 2 ; wherein
    T.sub.Round1=2.Math.TOF.sub.1+T.sub.GW_REPLY
    T.sub.Round2=2.Math.TOF.sub.2+T.sub.TAG_REPLY
    T.sub.GW_REPLY=TS.sub.GW_TX_RESP−TS.sub.GW_RX_POLL
    T.sub.TAG_REPLY=TS.sub.TAG_TX_FINAL−TS.sub.TAG_RX_RESP and TOF.sub.1 and TOF.sub.2 are respective signal times of flight between the transponder (T) and one anchor gateway of the at least two anchor gateways (G1-G3); and wherein time stamps TS.sub.TAG_TX_POLL, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL are acquired by the transponder (T), and time stamps TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.GW_RX_FINAL are acquired by the anchor gateway of the at least two anchor gateways (G1-G3).

    25. The method as claimed in claim 23, wherein a process number (RNR) is generated by the failsafe computing device (F-CPU) and is transferred by the latter with the response message (MR), the process number (RNR) comprising a random number.

    26. The method as claimed in claim 24, wherein a process number (RNR) is generated by the failsafe computing device (F-CPU) and is transferred by the latter with the response message (MR), the process number (RNR) comprising a random number.

    27. The method as claimed in claim 23, wherein a communication address of one of the object transponder (T) and the at least one anchor gateway (G1-G3) is taken into account during calculation of the time stamp check information (CRC1, CRC2).

    28. The method as claimed in claim 24, wherein a communication address of one of the object transponder (T) and the at least one anchor gateway (G1-G3) is taken into account during calculation of the time stamp check information (CRC1, CRC2).

    29. The method as claimed in claim 25, wherein a communication address of one of the object transponder (T) and the at least one anchor gateway (G1-G3) is taken into account during calculation of the time stamp check information (CRC1, CRC2).

    30. A warning system for determining a protection zone (S) around a wirelessly communicating object transponder (T), comprising: a safe distance measuring device; a failsafe computing device (F-CPU) having a memory; a localizing system; and at least two anchor gateways (G1-G3); wherein the warning system (WS) is configured to: a) ascertain a first unsafe position (Tag_calc) of the object transponder (T) via a first localizing system; b) ascertain at least two safe anchor-object distances (d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3) between an object transponder (T) and the at least two anchor gateways (G1-G3) with respective known positions in accordance with a two-way ranging method via the safe distance measuring device; and c) ascertain the protection radius (r.sub.p) via the failsafe computing device (F-CPU) which receives the first unsafe position (Tag_calc) from the first localizing system and the at least two safe anchor-object distances (d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3) from the distance measuring device and which determines the protection radius (r.sub.p) therefrom aided by the respective known positions of the at least two anchor gateways (G1-G3); and wherein the warning system (WS) is configured to determine the protection zone (S) for the object transponder (T).

    31. A protection system (SS) for a person or an object, comprising a hazardous system (GS) and a warning system (WS) as claimed in claim 17 with a wirelessly communicating object transponder (T) which is carried by a person (P) or is comprised by an object; wherein the protection system (SS) is configured, when the hazardous system (GS) is in operation, to initiate a process of termination of operation of the hazardous system (GS) aided by the protection zone (S) ascertained by the warning system (WS) for the object transponder (T) for at least that part of the hazardous system (GS) whose part encroaches on the protection zone (S).

    32. The protection system (SS) as claimed in the claim 31, wherein the hazardous system (GS) comprises an industrial production system with movable subsystems

    33. The protection system (SS) as claimed in claim 32, wherein the movable subsystems comprise assembly robots (R).

    34. A protection system (SS) for a vehicle, comprising a hazardous system and a warning system (WS) as claimed in claim 30 with a wirelessly communicating object transponder (T) which is comprised by the vehicle which implements locomotion; wherein the protection system (SS) is configured to initiate a process of termination of the locomotion aided by the protection zone (S) ascertained by the warning system (WS) for the object transponder (T) of the vehicle when the hazardous system (GS) encroaches on the protection zone (S).

    35. The protection system (SS) as claimed in claim 34, wherein the hazardous system (GS) comprises a static infrastructure object, and wherein the object transponder (T) comprises a vehicle or a flying traffic object.

    36. The protection system (SS) as claimed in claim 34, wherein the static infrastructure object comprises a building; wherein the vehicle comprises a motor vehicle, and wherein the flying object comprises one of an helicopter and a drone for conveyance of passengers or freight.

    Description

    BRIEF DESCRIPTION OF THE DRAWINGS

    [0059] The invention is explained in greater detail below on the basis of exemplary embodiments illustrated in the accompanying drawings, in which:

    [0060] FIG. 1 shows an exemplary embodiment of a warning and protection system in accordance with the invention;

    [0061] FIG. 2 shows an exemplary flowchart for safely determining the distance in accordance with the method of the invention;

    [0062] FIG. 3 shows an exemplary poll message in accordance with the invention;

    [0063] FIG. 4 shows an exemplary a TWR response message in accordance with the invention;

    [0064] FIG. 5 shows an exemplary a response message in accordance with the invention;

    [0065] FIG. 6 shows an exemplary TWR final message in accordance with the invention;

    [0066] FIG. 7 shows an exemplary a final message in accordance with the invention;

    [0067] FIG. 8 shows an exemplary arrangement in plan view with an object transponder to be localized and three gateway transponders in accordance with the invention;

    [0068] FIG. 9 shows the arrangement from FIG. 8 with known distances depicted;

    [0069] FIG. 10 shows an exemplary embodiment of a flow diagram of the method in accordance with the invention;

