CN112154321A - Safety method for penetrant or magnetic powder inspection - Google Patents

Safety method for penetrant or magnetic powder inspection Download PDF

Info

Publication number
CN112154321A
CN112154321A CN201980034499.9A CN201980034499A CN112154321A CN 112154321 A CN112154321 A CN 112154321A CN 201980034499 A CN201980034499 A CN 201980034499A CN 112154321 A CN112154321 A CN 112154321A
Authority
CN
China
Prior art keywords
photograph
terminal
picture
weld
unique identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201980034499.9A
Other languages
Chinese (zh)
Inventor
J·卡托尼奥
J·瓦朗西
S·克罗泽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEWEIS
Original Assignee
BEWEIS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEWEIS filed Critical BEWEIS
Publication of CN112154321A publication Critical patent/CN112154321A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N21/00Investigating or analysing materials by the use of optical means, i.e. using sub-millimetre waves, infrared, visible or ultraviolet light
    • G01N21/84Systems specially adapted for particular applications
    • G01N21/88Investigating the presence of flaws or contamination
    • G01N21/91Investigating the presence of flaws or contamination using penetration of dyes, e.g. fluorescent ink
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N21/00Investigating or analysing materials by the use of optical means, i.e. using sub-millimetre waves, infrared, visible or ultraviolet light
    • G01N21/84Systems specially adapted for particular applications
    • G01N21/88Investigating the presence of flaws or contamination
    • G01N21/8851Scan or image signal processing specially adapted therefor, e.g. for scan signal adjustment, for detecting different kinds of defects, for compensating for structures, markings, edges
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N27/00Investigating or analysing materials by the use of electric, electrochemical, or magnetic means
    • G01N27/72Investigating or analysing materials by the use of electric, electrochemical, or magnetic means by investigating magnetic variables
    • G01N27/82Investigating or analysing materials by the use of electric, electrochemical, or magnetic means by investigating magnetic variables for investigating the presence of flaws

Landscapes

  • Chemical & Material Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Biochemistry (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Analytical Chemistry (AREA)
  • Pathology (AREA)
  • Immunology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Chemical Kinetics & Catalysis (AREA)
  • Electrochemistry (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Signal Processing (AREA)
  • Investigating Materials By The Use Of Optical Means Adapted For Particular Applications (AREA)
  • Investigating Or Analyzing Materials By The Use Of Magnetic Means (AREA)

Abstract

The invention relates to a safety method of a penetration or magnetic particle inspection method aiming at material discontinuous points in an object (S), which is characterized in that: -the method comprises a step of identifying the object (S) by mounting a carrier (1) in the vicinity of said object, the carrier containing a unique identifier that is remotely readable by a mobile reading terminal (3), -the mobile reading terminal (3) reading the unique identifier, necessary for implementing the detection method.

Description

Safety method for penetrant or magnetic powder inspection
Technical Field
The invention aims to provide a safety method for a penetrant or magnetic particle inspection method.
The invention relates to the technical field of non-destructive testing methods for objects in which material discontinuities may occur, using test products, such as in particular infiltration and magnetic powder techniques. The present invention relates more broadly to a security traceability method for non-destructive inspection.
Background
Penetrant inspection can detect discontinuities (holes, micro-marks, cracks, etc.) present on the surface of objects such as welds. Penetrant inspection is applicable to any material of an object to be inspected.
In a first step, the surface of the object to be inspected is cleaned with a cleaning product to remove contaminants (grease, rust, oxidation, etc.) that may block the discontinuities.
The colored penetrant product is then applied to the cleaned surface. The viscosity of the product is such that it can penetrate into the discontinuity to be detected by capillary action.
The penetrant is typically allowed to remain on the surface of the object for 5 to 20 minutes. This is the first expected condition to ensure that it penetrates sufficiently into the interior of the discontinuity. At the end of this time, the surface is re-cleaned to remove penetrants that did not effectively penetrate into the interior of the discontinuity.
The developer product (powder, suspension or solution) is applied to the cleaned surface, for example talc, which has an "ink-absorbing" effect. Within a specified time (e.g., 20 minutes), the developer is allowed to act and the penetrant will bleed out from the discontinuities and cause the appearance of spots, indicating the presence of discontinuities. Developer exposure time is the second desired condition.
The spots and their location, shape and size are accurately recorded by the technician, usually by taking a picture and attaching it to a report. The several observations made over time allow the technician to determine with a certain degree of accuracy the shape and size of the various discontinuities thus detected, and hence their risk, according to the shape and size of the speckles present during the successive observations, and to intervene accordingly.
After a series of observations, the developer product and the penetrant product that has penetrated are removed by appropriate cleaning of the surface.
In the apparatus, some surfaces to be inspected, such as welds and the like, are more difficult to access than others. Thus, the technician may be reluctant to inspect the difficult to reach weld "a". In this case, he may perform the penetrant testing operation on the more accessible weld "B" and indicate in his report that the photograph he takes corresponds to the penetrant testing operation on weld "A".
In addition, the technician with the ill intent may not follow the prescribed expected conditions. For example, to save time, the technician may shorten the time of action of the penetrant and/or developer. In this case, the discontinuity may not be detected and/or its results may be minimized.
Magnetic particle inspection is an alternative non-destructive inspection technique that detects the presence of discontinuities in an object (whether or not present on a surface). This technique consists in generating a magnetic flux on the surface of ferromagnetic materials (iron, cast iron, steel, welds, thin plates, etc.).
As with penetrant inspection, the surface to be inspected is first cleaned to remove contaminants.
The developer product is then applied to the cleaned surface. The product is usually in the form of a liquid mixed with colored or fluorescent metal particles.
The surface to be examined is then magnetized with a sufficiently strong magnetic field. In the presence of a discontinuity, the lines of the magnetic field may be distorted, thereby generating a "leakage magnetic field", also referred to as "leakage flux", which provides a characteristic sign of the discontinuity by attracting the metal particles. These signs were observed, photographed and recorded in a report written by the technician.