    [0070] FIG. 11 shows a representation of the distances and of the associated times of flight in accordance with the example from FIG. 8,

    [0071] FIG. 12 shows a representation of the geometric relationship with an exemplary calculation for the protection radius with optimum size in accordance with the invention;

    [0072] FIG. 13 shows a representation of the geometric relationship with an exemplary calculation for the protection radius which is larger than necessary in accordance with the invention;

    [0073] FIGS. 14-15 show further exemplary geometric relationship of distances during the determination of the protection radius in accordance with the invention;

    [0074] FIG. 16 shows a sector representation around a position for FCS determination in accordance with the invention;

    [0075] FIGS. 17-19 show exemplary sector representations of directions ascertained for gateways with associated distances in accordance with the invention;

    [0076] FIG. 20 shows an exemplary a sector representation with an unfavorable position of the object transponder in accordance with the invention;

    [0077] FIG. 21 shows an illustration of the calculated distances in accordance with the example from FIG. 20;

    [0078] FIG. 22 shows an exemplary sector representation with a favorable position of the object transponder in accordance with the invention;

    [0079] FIG. 23 shows an illustration of the calculated distances in accordance with the example from FIG. 22;

    [0080] FIGS. 24-26 show a representation of the geometric relationship of various distances for an arrangement analogous to FIG. 20 and FIG. 21; and

    [0081] FIGS. 27-29 show a representation of the geometric relationship for the protection radius for various configurations in accordance with the invention.

    DETAILED DESCRIPTION OF THE EXEMPLARY EMBODIMENTS

    [0082] FIG. 1 illustrates an exemplary embodiment of a warning and protection system in accordance with the invention.

    [0083] An object transponder or “tag” T carried, for example, by a person P wearing it on his/her body emits a respective poll signal P1-P3 comprising a poll message MP into a radio channel.

    [0084] The respective poll signal P1-P3 is received from the radio channel by the respective gateway G1-G3, processed further and re-emitted as a respective response signal R1-R3 comprising a respective response message MR.

    [0085] The response signals R1-R3 are received by the object transponder T, processed further and re-emitted into the radio channel as a respective final signal F1-F3 comprising the respective response message MF.

    [0086] The final signals F1-F3 are received by the respective gateway G1-G3 and passed to a computing device F-CPU that effects failsafe computation, where computing device determines the protection radius r.sub.p of a protection zone S.

    [0087] If a hazardous system in the form of a production installation, for example, is in operation, and in the course of this a robot arm R of the production installation encroaches on the protection zone S, then a termination process for the operation of the robot arm is initiated for the robot arm, as a result of which the robot arm immediately stops.

    [0088] The encroachment on the protection zone S can occur, for example, by virtue of the person P getting impermissibly close to the robot arm R, and protection of the person no longer being safely ensured.

    [0089] A method for determining a safe distance d.sub.TWR in accordance with the TWR principle between a wirelessly communicating object transponder T and at least one anchor gateway G1-G3, each comprising acquirers for acquiring time stamps, is described below based on an exemplary embodiment of the invention.

    [0090] In general, the following steps are implemented here: [0091] a) acquiring transmission and reception time stamps TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL for a respective communication message on the part of the transponder T and at least two anchor gateways G1-G3, [0092] b) transferring the respective time stamps TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL from the transponder T and the at least two anchor gateways G1-G3 with at least one respective item of time stamp check information CRC1, CRC2, for example, an item of parity information, to a failsafe computing device F-CPU, [0093] c) implementing at least one check via the failsafe computing device F-CPU selected from: [0094] c1) check of the correctness of the respective time stamps TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL based on the at least one item of time stamp check information CRC1, CRC2, [0095] c2) check of the calculated time duration for the processing times of the transponder T and that of the at least one anchor gateway G1-G3 based on known empirical values, [0096] d) determining the safe distance d.sub.TWR with the aid of the checked time stamps TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL via the failsafe computing device F-CPU,
    where during the acquisition of the time stamps TS.sub.TAG_TX_POLL, TS.sub.GW_RX_POLL, TS.sub.GW_TX_RESP, TS.sub.TAG_RX_RESP, TS.sub.TAG_TX_FINAL, TS.sub.GW_RX_FINAL time stamp errors are caused only by the transponder T or alternatively only by one of the at least two anchor gateways G1-G3.

    [0097] From this, an indicator value safe_twr_value for a safe distance measurement can be ascertained via the failsafe computing device F-CPU by way of the following relationship, which is a measure of the safety of the calculated safe distance d.sub.TWR:

    [00002] safe_twr _value = ( T Round 1 - T GW _ REPLY ) - ( T Round 2 - T TAG _ REPLY ) 2
    wherein


    T.sub.Round1=2.Math.TOF.sub.1+T.sub.GW_REPLY


    T.sub.Round2=2.Math.TOF.sub.2+T.sub.TAG_REPLY


    T.sub.GW_REPLY=TS.sub.GW_TX_RESP−TS.sub.GW_RX_POLL


    T.sub.TAG_REPLY=TS.sub.TAG_TX_FINAL−TS.sub.TAG_RX_RESP

    and TOF.sub.1 and TOF.sub.2 are the respective signal time of flight between the transponder T and one of the at least two anchor gateways G1-G3.

    [0098] During the wireless communication between the object transponder T and the at least one anchor gateway G1-G3 for localization polling, a poll, a response and a final message MP, MR, MF are transmitted and received.

    [0099] Moreover, a process number RNR can be generated by the failsafe computing device F-CPU, and is transferred with the response message MR by the failsafe computing device F-CPU. The process number RNR is a random number, for example.