For ferromagnetic objects to be inspected, magnetic particle inspection is preferred over penetrant inspection because of its faster speed. In fact, the aforementioned desired conditions are no longer required. However, the drawbacks caused by implementing this method by technicians reluctant to verify the presence of an undesired intent of having a difficult to reach object still remain.
The present invention aims to improve this situation. In particular, the object of the invention is to propose a method that makes it possible to trace back and secure a non-destructive inspection, in particular with the aim of ensuring that all surfaces to be inspected are suitable and comply with the operating protocol.
It is another object of the present invention to automate the editing of test reports as much as possible.
Disclosure of Invention
The solution provided by the invention is a safety method of a permeation or magnetic particle inspection method aiming at the discontinuous points of substances in an object. The method is characterized in that:
it comprises the step of identifying an object by mounting a carrier in the vicinity of said object, the carrier containing a unique identifier remotely readable by a mobile reading terminal,
the mobile reading terminal reads the unique identifier, necessary for implementing the detection method.
Thus, a complete implementation of the detection method requires reading the unique identifier at least once. If this reading is not made, all or part of the steps of the probing method cannot be performed. Therefore, it is certain that the detection method can be favorably carried out for a correct object. Taking the above example as an example, a technician who should inspect the hard-to-reach weld "A" would no longer be able to perform penetrant inspection operations on the more easily accessible weld "B". In fact, each weld now has its own unique identifier. Thus, the inspector will easily find that the detection method is not performed at the weld "a", but at the weld "B".
Further advantageous features of the method subject of the invention are listed below. Each of these features can be utilized alone or in combination with the other salient features described above and which are not essential to the solution of the technical problem and to the following features proposed as solutions, as subject of one or more divisional patent applications:
advantageously, the mobile reading terminal reads the unique identifier so that the time window is open, during which at least one photograph is taken of the object after and/or before the step of performing the detection method.
The method may comprise the steps of: the unique identifier is written onto the carrier in a macroscopic manner and the object is photographed such that the macroscopic unique identifier on the carrier is visible in the photograph.
Advantageously, after the step of detecting the method is performed, it is necessary to take a picture of the object in order to perform the next step of the method.
Advantageously, the taking of the picture of the object is done on a mobile reading terminal, which contains the picture taking means.
The method may comprise the step of adding a time stamp to each picture of the object.
Advantageously, after the step of performing the probing method, it is necessary to read the unique identifier from the mobile reading terminal in order to perform the next step of the method.
The method may comprise the steps of: before the first step of the probing method is executed, the unique identifier is read from the mobile reading terminal, and a file can be opened on a graphical interface of the terminal through the previous reading so as to report the progress of the steps of the probing method.
The method may comprise the steps of: -associating the unique identifier with supplementary information about the object in a computer memory or a computer database; -accessing a computer memory or a computer database after having read the unique identifier from the mobile reading terminal in advance; -generating a pre-filled report in which supplementary information contained in a computer memory or a computer database is recorded and which supplementary information is associated with the unique identifier that has been read; -opening a file on the graphical interface of the mobile reading terminal, the file being in the form of a pre-filled report.
The detection method may be a penetrant inspection method, comprising a step of cleaning the surface of the object and a step of applying a colored penetrant product to said surface after cleaning, the method comprising the steps of: -taking a picture of the surface of the cleaned object; -applying a penetrant product to the surface of the cleaned object; -taking a first picture of the surface of the cleaned object with the penetrant product applied thereon; -taking a second picture of the cleaned object surface with the penetrant product applied thereto, the second picture being taken after a specified time interval after the first picture was taken.
The detection method may be a penetrant inspection method comprising the step of applying a developer to the surface of the object, the method comprising the steps of: -taking a first picture of the surface of the object on which the developer product is applied; -taking a second picture of the surface of the object with the developer product applied thereon, the second picture being taken after a specified time interval after the first picture was taken.
The method may comprise the steps of: a carrier in the form of a label, a sleeve or a plate is used and a unique identifier is written into an RFID chip, a bar code or in the form of a set of coded or encrypted characters suitable for reading by an optical character recognition device.
Drawings
Further advantages and characteristics of the invention will be elucidated by means of a preferred embodiment, given as a non-limiting example, in combination with the accompanying drawings, in which:
figure 1 shows the installation of a flat plate carrier at a pipe weld,
figure 2 shows the layout of the various elements of a computer server that can be used in the invention,
figure 3 shows the layout of the various elements of the mobile reading terminal,
FIG. 4 shows the steps of one inspection method of the penetrant inspection method,
FIG. 5 shows the steps of another inspection method of the penetrant inspection method,
FIG. 6 shows the steps of an inspection method of the magnetic particle inspection method,
fig. 7 shows the steps of another inspection method of the magnetic particle inspection method.
Detailed Description
The following description refers to penetrant or magnetic particle inspection techniques for material discontinuities in a weld of a pipeline. The invention is also applicable to the inspection of other types of objects, such as welded assemblies, forged products, cast products, mechanical parts, surgical prostheses, etc.
Fig. 1 shows a pipe T with a weld S to be inspected. This weld S is identified by mounting the carrier 1 in the vicinity of the weld. The carrier 1 can be fixed, for example, to the wall of the pipe T within a radius of from 20cm from the weld S1. The support 1 is advantageously in the form of a sticker label applied to the wall of the tube T, having a rectangular shape with a length of about 5cm and a width of about 4 cm. To avoid counterfeiting or tampering, the label may be non-peelable, that is, it will tear or disperse if attempted to be torn off.
It is also possible to use, for example, rigid or flexible plates, permanently fixed to the wall of the tube T, for example by screwing or welding. It is also possible to use a plate-carrier which is connected to the pipe T at the weld S to be tested by means of a plastic ring or a steel blank which is slipped onto said pipe T. The collar is preferably provided with a safety lock preventing its disengagement from the pipe T. It is also possible to use the carrier 1 directly in the form of a collar (without a plate).
The carrier 1 contains a unique identifier that can be remotely read by a mobile reading terminal 3. In fig. 1, the identifier is recorded in the memory of the RFID chip 10. The RFID chip is in the form of, for example, a circuit, is affixed to or embedded in the carrier 1, and includes an antenna matched to the electronic chip, enabling it to receive and respond to radio requests issued from the mobile reading terminal 3. The unique identifier may also be written into an NFC chip, barcode (1D barcode, QR-Code). The identifier may also be recorded in the form of a set of encoded (or encrypted) characters. The mobile reading terminal 3 comprises Optical Character Recognition means (OCR) adapted to read a set of coded or encrypted characters and to extract an identifier therefrom.
The unique identifier written into the RFID 10 chip is preferably comprised of a set of letters and/or numbers and/or symbols. By way of example, and for purposes of explaining the present invention, an identifier "C231A 226" is associated with weld S. In fig. 1, the identifier "C231 a 226" is also written on the carrier 1 in a manner visible to the naked eye.
To facilitate marking of welds in the apparatus, each weld is advantageously associated with geographical location information as it is formed. For example, once the welder has made a weld, he may record his position, and thus the location of the weld, by touching the touch screen tablet containing a geo-location program, which may, for example, associate GPS coordinates with an identifier of the weld S. The RFID chip 10 may also be read by an RFID chip reader integrated with a GPS module that can record GPS coordinates. When the chip 10 is read, the recorded GPS coordinates are collected. These GPS coordinates may then be associated with the unique number of the chip 10 and with the identifier of the S-weld.
When manufacturing the carrier 1, the unique identifier of the weld S is written into the memory of the RFID chip 10. This writing is done automatically by software of a type known to those skilled in the art. It is also possible to add geographical location information associated with the weld S in the carrier 1, in particular in the memory of the RFID chip 10. May be, for example, the GPS coordinates described above. In this way, by scanning the RFID chip 10, the operator can verify whether he has mounted the carrier 1 correctly at the respective weld S.
The memory of the RFID chip 10 may also contain supplementary information relating to the weld S, such as: equipment name, welder name, weld joint position, weld joint material, weld joint thickness, final inspection date, and the like.
The supplemental information is preferably recorded in a computer memory or computer database, for example, integrated in a remote computer server. The computer memory or computer database contains, for example, a table in which each unique identifier is associated with supplementary information about the weld (or object) in question.
The computer server may consist of a physical server or, in some cases, several different computers that communicate and interact over a network to perform the functions described in the foregoing specification. The server is preferably "remote", meaning that it is not located in the room in which the pipes T and welds S are located, but rather outside.
Referring to FIG. 2, the computer server 4 includes, among other things, one or more processors or microprocessors 40, one or more computer memories or computer databases 41, and a network interface 42, all interconnected by a bus 43. One or more computer application programs (or computer programs) are stored in the memory 41 and, when executed by the processor 40, can implement the functions described later in the specification by its instructions.
The network interface 42 is a wired or wireless communication interface adapted to establish communication with the mobile reading terminal 3. In order to secure the data exchange between the mobile reading terminal 3 and the server 4, the connection between these two elements may be realized by a VPN virtual private network, a secure internet or a wired connection. It should be noted that the technical features of the household appliance stored in the memory 41 may be stored in the database 5 (in addition to or instead of said memory).
The memory or database 41 may be hosted directly in the server 4, or in another server, or in a network of servers of the cloud computing type, or in a computer, or even directly in the mobile reading terminal 3.
The mobile reading terminal 3 (fig. 1 and 3) is in the form of an electronic terminal, such as a touch-screen electronic tablet computer (c: (c))
Figure BDA0002792286810000061
Samsung
Figure BDA0002792286810000062
Etc.) running via a Windows, Mac, iOS, Android-type operating system, or in the form of a mobile phone or Smartphone, e.g. as in the case of a mobile phone or Smartphone
Figure BDA0002792286810000063
Figure BDA0002792286810000064
And the like. The terminal 3 is suitable for operation by a natural person, in practice a technician who carries out a penetrant or magnetic particle inspection method.
With reference to fig. 3, the mobile terminal 3 comprises, among other things, one or more processors or microprocessors 30, one or more memories 31, a network interface 32, a graphical interface 33, a reader 34(RFID chip reader, NFC chip reader, bar code or QR code scanner, etc.) adapted to the nature of the unique identifier to be read, means 35 for taking pictures, these elements being connected to each other by a common bus 36. One or more computer application programs (or computer programs) are stored in the memory 31, and their instructions (or code) when executed by the processor 30 may implement the functions that will be described later in the specification.
The one or more memories 31 should be regarded as storage means also suitable for storing data and/or data files. This may be a local memory or a peripheral memory, such as a Secure Digital (SD) card.
The processor 30 and memory 31 may be integrated into a SIM card (from the english identification Module) which is connected to the bus 36.
The network interface 32 is particularly suitable for establishing communication with the remote server 4. The network interface 32 may for example comprise a GSM module providing a network connection for the mobile terminal 3. In general, the function of the network interface 32 is to establish a connection between the mobile terminal 3 and a telecommunications network via a network technology, such as, but not limited to, GSM, EDGE, 2G, 3G, 4G technologies, etc.
The graphical interface 33 provides the user with the possibility to enter, select and/or enter data or instructions. It is in the form of, for example, a touch screen, a screen connected to a keyboard, etc.
The reader 34 is particularly suitable for receiving and sending signals for wireless communication with the carrier 1, more particularly with the chip 10 (or bar code or QR code, etc.). These signals may be radio frequency signals using bluetooth, ISM, Wifi, ANT, ZIGBEE, etc. protocols. The reader can be integrated directly into the terminal 3 or can be connected to the latter by wire or wirelessly.
The means 35 are for example a camera and/or a camcorder integrated into the mobile terminal 3. It is also possible to use a device remote from the mobile terminal 3, which is connected to the mobile terminal in a wired or wireless manner.
The user may need to install one or more computer applications in his mobile terminal 3 in order to implement the invention, in particular the pairing procedure, from said terminal in whole or in part. These computer applications may be preinstalled on the terminal 3. Alternatively, the user may search for these computer applications on a dedicated internet site and then download them onto his terminal 3.
The respective steps of the method for securing the penetrant inspection method will be described with reference to fig. 4. In this embodiment, further the unique identifier contained in the carrier 1 is read continuously, which may ensure a smooth progress of the operating scheme.