    [0100] Furthermore, an address of the object transponder T or of the at least one anchor gateway G1-G3 can be taken into account in the calculation of the time stamp check information CRC1, CRC2.

    [0101] FIG. 2 illustrates an exemplary flowchart for determining the safe distance d.sub.TWR, with reference to which the invention will be described in detail.

    [0102] A safe distance is a distance that is ascertained without systemic errors during a time-of-flight measurement.

    [0103] Undesirable influences, for example, as a result of a fluctuating or inaccurate time base, which may occur during a time of flight measurement of signals are systemically precluded by a corresponding “safe” calculation.

    [0104] The position of the object transponder T (also referred to as “tag”) in a three-dimensional space is intended to be ascertained in accordance with the further explanations, reference being made to the anchor or gateway transponders G1, G2, G3 with known positions.

    [0105] The poll message MP is transmitted at the transponder T or tag at a point in time with a time stamp TS.sub.TAG_TX_POLL and is received at the respective anchor gateway G1-G3 at a point in time with a time stamp TS.sub.GW_RX_POLL.

    [0106] The transfer of the poll message MP in the radio channel between the transponder T and the respective gateway of the three gateways G1-G3 requires a duration TOF.sub.1 (“time-of-flight”).

    [0107] The poll message MP is processed by the anchor gateway within a time period T.sub.GW_REPLY and a corresponding response message MR is transmitted from the anchor gateway to the transponder T at a point in time with a time stamp TS.sub.GW_TX_RESP and is received at the tag at a point in time with a time stamp TS.sub.TAG_RX_RESP.

    [0108] The time period T.sub.GW_REPLY is determined by the clock of the gateway components T.sub.GW_CLK and is known within certain and known limits.

    [0109] The following can thus be specified:


    T.sub.GW_REPLY=TS.sub.GW_TX_RESP−TS.sub.GW_RX_POLL

    [0110] The time period T.sub.Round1 denotes the signal time of flight between the time stamp TS.sub.TAG_TX_POLL and the time stamp TS.sub.TAG_RX_RESP.


    T.sub.Round1=TS.sub.TAG_RX_RESP−TS.sub.TAG_TX_POLL

    [0111] The transfer in the radio channel requires the duration TOF.sub.2. If the transponder T was not moved, then correspondingly TOF.sub.1=TOF.sub.2.

    [0112] The response message MR is processed by the tag within a time period T.sub.TAG_REPLY and a corresponding final message MF is transmitted from the anchor gateway to the transponder T at a point in time with a time stamp TS.sub.TAG_TX_FINAL.

    [0113] The time period T.sub.TAG_REPLY is determined by the clock of the gateway components T.sub.TAG_CLK and is known within certain and known limits.

    [0114] The transfer in the radio channels requires the duration TOF.sub.3. If the transponder T was not moved, then correspondingly TOF.sub.1=TOF.sub.2=TOF.sub.3.

    [0115] The anchor gateway receives the final message MF at a point in time with a time stamp TS.sub.GW_RX_FINAL.

    [0116] The time period T.sub.Round2 denotes the signal time of flight between the time stamp TS.sub.GW_TX_RESP and the time stamp TS.sub.GW_RX_FINAL.


    T.sub.Round2=TS.sub.GW_RX_FINAL−TS.sub.GW_TX_RESP

    [0117] The following can thus be specified:


    T.sub.TAG_REPLY=TS.sub.TAG_TX_FINAL−TS.sub.TAG_RX_RESP

    [0118] The time stamps are acquired by a tag counter CT in the object transponder and respectively a gateway counter CG in the anchor gateway.

    [0119] From the ascertained times of flight, it is possible to determine the signal time of flight in the radio channel TOF=TOF.sub.1=TOF.sub.2=TOF.sub.3 and, by way of the speed of light c, the corresponding distance d.sub.TWR.

    [00003] TOF = T Round 1 .Math. T Round 2 - T GW _ REPLY .Math. T TAG _ REPLY T Round 1 + T Round 2 + T GW _ REPLY + T TAG _ REPLY d TWR = c .Math. TOF

    [0120] The computing device F-CPU can then detect a first error if the time stamps of the transponder and of the gateways that are required for the distance calculation are falsified.

    [0121] It is assumed here that only errors on the part of the transponder T or alternatively only errors on the part of one of the gateways G1-G3 occur at the same time, excluding the occurrence of errors on the part of the transponder and a gateway simultaneously.

    [0122] A systemic error is understood to mean an error that unfavorably influences the generation or acquisition of time stamps, for example, an undesirably deviating time base in an electronic component, which can be caused by changing temperature, aging, component tolerances or the like. Such an error can occur between individual components in a system, such as the transponder T and a gateway G1-G3, by virtue of nonuniform variation of a local time base in the form of clock generation for a digital electronic circuit.

    [0123] Time stamps or a drift of a respective timer clock in a component such as the transponder T1 or the gateways G1-G3 are independent of one another. Consequently, an error influences only the own time stamp and not that of the other components.

    [0124] TWR has integrated error detection. This assumes the following relationship:


    T.sub.Round1=2.Math.TOF.sub.1+T.sub.GW_REPLY


    T.sub.Round2=2.Math.TOF.sub.2+T.sub.TAG_REPLY

    [0125] A deviation of TOF, i.e., the difference between TOF.sub.1 and TOF.sub.2, as a result of errors in the transponder or in the anchor gateway can then be calculated by

    [00004] safe_twr _value = ( T Round 1 - T GW _ REPLY ) - ( T Round 2 - T TAG _ REPLY ) 2

    [0126] A TWR result is valid for safe.sub.twr.sub.value<safe_twr_value_limit where safe_twr_value_limit=825 ps, otherwise the result is invalid.