Preparation phase
This preparation phase is optional.
Step E1: the technician uses the terminal 3 to read the unique identifier contained in the carrier 1 mounted in the vicinity of the weld S. The terminal 3 reads, for example, an identifier written into the RFID chip 10 (or an identifier written into an NFC chip, a barcode, a QR code, or the like).
Step E2: the RFID chip 10 sends the unique identifier back to the terminal 3.
Step E3: the terminal 3 accesses the memory or database by communicating the read unique identifier to the memory or database 41.
Event EV 4: the server 4 searches its list for supplemental information associated with the received unique identifier. This event EV4 may be done in terminal 3 if a memory or database 41 is provided in the terminal.
Step E5: the server 4 transmits the supplementary information to the terminal 3.
Event EV 6: the terminal 3 generates a pre-filled report in which the received supplementary information (equipment name, welder name, weld identification and location, weld material, weld thickness, last inspection date, etc.) is recorded. The report is opened on the graphical interface 33 of the terminal 3 displaying it. The technician may need to populate the report with other information such as co-names, qualifications, dates and times, etc. Typically, the identifier read beforehand in step E1 may open a file (preferably a pre-filled report as described above) on the graphical interface 33 of the terminal 3, which may report to the technician the progress of the steps of the penetrant inspection process.
Execution of steps of penetrant inspection method
The file opened on the graphical interface 33 of the terminal 3 indicates to the technician mainly the instructions to follow to carry out each step and can report the progress of the steps of the detection method.
Event EV 7: the terminal 3 automatically displays an instruction to clean the surface of the weld S on the graphical interface 33. The technician cleans the surface with a cleaning product to remove contaminants that may block the discontinuities.
Step E8: after the cleaning step (event EV7) has been performed, the technician uses the terminal 3 to read the identifier written into the RFID chip 10. This reading instruction preferably appears on the graphical interface 33.
Step E9: the RFID chip 10 sends the unique identifier back to the terminal 3.
Event EV 10: the technician takes a picture of the cleaned surface of the weld S. This photograph taking instruction preferably appears on the graphical interface 33. According to an advantageous feature of the invention, it is the reading of the identifier from the terminal 3 (steps E8 and E9) that causes the time window to open automatically, during which the technician should take a picture of at least one cleaned weld S. The graphical interface 33 automatically displays a countdown, for example from 5 seconds to 30 seconds, during which the camera 35 must be activated for taking a picture. The duration of this time window is adjusted to be long enough to enable the technician to take a picture correctly, but too short for the less-intentioned technician to take another clean weld. In addition, since the carrier 1 is mounted near the weld S, the identifier "C231 a 226" written on the carrier 1 in a manner visible to the naked eye is also visible on the photograph. Thus, it can be determined that the correct weld is being cleaned and photographed. In order to further trace back the cleaning step of the weld S and/or to ensure that its photograph is not falsified, it is advantageous to add a time stamp on said photograph by means of the device 35 or the terminal 3. The photo will be automatically inserted into a file or report opened from the terminal 3.
Event EV 11: the technician applies a colored penetrant product to the cleaned surface of the weld S. The instruction appears on the graphical interface 33. If the technician did not photograph the cleaned weld S surface beforehand (event EV10), no penetrant product should be applied. In other words, it is necessary to take a picture of the surface of the weld S after cleaning (this is the trigger condition) for applying the penetrant product. Without this photograph taking, the terminal 3 would not display instructions to apply the osmotic agent product and the file or report would indicate that the protocol was not followed. In a modification, the identifier written into the RFID chip 10 is re-read after the event EV10, which is the trigger condition that the penetrant product can be applied.
Step E12: after application of the penetrant product (event EV11), the technician uses terminal 3 to read the identifier written into RFID chip 10. This reading instruction appears on the graphical interface 33, for example simultaneously with the instruction to apply the osmotic agent product (event EV 11).
Step E13: the RFID chip 10 sends the unique identifier back to the terminal 3.
Event EV 14: the technician takes a first picture of the cleaned surface of the weld S with the penetrant product applied thereto. The first photograph is taken so that the identifier "C231 a 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3. According to an advantageous feature of the invention, it is the identifier that is read from the terminal 3 (steps E12 and E13) that causes the time window to open automatically, during which the technician should take the first picture. The graphical interface 33 automatically displays a countdown, for example between 4 seconds and 30 seconds, during which the camera 35 must be activated for taking a picture.
Event EV 15: the technician takes a second picture of the cleaned weld S surface with the penetrant product applied thereto. This second photograph was taken after a specified time interval after the first photograph was taken (event EV 14). Advantageously, the taking of the first picture triggers a countdown of, for example, 5 to 20 minutes, during which the camera 35 is locked so that the technician cannot take the second picture. In a variant, this countdown starts with the re-reading of the identifier on the carrier 1 after the event EV 14. This ensures sufficient penetration of the penetrant product into discontinuities that may exist in the weld S (the first contemplated condition mentioned earlier). At the end of the countdown, the graphical interface 33 automatically displays a new countdown during which the camera 35 must be activated to take a second picture. This second photograph is taken so that the identifier "C231A 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3.
Step E16: after taking the second picture (event EV15), the technician uses the terminal 3 to read the identifier written into the RFID chip 10. This reading instruction preferably appears on the graphical interface 33, for example after the second photograph has been taken (event EV 15).
Step E17: the RFID chip 10 sends the unique identifier back to the terminal 3.
Event EV 18: the technician cleans the surface of the weld S to remove penetrants that have not effectively penetrated into the discontinuity. This instruction appears on the graphical interface 33 after the reading of the identifier in steps E16 and E17. The reading of the identifier in steps E16 and E17 is necessary for performing the cleaning phase. Without this reading, the terminal 3 would not display an instruction to clean the surface of the weld S and would indicate in the file or report that the operating protocol was not followed.
Step E19: after the cleaning step (event EV18) has been performed, the technician uses the terminal 3 to read the identifier written into the RFID chip 10. This reading command preferably appears on the graphical interface 33, for example simultaneously with the command to clean the surface of the weld S (event EV 18).
Step E20: the RFID chip 10 sends the unique identifier back to the terminal 3.
Event EV 21: the technician takes a picture of the cleaned surface of the weld S. This photograph taking instruction preferably appears on the graphical interface 33. According to an advantageous feature of the invention, it is the reading of the identifier from the terminal 3 (steps E19 and E20) that causes the time window to open automatically, during which the technician should take a picture of the cleaned weld S. The graphical interface 33 automatically displays a new countdown during which the camera 35 must be activated for taking a picture. The photograph is taken so that the identifier "C231 a 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3.
Event EV 22: the technician applies the developer product to the cleaned surface of the weld S. The instruction appears on the graphical interface 33. Preferably, if the technician did not take a picture of the cleaned weld S surface in advance (event EV18), the developer product should not be applied. In other words, it is necessary to take a picture of the surface of the weld bead S after cleaning (this is a trigger condition) for applying the developer product. Without this photograph taking, the terminal 3 will not display an instruction to apply the developer product and the file or report will indicate that the operating scheme was not followed. In a modification, the identifier written in the RFID chip 10 is re-read after the event EV21, which is the trigger condition for the application of the penetrant product.
Step E23: after applying the developer product (event EV22), the technician uses terminal 3 to read the identifier written into RFID chip 10. This reading command appears on the graphical interface 33, for example simultaneously with the command to apply the developer product (event EV 22).
Step E24: the RFID chip 10 sends the unique identifier back to the terminal 3.
Event EV 25: the technician takes a first picture of the surface of the weld S on which the developer product is applied. The first photograph is taken so that the identifier "C231 a 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3. According to an advantageous feature of the invention, it is the unique identifier that is read from the terminal 3 (steps E23 and E24) that causes the time window to open automatically, during which the technician should take the first picture. The graphical interface 33 automatically displays a new countdown during which the camera 35 must be activated for taking a picture.
Event EV 26: the technician takes a second picture of the surface of the weld S on which the developer product is applied. This second photograph was taken after a specified time interval after the first photograph was taken (event EV 25). Advantageously, the taking of the first picture triggers a countdown of, for example, 20 minutes during which the camera 35 is locked so that the technician cannot take the second picture. In a variant, this countdown starts with the re-reading of the identifier on the carrier 1 after the event EV 25. It is thus ensured that the penetrant exudes from the discontinuity and that a spot showing the presence of the discontinuity appears (the second expected condition mentioned earlier). At the end of the countdown, the graphical interface 33 automatically displays a new countdown during which the camera 35 must be activated to take a second picture. This second photograph is taken so that the identifier "C231A 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3.
Step E27: after taking the second picture (event EV26), the technician uses the terminal 3 to read the identifier written into the RFID chip 10. This reading instruction preferably appears on the graphical interface 33, for example after the second photograph has been taken (event EV 26).
Step E28: the RFID chip 10 sends the unique identifier back to the terminal 3.
Event EV 29: the technician cleans the surface of the weld S to remove the developer product as well as the penetrant product that has penetrated. This instruction appears on the graphical interface 33 after the reading of the identifier in steps E27 and E28. The reading of the identifier in steps E27 and E28 is necessary for performing the cleaning phase. Without this reading, the terminal 3 would not display an instruction to clean the surface of the weld S and would indicate in the file or report that the operating protocol was not followed.
Step E30: after the cleaning step (event EV29) has been performed, the technician uses the terminal 3 to read the identifier written into the RFID chip 10. This reading command preferably appears on the graphical interface 33, for example simultaneously with the command to clean the surface of the weld S (event EV 29).
Step E31: the RFID chip 10 sends the unique identifier back to the terminal 3.
Event EV 32: the technician takes a picture of the cleaned surface of the weld S. This photograph taking instruction preferably appears on the graphical interface 33. According to an advantageous feature of the invention, it is the reading of the identifier from the terminal 3 (steps E30 and E31) that causes the time window to open automatically, during which the technician should take a picture of the cleaned weld S. The graphical interface 33 automatically displays a new countdown during which the camera 35 must be activated for taking a picture. The photograph is taken so that the identifier "C231 a 226" is also visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3.
Step E33: the terminal 3 sends a file or report to the server 4 in which the progress of each step of the penetrant inspection process is recorded, with different pictures taken. This transmission is triggered either automatically after taking a picture of the cleaned surface (event EV32) or after re-reading the identifier written in the RFID chip 10, or by the technician pressing a key on the terminal 3.
Fig. 5 shows a modification of the method for securing the penetrant inspection method. In this embodiment, further, the photographs of the weld S are continuously taken, which can ensure smooth progress of the operation scheme.
Preparation phase
This optional preparation phase is identical to the preparation phase described hereinbefore with reference to fig. 4.
Execution of steps of penetrant inspection method
Step E70: the technician uses the terminal 3 to read the identifier written into the RFID chip 10. This reading instruction preferably appears on the graphical interface 33 after opening the file (event E6).
Step E80: the RFID chip 10 sends the unique identifier back to the terminal 3.
Event EV 90: the technician takes a picture of the surface of the weld S before cleaning. This photograph taking instruction preferably appears on the graphical interface 33 after the reading of the identifier in steps E70 and E80. This reading causes the time window to open automatically, during which the technician should take a picture of at least one weld S. The graphical interface 33 automatically displays a countdown, for example between 4 seconds and 30 seconds, during which the camera 35 must be activated for taking a picture. The photograph is taken so that the identifier "C231 a 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3.
Event EV 100: the terminal 3 automatically displays on the graphical interface 33 an instruction to clean the surface of the weld S, for example after the photograph was taken (event EV 90). The technician cleans the surface with a cleaning product to remove contaminants that may block the discontinuities. If the technician did not take a picture of the weld S surface before cleaning (event EV90), cleaning should not be performed. In other words, a photograph of the original surface of the weld S is taken, which is necessary for cleaning (this is a trigger condition). Without this photograph taking, the terminal 3 will not display an instruction to clean the weld S and the file or report will indicate that the operating protocol was not followed.