    [0127] The value safe_twr_value_limit=825 ps restricts a clock drift for the transponder with <±200 ppm.

    [0128] The figure furthermore provides a simplified illustration of a program P_T of the transponder T with method steps PT1-PT3 for the transponder T as part of the flowchart.

    [0129] Moreover, a program P_G of a respective gateway G1-G3 with method steps PG1-PG3 for the respective anchor gateway G1-G3 is discernible, as is a program P_F of the failsafely computing device F-CPU with method steps PF1-PF4 for the computing device F-CPU.

    [0130] In step PT1, the poll message MP is initiated and transmitted by the transponder T.

    [0131] In step PG1, the respective gateway receives the poll message MP and determines the transmission point in time for the response message MR.

    [0132] In step PF1, a random number RNR is generated by the failsafely computing device F-CPU and is transmitted to the respective gateway.

    [0133] In step PG2, the gateway transmits a response message MR containing the random number RNR to the transponder T.

    [0134] In step PT2, the response message MR is received by the transponder T and the transmission point in time for the final message MF is calculated.

    [0135] In step PT3, the transponder T determines a first checksum CRC1 from the time stamps and the address of the transponder T and the random number and transmits a final message MF containing the first checksum CRC1 from the transponder T to the gateway.

    [0136] In step PG3, the gateway receives the final message MF and determines a second checksum CRC2 from the time stamps and the address of the gateway and the first checksum CRC1 and communicates the time stamps and the address of the gateway and of the transponder T and also the second checksum CRC2 to the device F-CPU.

    [0137] In step PF2, the device F-CPU calculates a third checksum CRC3 and compares the third checksum CRC3 with the second checksum CRC2.

    [0138] In step PF3, the device F-CPU calculates a safe value safe_twr_value for the distance between the gateway and the transponder T via the TWR method and checks the values for plausibility.

    [0139] In step PF4, the device F-CPU calculates the safe distance sought on the basis of the preceding relationship with regard to the signal time of flight in the radio channel TOF.

    [0140] FIG. 3 illustrates by way of example a poll message MP_TWR according to the prior art for TWR, which poll message comprises data elements for a sequence number MPSN, a destination address MPZA, a source address MPQA and a function code MPFC, and can for example also be used as a poll message MP in the method according to the invention.

    [0141] FIG. 4 illustrates by way of example a response message MR_TWR according to the prior art for TWR, which response message comprises data elements for a sequence number MRSN, a destination address MRZA, a source address MRQA and a function code MRFC.

    [0142] FIG. 5 illustrates by way of example the response message MR according to the invention, which response message comprises data elements for a sequence number MRSN, a destination address MRZA, a source address MRQA and a function code MRFC. The function code MRFC can differ from the prior art.

    [0143] The random number RNR is additionally contained.

    [0144] FIG. 6 illustrates by way of example the final message MF according to the prior art for TWR, which final message comprises data elements for a sequence number MFSN, a destination address MFZA, a source address MFQA and a function code MFFC. The function code MFFC can differ from that of the prior art.

    [0145] The final message MF additionally comprises a data element for a time difference MFRXTX, denoting the time duration between the transmission of the poll message MP and the reception of the response message MR on the part of the transponder T.

    [0146] Moreover, the final message MF comprises a data element for a time difference MFTXRX, denoting the time duration between the reception of the response message MR and the transmission of the final message MF on the part of the transponder T.

    [0147] FIG. 7 illustrates by way of example the final message MP according to the invention, which final message comprises data elements for a sequence number MPSN, a destination address MPZA, a source address MPQA and a function code MPFC. The function code MFFC can differ from that of the prior art.

    [0148] The final message MP furthermore contains a respective data element in the form of a time stamp for a poll transmission point in time MF_PTX, a response reception point in time MF_RRX, and a final transmission point in time MF_FTX.

    [0149] Moreover, the final message MP comprises the first checksum CRC1 formed by way of the time stamps of the transponder T and by way of the random number RNR.

    [0150] FIG. 8 shows one example of a three-dimensional arrangement with an object transponder T (also referred to as “tag”) to be localized and three anchor or gateway transponders G1, G2, G3 with known positions in a two-dimensional plan view representation.

    [0151] The anchor or gateway transponders are arranged at the following coordinates:

    TABLE-US-00001 TABLE 1 Positions of the anchor gateways Gateway x-Position y-Position z-Position transponder [m] [m] [m] G1 5.0 10.0 2.3 G2 11.0 14.0 2.3 G3 12.0 6.0 2.3

    [0152] The gateway transponders G1-G3 are all arranged in the same plane at 2.3 m. However, it is also clear that an arrangement of the object transponders T and G1-G3 for which the further explanations can be correspondingly applied is possible in three-dimensional space as well.

    [0153] In this case, it is necessary to perform a corresponding transformation via an area normal of the transponder T into that triangle plane or triangle area that is spanned by three anchor gateways G1-G3. This transformation can be disregarded, however, for small distances between the triangle plane and a transponder T spaced apart therefrom.

    [0154] Conventional methods make it possible to implement a position determination of the object transponder T, for example, at the position Tag_calc (10.0,11.0,1.6), the actual position Tag_true being (9.0,8.0,1.6), in this example.

    [0155] FIG. 9 shows the arrangement from FIG. 8, in which those distances that can be determined failsafely via the computing device F-CPU that effects failsafe computation are additionally depicted in the form of circles 101-103 around the position of the corresponding gateway G1-G3.

    [0156] These distance measurements are subjected to a temporal latency check, for example by means of a “challenge-response” method.

    [0157] FIG. 10 shows one exemplary embodiment of a flow diagram of the method in accordance with the invention.

    [0158] An independent localizing system performs an unsafe calculation 200, for example, via the TDoA method (“Time Difference of Arrival”, TDoA) and ascertains an unsafely calculated position Tag_calc at the location (x,y,z).

    [0159] This calculated position can be caused, for example, by errors in the algorithm or in the underlying computing device, such as rounding errors or inaccurate calculations. Moreover, physical effects such as multipath propagation or undesirable reflections of the radio signal can lead to errors. As a result, the calculated position Tag_calc at the location (x.sub.calc,y.sub.calc) can deviate from the actual position Tag_true at the location (x.sub.true,y.sub.true) of the object transponder T.

    [0160] An incorrect position is thereby defined if the calculated position deviates from the actual position of the object transponder T by more than the specified accuracy of the localizing system. This accuracy can be approximately 30 cm, for example, in the case of an ultra-wideband-based localizing system.


    Error=√{square root over ((x.sub.calc−x.sub.true).sup.2+(y.sub.calc−y.sub.true).sup.2)}

    [0161] The computing device F-CPU that effects failsafe computation performs a failsafe calculation 210 of distant measurements with a known latency and ascertains failsafely calculated distances 211-213.

    [0162] Tuples (d.sub.Gn,x.sub.Gn,y.sub.Gn,Latency.sub.Gn) are generated for each anchor gateway G1-G3, i.e., for n=1 . . . 3.

    [0163] The unsafely calculated position 201 and the failsafely calculated distances 211-213 are checked and assessed by an ambiguity assessment 220 to the effect of whether ambiguities are possible.

    [0164] A calculation 230 of a protection radius r.sub.p is subsequently effected. The protection radius r.sub.p describes a protection zone in which the object transponder T is safely situated.

    [0165] In order to be able to implement the calculation of the protection radius 240, distances between the stationarily fixed anchors or gateways and the object transponder T are determined based on radio locating.

    [0166] In general, the following method steps for determining a protection zone S with a protection radius r.sub.p around a wirelessly communicating object transponder T can be specified: [0167] a) ascertaining a first, unsafe position Tag_calc of the object transponder T via a first localizing system, [0168] b) ascertaining at least two, in this example three, safe anchor-object distances d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3 between the object transponder T and at least two, in this example three, anchor gateways G1-G3 with respective known positions according to the TWR principle via a safe distance measuring device, [0169] c) ascertaining the protection radius r.sub.p via a failsafe computing device F-CPU, which receives the first position Tag_calc from the first localizing system and the at least two safe anchor object distances d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3 from the distance measuring device and determines the protection radius r.sub.p therefrom with the aid of the known positions of the at least two anchor gateways G1-G3.

    [0170] Three anchor-object distances d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3 are ascertained, and the minimum thereof is determined as a minimum distance d.sub.TWRmin.

    [0171] Furthermore, the respective geometric distance between an anchor gateway G1-G3 and the first position Tag_calc, and also the difference with respect to the anchor-object distances are ascertained in each case, and the maximum from the differences is determined as a maximum distance difference delta.sub.max.

    [0172] The protection radius r.sub.p is determined from the minimum distance d.sub.TWRmin and the maximum distance difference (delta.sub.max) in accordance with the relationship


    r.sub.p=2*d.sub.TWRmin+delta.sub.max.

    [0173] The positions of the three anchor gateways G1-G3 define a triangle area in a triangle plane.

    [0174] If the transponder T does not lie in the triangle plane, an imaginary area normal to the triangle plane passes through the first position Tag_calc of the transponder (T).

    [0175] The intersection point between the area normal and the triangle plane represents a projected transponder position that is used in the determination of the protection radius r.sub.p.

    [0176] On the basis of the geometric arrangement with respect to the unsafe position Tag_calc, an intersection point is ascertained from two of the measured anchor-object distances d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3.

    [0177] An ambiguity in the determination of the intersection point of the object transponder T in the case of two anchor gateways G1-G3 is resolved via a check as to whether an ascertained position of the object transponder T is located within the triangle area spanned by the object transponder T and the two anchor gateways G1-G3.

    [0178] The ambiguity can also be resolved with the aid of a third anchor gateway.

    [0179] If the area normal is placed on or outside the triangle area, then the ascertained protection radius is increased by the maximum distance difference delta.sub.max.

    [0180] The safe anchor-object distances d.sub.TWR_G1, d.sub.TWR_G2, d.sub.TWR_G3 between the object transponder T and an anchor gateway G1-G3 with a known position according to the TWR principle can be effected by the safe distance measuring device described above, the object transponder T and also the anchor gateway G1-G3 each comprising acquirers for acquiring time stamps.

    [0181] FIG. 11 shows a representation of the distances and the associated times of flight in accordance with the example from FIG. 1, which are summarized in the table below:

    TABLE-US-00002 TABLE 2 Distances and times of flight of the anchor gateways Gateway d.sub.TWR.sub..sub.Gn TOF.sub..sub.Gn transponder [m] [ps] G1 4.1 15 087 G2 6.4 21 208 G3 3.7 12 271

    [0182] The distances and times of flight are proportional to one another.

    [0183] From the distances and times of flight, the computing device F-CPU, with the aid of geometric relationships, assesses whether ambiguities are possible and calculates the protection radius r.sub.p around the position Tag_calc at the location (x.sub.Tag_calc, y.sub.Tag_calc, z.sub.Tag_calc).