Event EV 110: the technician takes a picture of the surface of the cleaned weld S with the penetrant product applied thereon. The photograph is taken so that the identifier "C231 a 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3. This photograph taking instruction preferably appears on the graphical interface 33, for example simultaneously with an instruction to clean the surface of the weld S (event EV 100).
Event EV 120: the technician applies a colored penetrant product to the cleaned surface of the weld S. The instruction appears on the graphical interface 33. Preferably, if the technician did not photograph the cleaned weld S surface beforehand (event EV110), no penetrant product should be applied. In other words, it is necessary to take a picture of the surface of the weld S after cleaning (this is the trigger condition) for applying the penetrant product. Without this photograph taking, the terminal 3 would not display instructions to apply the osmotic agent product and the file or report would indicate that the protocol was not followed.
Event EV 130: the technician takes a first picture of the cleaned surface of the weld S with the penetrant product applied thereto. The first photograph taking instruction preferably appears on the graphical interface 33, for example simultaneously with the instruction to apply the osmotic agent product (event EV 120). The first photograph is taken so that the identifier "C231 a 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3.
Event EV 140: the technician takes a second picture of the cleaned weld S surface with the penetrant product applied thereto. This second photograph is taken after a specified time interval after the first photograph was taken (event EV 130). The taking of the first picture triggers a countdown of, for example, 5 to 20 minutes during which the camera 35 is locked so that the technician cannot take the second picture. At the end of the countdown, the graphical interface 33 automatically displays a new countdown during which the camera 35 must be activated to take a second picture. This second photograph is taken so that the identifier "C231A 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3.
Event EV 150: the technician cleans the surface of the weld S to remove penetrants that have not effectively penetrated into the discontinuity. This instruction appears on the graphical interface 33 after the second photograph is taken (event EV 140). This photo taking may be considered necessary to perform the cleaning phase. Without this second photograph, the terminal 3 would not display an instruction to clean the surface of the weld S and the file or report would indicate that the operating protocol was not followed.
Event EV 160: the technician takes a picture of the cleaned surface of the weld S. This photograph taking instruction preferably appears on the graphical interface 33, for example simultaneously with an instruction to clean the surface of the weld S (event EV 150). The photograph is taken so that the identifier "C231 a 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3.
Event EV 170: the technician applies the developer product to the cleaned surface of the weld S. The instruction appears on the graphical interface 33. Preferably, if the technician did not photograph the cleaned surface of the weld S beforehand (event EV160), the developer product must not be applied. In other words, it is necessary to take a picture of the surface of the weld bead S after cleaning (this is a trigger condition) for applying the developer product. Without this photograph taking, the terminal 3 will not display an instruction to apply the developer product and the file or report will indicate that the operating scheme was not followed.
Event EV 180: the technician takes a first picture of the surface of the weld S on which the developer product is applied. The instruction to take the first photograph preferably appears on the graphical interface 33, for example simultaneously with the instruction to apply the developer product (event EV 170). The first photograph is taken so that the identifier "C231 a 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3.
Event EV 190: the technician takes a second picture of the surface of the weld S on which the developer product is applied. This second photograph was taken after a specified time interval after the first photograph was taken (event EV 25). The taking of the first picture triggers a countdown of, for example, 20 minutes during which the camera 35 is locked so that the technician cannot take the second picture. At the end of the countdown, the graphical interface 33 automatically displays a new countdown during which the camera 35 must be activated to take a second picture. This second photograph is taken so that the identifier "C231A 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3.
Event EV 200: the technician cleans the surface of the weld S to remove the developer product as well as the penetrant product that has penetrated. This instruction appears on the graphical interface 33 after the second photograph is taken (event EV 190). This photo taking may be considered necessary to perform the cleaning phase. Without this second photograph, the terminal 3 would not display an instruction to clean the surface of the weld S and the file or report would indicate that the operating protocol was not followed.
Event EV 210: the technician takes a picture of the cleaned surface of the weld S. This photograph taking instruction preferably appears on the graphical interface 33, for example simultaneously with an instruction to clean the surface of the weld S (event EV 200). The photograph is taken so that the identifier "C231 a 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3.
Step E220: the terminal 3 sends a file or report to the server 4 in which the progress of each step of the penetrant inspection process is recorded, with different pictures taken. This transmission is triggered either automatically after taking a picture of the cleaned surface (event EV210) or after re-reading the identifier written in the RFID chip 10, or by the technician pressing a key on the terminal 3.
The respective steps of the method for securing the magnetic particle inspection will be described with reference to fig. 6. In this embodiment, further the unique identifier contained in the carrier 1 is read continuously, which may ensure a smooth progress of the operating scheme.
Preparation phase
This optional preparation phase is identical to the preparation phase described hereinbefore with reference to fig. 4.
Execution of each step of magnetic powder inspection method
The file opened on the graphical interface 33 of the terminal 3 indicates to the technician mainly the instructions to follow to carry out each step and can report the progress of the steps of the detection method.
Event EV 700: the terminal 3 automatically displays an instruction to clean the surface of the weld S on the graphical interface 33. The technician cleans the surface with a cleaning product to remove contaminants.
Step E800: after the cleaning step (event EV700) is performed, the technician uses the terminal 3 to read the identifier written into the RFID chip 10. This reading instruction preferably appears on the graphical interface 33.
Step E900: the RFID chip 10 sends the unique identifier back to the terminal 3.
Event EV 1000: the technician takes a picture of the cleaned surface of the weld S. This photograph taking instruction preferably appears on the graphical interface 33. According to an advantageous feature of the invention, it is the reading of the identifier from the terminal 3 (steps E800 and E900) that causes the time window to open automatically, during which the technician should take a picture of at least one cleaned weld S. The graphical interface 33 automatically displays a countdown during which the camera 35 must be activated for taking a picture. The photograph is taken so that the identifier "C231 a 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3.
Event EV 1100: the technician applies a developer product, which contains colored or fluorescent metal particles, to the cleaned surface of the weld S. This instruction appears on the graphical interface 33. If the technician did not photograph the cleaned weld S surface beforehand (event EV1000), no penetrant product should be applied. In other words, it is necessary to take a picture of the surface of the weld bead S after cleaning (this is a trigger condition) for applying the developer product. Without this photograph taking, the terminal 3 will not display an instruction to apply the developer product and the file or report will indicate that the operating scheme was not followed. In a variant of implementation, the identifier written in the RFID chip 10 is re-read after the event EV1000, which is the trigger condition for the application of the developer product.