    [00005] d GW _ Tag _ calc = ( x Tag _ calc - x GW ) 2 + ( y Tag _ calc - y GW ) 2 + ( z Tag _ calc - z GW ) 2

    [0184] For a safe distance between the object transponder and an anchor gateway determined without errors by means of a failsafely operating computing unit, it holds true that:


    d.sub.TWR=d.sub.Tag_calc

    [0185] With a localizing error, the following relationship holds true:


    error=d.sub.GW_Tag_calc−d.sub.TWR

    [0186] The protection radius r.sub.p can be increased by a correction value composed of the latency of the distance measurements and the maximally defined speed of the object transponder T.

    [0187] The protection radius r.sub.p is determined using the two-way ranging method, which determines the time of flight of a UWB RF signal and then calculates the distance between the nodes by multiplying the time by the speed of light. The TWR process is employed between the object transponder and the requested anchor; only one anchor is permitted to participate in the TWR at a specific point in time.

    [0188] The protection radius r.sub.p for the worst-case scenario can be determined by the F-CPU by way of the relationship


    r.sub.p=2*d.sub.TWRmin+delta.sub.max


    where


    d.sub.TWRmin=min.sub.n=1 . . . #gatewaysd.sub.TWRn

    [0189] FIG. 12 illustrates the geometric relationship that is taken into account in the preceding relationship when the person transponder position calculated by the system is incorrect. The calculated protection radius r.sub.p covers exactly the area around the actual person transponder position Tag_true (10.0, 13.0, 1.6) that is indicated by the circle 110 around the position Tag_calc (10.0, 6.0, 1.6).

    [0190] The distance d.sub.true corresponds to the distance between the actual person transponder position Tag_true (10.0, 13.0, 1.6) and the anchor position G1 (10.0, 10.2, 2.3).

    [0191] The distance d.sub.TWR corresponds to the radius of the circle 111 around the anchor position G1 used.

    [0192] The circle 112 has its center point around the anchor position G2 (10.0, 9.8, 2.3) used.

    [0193] FIG. 13 illustrates the geometric relationship that is taken into account in the preceding formula when the person transponder position calculated by the system is correct. The calculated protection radius r.sub.p is larger than required and covers the area around the actual person transponder position which is indicated by the circle 120 around the position Tag_calc (7.2, 9.1, 1.6). The actual position Tag_true (7.1, 9.2, 1.6) lies just next to the calculated position Tag_calc.

    [0194] The circle 121 has its center point around the anchor position G1 (10.0, 10.2, 2.3) used.

    [0195] The circle 122 has its center point around the anchor position G2 (10.0, 9.8, 2.3) used.

    [0196] FIG. 14 shows the geometric relationship of distances in the determination of the protection radius r.sub.p based on one example.

    [0197] Here, a maximum distance delta.sub.max is calculated by the computing device F-CPU.


    delta.sub.max=max.sub.n=1 . . . #gateways|d.sub.GWn_Tag_calc−d.sub.GWn_TWR|

    [0198] Given an actual position Tag_true (6.0, 8.0, 1.6), gateway positions G1 (10.0, 14.0, 2.3), G2 (10.0, 6.0, 2.3) and G3 (4.0, 10.0, 2.3), and also the ascertained position Tag_calc (9.0, 10.1, 1.6), the corresponding distances can be ascertained.


    delta.sub.G1=delta.sub.Tag_G1−d.sub.TWR_G1


    delta.sub.G2=delta.sub.Tag_G2−d.sub.TWR_G2


    delta.sub.G3=delta.sub.Tag_G3−d.sub.TWR_G3

    [0199] This results in the following for this example:


    delta.sub.max=delta.sub.G1

    [0200] FIG. 15 shows the geometric relationship of distances in the determination of the protection radius r.sub.p on the basis of a further example. Here, a maximum distance delta.sub.max is calculated by the computing device F-CPU.


    delta.sub.max=max.sub.n=1 . . . #gateways|d.sub.GWn_Tag_calc−d.sub.GWn_TWR|

    [0201] Given an actual position Tag_true (12.0, 10.0, 1.6), gateway positions G1 (10.0, 14.0, 2.3), G2 (10.0, 6.0, 2.3) and G3 (4.0, 10.0, 2.3), and also the ascertained position Tag_calc (8.0, 10.0, 1.6), the corresponding distances can be ascertained.


    delta.sub.G1=delta.sub.Tag_G1−d.sub.TWR_G1


    delta.sub.G2=delta.sub.Tag_G2−d.sub.TWR_G2


    delta.sub.G3=delta.sub.Tag_G3−d.sub.TWR_G3

    [0202] This results in the following for this example:


    delta.sub.max=delta.sub.G3

    [0203] The protection radius r.sub.p is discernible as a circle 140.

    [0204] The measured distances between the object transponder T and the gateways G1-G3 are represented as circles 141-143 around the gateways G1-G3.

    [0205] FIG. 16 illustrates, on the basis of one example, sectors that can be defined around an object transponder T at the position (x.sub.Tag_calc, y.sub.Tag_calc, z.sub.Tag_calc) as relative origin (0, 0), for example, with an angular resolution of 11.25°, whereby a circle is subdivided into 32 segments or sectors of equal size. In general, however, the number of sectors can be N.

    [0206] The use of sectors is a simple method for establishing whether the transponder T is situated within the triangle spanned by the anchor gateways G1-G3. This is advantageous particularly when a cost-effective, but low-performance, failsafe computing device F-CPU is used, which may have a reduced instruction set.

    [0207] The computing device F-CPU calculates a maximum free consecutive sector count FCS.sub.max, and also the relevant sectors that are taken into account in order to optimize the calculation of the protection radius r.sub.p.

    [0208] The worst case for ascertaining the protection radius r.sub.p can lead to an unexpected switch-off as a result of side effects of UWB technology. By using those gateways that are best suited in the sense of a best possible geometry arrangement, this reduces the probability of incorrectly determined distances and directions.

    [0209] The parameter FCS.sub.max describes the geometric situation by way of a corresponding arrangement with measured distances between different combinations of gateways and the object transponder, the determination of which necessitates determining the sectors in which the gateways are arranged.

    [0210] FIG. 17 shows by way of example the direction ascertained for the gateway G1 at position (x.sub.GW1, y.sub.GW1, z.sub.GW1) in sector 4, proceeding from the object transponder T in accordance with the preceding figure, and the associated distance d.sub.GW1_TWR.

    [0211] In the illustrated example, FCS.sub.max=31 and the geometric situation is poor.

    [0212] FIG. 18 supplements the preceding example by the direction ascertained for the gateway G3 at position (x.sub.GW3, y.sub.GW3, z.sub.GW3) in segment 15, and also the associated distance d.sub.GW3_TWR.

    [0213] In the illustrated example, FCS.sub.GW1_GW3=10 and FCS.sub.GW3_GW1=20, as a result of which FCS.sub.max=20. The geometric situation is somewhat better than with one gateway.

    [0214] FIG. 19 supplements the preceding example by the direction ascertained for the gateway G2 at position (x.sub.GW2, y.sub.GW2, z.sub.GW2) in segment 23, and also the associated distance d.sub.GW2_TWR.

    [0215] In the illustrated example, FCS.sub.GW1_GW3=10, FCS.sub.GW3_GW2=7 and FCS.sub.GW2_GW1=12, as a result of which FCS.sub.max=12. The geometric situation is better than with two gateways.

    [0216] Those gateways which define FCS.sub.max are used for calculating the protection radius r.sub.p.

    [0217] In this example, the gateways G1 and G2 define FCS.sub.max.


    Δx.sub.GWn=x.sub.GWn−x.sub.Tag calc


    Δy.sub.GWn=y.sub.GWn−y.sub.Tag_calc

    [0218] The parameters x.sub.GWn and x.sub.Tag_calc are not used in the sector determination.

    [0219] The protection radius r.sub.p can then be calculated by the computing device F-CPU for [0220] FCS.sub.max≥N/2, in this example FCS.sub.max≥16 in the case of 32 segments, i.e., 180°
    in accordance with the relationship:


    r.sub.p=√{square root over (y.sub.diff.sup.2+(h.sub.TWR+h.sub.Tag_calc).sup.2)}.

    [0221] FIG. 20 shows the object transponder T at the calculated position Tag_calc (16.0, 12.0, 1.6) and at the actual position (6.0, 8.0, 1.6), and also the gateway G1 at the position (10.0, 14.0, 2.3), the gateway G2 at the position (10.0, 6.0, 2.3) and the gateway G3 at the position (4.0, 10.0, 2.3) in a configuration that leads to an FCS.sub.max=26. Here, all the gateways G1-G3 are arranged to the left of the object transponder T, which results in a poor geometric situation of the distances between the object transponder T and the gateways G1-G3.

    [0222] The protection radius r.sub.p is discernible as a circle 150.

    [0223] FIG. 21 illustrates the geometric relationship from the preceding formula. The measured distances between the object transponder T and the gateways G1-G3 are represented as circles 151-153 around the gateways G1-G3, which lead to an intersection point in relation to the actual object transponder position Tag_true.

    [0224] FIG. 22 shows an arrangement with an object transponder T arranged approximately centrally between the gateways G1-G3, which results in a favorable geometric situation of the distances between the object transponder T and the gateways G1-G3.

    [0225] The figure shows the object transponder T at the calculated position Tag_calc (9.0, 10.2, 1.6) and at the actual position Tag_true (6.0, 8.0, 2.6), and also the gateway G1 at the position (10.0, 14.0, 2.3), the gateway G2 at the position (10.0, 6.0, 2.3) and the gateway G3 at the position (4.0, 10.0, 2.3).

    [0226] The configuration chosen in this example leads to an FCS.sub.max=12.

    [0227] In contrast to the previously mentioned relationship, the protection radius r.sub.p can be calculated by the computing device F-CPU for [0228] FCS.sub.max<N/2, in this example FCS.sub.max<16 in the case of 32 segments, i.e. 180°, and also


    h.sub.Tag_calc.Math.0.7<delta.sub.max

    but in accordance with the relationship:


    r.sub.p=√{square root over (y.sub.diff.sup.2+(h.sub.TWR+h.sub.Tag_calc).sup.2)}+delta.sub.max.

    [0229] The protection radius r.sub.p is discernible as a circle 160.

    [0230] FIG. 23 illustrates the geometric relationship according to the preceding formula. The measured distances between the object transponder T and the gateways G1-G3 are represented as circles 161-163 around the gateways G1-G3, which lead to an intersection point in relation to the actual object transponder position Tag_true.

    [0231] FIG. 24 illustrates the geometric relationship for distances of an arrangement analogous to FIG. 18 and FIG. 19.