EV 1200: the technician magnetizes the weld S with a sufficiently strong magnetic field to produce a "stray field" that may provide a characteristic indication of a discontinuity. This instruction appears on the graphical interface 33. The event EV1100 is followed by a re-reading of the identifier written into the RFID chip 10, which can serve as a trigger condition for allowing the magnetization of the weld S.
Step E1300: after magnetizing the weld S (event EV1200), the technician uses the terminal 3 to read the identifier written into the RFID chip 10. This reading command appears on the graphical interface 33, for example simultaneously with the command to magnetize the weld S (event EV 1200).
Step E1400: the RFID chip 10 sends the unique identifier back to the terminal 3.
Event EV 1500: the technician takes a picture of at least one magnetized weld S with or without the presence of a "stray field" thereon. This photograph taking instruction preferably appears on the graphical interface 33. According to an advantageous feature of the invention, it is the reading of the identifier in steps E1300 and E1400 that causes the time window to open automatically, during which the technician should take a picture of the magnetized weld S. The graphical interface 33 automatically displays a new countdown during which the camera 35 must be activated for taking a picture. The photograph is taken so that the identifier "C231 a 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3. Multiple photographs can be taken so that the entire surface under inspection is photographed.
Step E1600: after taking the picture (event EV1500), the technician uses the terminal 3 to read the identifier written in the RFID chip 10. This reading instruction preferably appears on the graphical interface 33, for example after the photograph was taken (event EV 1500).
Step E1700: the RFID chip 10 sends the unique identifier back to the terminal 3.
Event EV 1800: the technician cleans the surface of the weld S to remove the developer product. This instruction appears on the graphical interface 33 after the reading of the identifier in steps E1600 and E1700. The reading of the identifier in steps E1600 and E1700 is necessary for performing the cleaning phase. Without this reading, the terminal 3 would not display an instruction to clean the surface of the weld S and would indicate in the file or report that the operating protocol was not followed.
Step E1900: after the cleaning step (event EV1800) has been performed, the technician uses the terminal 3 to read the identifier written into the RFID chip 10. This reading command preferably appears on the graphical interface 33, for example simultaneously with the command to clean the surface of the weld S (event EV 1800).
Step E2000: the RFID chip 10 sends the unique identifier back to the terminal 3.
Event EV 2100: the technician takes a picture of the cleaned surface of the weld S. This photograph taking instruction preferably appears on the graphical interface 33. According to an advantageous feature of the invention, it is the reading of the identifier in steps E1900 and E2000 that causes the time window to open automatically, during which the technician should take a picture of the cleaned weld seam S. The graphical interface 33 automatically displays a new countdown during which the camera 35 must be activated for taking a picture. The photograph is taken so that the identifier "C231 a 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3.
Step E2200: the terminal 3 sends a file or report to the server 4 in which the progress of each step of the penetrant inspection process is recorded, with different pictures taken. This transmission is triggered either automatically after taking a picture of the cleaned surface (event EV2100) or after re-reading the identifier written in the RFID chip 10, or by the technician pressing a key on the terminal 3.
Fig. 7 shows a modification of the method for securing the magnetic particle inspection method. In this embodiment, further, the photographs of the weld S are continuously taken, which can ensure smooth progress of the operation scheme.
Preparation phase
This optional preparation phase is identical to the preparation phase described hereinbefore with reference to fig. 4.
Execution of each step of magnetic powder inspection method
Step E700': the technician uses the terminal 3 to read the identifier written into the RFID chip 10. This reading instruction preferably appears on the graphical interface 33 after opening the file (event E6).
Step E800': the RFID chip 10 sends the unique identifier back to the terminal 3.
Event EV 900': the technician takes a picture of the surface of the weld S before cleaning. This photograph taking instruction preferably appears on the graphical interface 33 after the reading of the identifier in steps E700 'and E800'. This reading causes the time window to open automatically, during which the technician should take a picture of at least one weld S. The graphical interface 33 automatically displays a countdown during which the camera 35 must be activated for taking a picture. The photograph is taken so that the identifier "C231 a 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3.
Event EV 1000': the terminal 3 automatically displays on the graphical interface 33 an instruction to clean the surface of the weld S, for example after the photograph taking (event EV 900'). The technician cleans the surface with a cleaning product to remove contaminants. If the technician does not take a picture of the weld S surface before cleaning (event EV900'), cleaning must not be performed. In other words, a photograph of the original surface of the weld S is taken, which is necessary for cleaning (this is a trigger condition). Without this photograph taking, the terminal 3 will not display an instruction to clean the weld S and the file or report will indicate that the operating protocol was not followed.
Event EV 1100': the technician takes a picture of the cleaned surface of the weld S. The photograph is taken so that the identifier "C231 a 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3. This photograph taking instruction preferably appears on the graphical interface 33, for example simultaneously with an instruction to clean the surface of the weld S (event EV 1000').
Event EV 1200': the technician applies the developer product to the cleaned surface of the weld S. The instruction appears on the graphical interface 33. If the technician did not take a picture of the cleaned weld S surface in advance (event EV1100'), then the developer product must not be applied. In other words, it is necessary to take a picture of the surface of the weld bead S after cleaning (this is a trigger condition) for applying the developer product. Without this photograph taking, the terminal 3 will not display an instruction to apply the developer product and the file or report will indicate that the operating scheme was not followed.
Event EV 1300': the technician takes a picture of the surface of the weld S on which the developer product is applied. The command to take a picture preferably appears on the graphical interface 33, for example simultaneously with the command to apply the developer product (event EV 1200'). The photograph is taken so that the identifier "C231 a 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3.