    [0232] In this case, the computing device F-CPU calculates the distances h.sub.TWR and h.sub.Tag_calc in accordance with the mathematical relationships:

    [00006] d Gateways = ( x G 1 - x G 2 ) 2 + ( y G 1 - y G 2 ) 2 h TWR = d TWR _ G 1 2 - ( d Gateways 2 - d TWR G 2 2 + d TWR G 1 2 ) 2 4 .Math. d Gateways 2

    [0233] The following therefore arises in this example:

    [00007] d Tag G 1 = ( x G 1 - x Tag calc ) 2 + ( y G 1 - y Tag calc ) 2 d Tag_G 2 = ( x G 2 - x Tag _ calc ) 2 + ( y G 2 - y Tag _ calc ) 2 h Tag _ calc = d Tag _ G 1 2 - ( d Gateways 2 - d Tag G 2 2 + d Tag G 1 2 ) 2 4 .Math. d Gateways 2

    [0234] FIG. 25 illustrates the geometric relationship for the abovementioned formula for determining the distance h.sub.Tag_calc. FIG. 26 illustrates the geometric relationship for the distance y.sub.diff, which is determined by the computing device F-CPU.

    [0235] The gateways are arranged at the positions G1 (10.0, 14.0, 2.3), G2 (10.0, 6.0, 2.3) and G3 (4.0, 10.0, 2.3).

    [0236] The object transponder is arranged at the actual position Tag_true (6.0, 8.0, 1.6) and the ascertained position Tag_calc (16.0, 12.0, 1.6).

    [0237] The following mathematical relationships are determined for this purpose:


    d.sub.Gateways=√{square root over ((x.sub.G1−x.sub.G2).sup.2+(y.sub.G1−y.sub.G2).sup.2)}


    y.sub.Tag_G1=√{square root over ((d.sub.Tag_G1.sup.2−h.sub.Tag_calc.sup.2)}


    y.sub.Tag_G1=√{square root over ((d.sub.Tag_G2.sup.2−h.sub.Tag_calc.sup.2)}


    y.sub.TWR_G1=√{square root over ((d.sub.TWR_G1.sup.2−h.sub.TWR.sup.2)}


    y.sub.TWR_G2=√{square root over ((d.sub.TWR_G2.sup.2−h.sub.TWR.sup.2)}

    [0238] As long as all the following conditions are true:


    y.sub.TWR_G1<d.sub.Gateways


    y.sub.TWR_G2<d.sub.Gateways


    y.sub.Tag_G1<d.sub.Gateways


    y.sub.Tag_G2<d.sub.Gateways

    [0239] The following relationship holds true:


    y.sub.diff=y.sub.TWR_G1−y.sub.Tag_G1

    Otherwise, the protection radius r.sub.p is determined by:


    r.sub.p=2*d.sub.TWR+delta.sub.max

    [0240] The figure illustrates the geometric relationship for the distance y.sub.diff if


    y.sub.Tag_G2>d.sub.Gateways


    y.sub.TWR_G2>d.sub.Gateways

    [0241] The protection radius r.sub.p is discernible as a circle 150.

    [0242] The measured distances between the object transponder T and the gateways G1-G3 are represented as circles 151-153 around the gateways G1-G3.

    [0243] FIG. 27 illustrates, for the arrangement from the preceding figure, the geometric relationship for the protection radius r.sub.p if


    y.sub.Tag_G2>d.sub.Gateways


    y.sub.TWR_G1>d.sub.Gateways

    [0244] The protection radius r.sub.p is discernible as a circle 170.

    [0245] The measured distances between the object transponder T and the gateways G1-G3 are represented as circles 171-173 around the gateways G1-G3.

    [0246] FIG. 28 illustrates the geometric relationship for the protection radius r if


    y.sub.Tag_G2>d.sub.Gateways


    y.sub.TWR_G2<d.sub.Gateways

    [0247] The protection radius r.sub.p is discernible as a circle 180.

    [0248] The measured distances between the object transponder T and the gateways G1-G3 are represented as circles 181-183 around the gateways G1-G3.

    [0249] FIG. 29 illustrates the geometric relationship for the protection radius r.sub.p if


    y.sub.Tag_G2<d.sub.Gateways


    y.sub.TWR_G1<d.sub.Gateways

    [0250] The protection radius r.sub.p is discernible as a circle 190.

    [0251] The measured distances between the object transponder T and the gateways G1-G3 are represented as circles 191-193 around the gateways G1-G3.

    [0252] The computing device F-CPU can then correct the protection radius r.sub.p in accordance with the following relationship:


    r.sub.p′=r.sub.pv.sub.maxTag.Math.Δt

    [0253] Where Δt is the time difference with respect to the last successful implementation of latency monitoring, and also the safe calculation of distance and protection radius r.sub.p.

    [0254] By way of example, the person P who is carrying the object transponder T by wearing it may move at a speed of v.sub.maxTag if the two-way data acquisition is effected, for example, every 400 ms or preferably every 100 ms. Here, the protection radius r.sub.p is possibly not large enough to cover the position of the object transponder T.

    [0255] Thus, while there have been shown, described and pointed out fundamental novel features of the invention as applied to a preferred embodiment thereof, it will be understood that various omissions and substitutions and changes in the form and details of the methods described and the devices illustrated, and in their operation, may be made by those skilled in the art without departing from the spirit of the invention. For example, it is expressly intended that all combinations of those elements and/or method steps which perform substantially the same function in substantially the same way to achieve the same results are within the scope of the invention. Moreover, it should be recognized that structures and/or elements and/or method steps shown and/or described in connection with any disclosed form or embodiment of the invention may be incorporated in any other disclosed or described or suggested form or embodiment as a general matter of design choice. It is the intention, therefore, to be limited only as indicated by the scope of the claims appended hereto.