Event EV 1400': the technician magnetizes the weld S with a sufficiently strong magnetic field to produce a "stray field" that may provide a characteristic indication of a discontinuity. This instruction appears on the graphical interface 33. Preferably, if the technician did not take a picture of the weld S in advance (event EV1300'), the weld must not be magnetized. In other words, it is necessary to take a photograph of the surface of the bead S on which the developer is applied to magnetize the bead S (this is a trigger condition). Without this photograph taking, the terminal 3 will not display an instruction to magnetize the weld S and the file or report will indicate that the operating protocol was not followed.
Event EV 1500': the technician takes at least one picture of the weld S after magnetization and with or without the presence of a "stray field" thereon. The command to take a photograph preferably appears on the graphical interface 33, for example simultaneously with the command to magnetize the weld S (event EV 1400'). The photograph is taken so that the identifier "C231 a 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3.
Event EV 1600': the technician cleans the surface of the weld S to remove the developer product. This instruction appears on the graphical interface 33 after the photograph was taken in the event of EV 1500'. This photo taking is necessary to perform the cleaning phase. Without this photograph taking, the terminal 3 will not display an instruction to clean the surface of the weld S, and the document or report will indicate that the operating protocol was not followed.
Event EV 1700': the technician takes a picture of the cleaned surface of the weld S. This photograph taking instruction preferably appears on the graphical interface 33, for example simultaneously with the instruction to clean the weld S (event EV 1600'). The photograph is taken so that the identifier "C231 a 226" is visible on the photograph. The photos are also time stamped and automatically inserted into the file or report opened from the terminal 3.
Step E1800': the terminal 3 sends a file or report to the server 4 in which the progress of each step of the penetrant inspection process is recorded, with different pictures taken. This transmission is triggered either automatically after taking a picture of the cleaned surface (event EV1700') or after re-reading the identifier written in the RFID chip 10, or by the technician pressing a key on the terminal 3.
In the above embodiments, the arrangement of the respective elements and/or devices and/or steps in the present invention should not be construed as being required in all the embodiments. In any event, it is to be understood that various modifications may be made to the components and/or devices and/or steps without departing from the spirit and scope of the invention. In particular:
the steps described with reference to fig. 4 and the steps described with reference to fig. 5 may be combined with each other. Likewise, the steps described with reference to fig. 6 and the steps described with reference to fig. 7 may also be combined with each other.
The various steps of the method can be carried out simultaneously. In practice, the operator may perform the steps of the method on a first weld while performing the steps of the method on another weld. For example, the operator may decide to clean all surfaces of the weld to be inspected, then take a picture of all those surfaces after cleaning, then apply a penetrating or developing product to each of those surfaces, and so on. Likewise, during a prescribed wait time between two steps (e.g., EV14 and EV15) performed on one weld, the operator may perform one or more other steps on the other weld.
The different photographs taken can be digitally signed automatically. This ensures that the photograph can be processed by the mobile reading terminal 3 and/or the software capable of implementing the method without the possibility of forgery.
Each container of the product used (detergent, penetrant, developer, etc.) advantageously has an identifier that can be read remotely by the terminal 3. The identifier is preferably an RFID chip (or bar code, etc.) to whose memory the product properties, expiry date, lot number, instructions for use, exposure time, etc. have been added. The identifier may be read before each use of the product. When the terminal 3 reads the identifier, it can automatically determine the associated exposure time. For example, at event EV11, the RFID chip reading the penetrant product may automatically count down at event EV15, during which the camera 35 is locked. Likewise, if at event EV11 the operator reads the developer product identification number, terminal 3 will indicate to him that this is not the correct product and that the penetrant product should be used. If the identifier of the osmotic agent product is not read, the terminal 3 will lock the program and the file or report will indicate that the protocol was not followed. The same applies if the product for which the identifier has been read exceeds the expiration date.
The procedure described in the preceding paragraph can be applied to all tools implementing the detection method. Thus, the luminaire for filming the surface lighting and/or the magnetizing device for generating the "stray field" may also have an identifier. Such identifier is preferably an RFID chip (or bar code, etc.), for example with added in its memory: tool model number, serial number, latest revision date, etc. Thus, at the end of the preparation phase, for example after event EV6, the operator may read the identifier of the tool, thereby causing the information contained therein to appear automatically in the file or report.

Claims (12)

1. A method for securing a penetrant or magnetic particle inspection method for a discontinuity of a substance in an object (S), comprising:
-the method comprises a step of identifying the object (S) by mounting a carrier (1) in the vicinity of the object, the carrier containing a unique identifier remotely readable by a mobile reading terminal (3),
-the mobile reading terminal (3) reading the unique identifier, necessary for implementing the detection method.
2. Method according to claim 1, wherein the mobile reading terminal (3) reads the unique identifier so that a time window is opened during which at least one photograph is taken of the object (S) after and/or before the step of performing the detection method.
3. The method of claim 2, comprising the steps of: -writing the unique identifier in a macroscopic manner onto the carrier (1), and-taking a picture of the object (S) such that the macroscopic unique identifier on the carrier (1) is visible in the picture.
4. Method according to any one of the preceding claims, wherein after performing the steps of the detection method it is necessary to take a picture of the object (S) in order to perform the next steps of the method.
5. Method according to any one of claims 2 to 4, wherein taking a photograph of the object (S) is done on the mobile reading terminal (3), said terminal comprising photograph taking means (35).
6. Method according to any one of claims 2 to 5, comprising the step of adding a time stamp to each photograph of said object (S).
7. Method according to any of claims 1 to 6, wherein after performing the steps of the probing method it is necessary to read a unique identifier from the mobile reading terminal (3) in order to perform the next steps of the method.
8. The method according to any one of claims 1 to 7, comprising the steps of: before the first step of the probing method is executed, the unique identifier is read from the mobile reading terminal (3), and a file is opened on a graphical interface (33) of the terminal through the previous reading to report the progress of the probing method.
9. The method of claim 8, comprising the steps of:
-associating, in a computer memory (41) or a computer database, a unique identifier with supplementary information on the object (S),
-accessing said computer memory or computer database (41) after having read a unique identifier from said mobile reading terminal (3) beforehand,
-generating a pre-filled report in which supplementary information contained in said computer memory or computer database (41) is recorded and which supplementary information is associated with the unique identifier that has been read,
-opening a file on the graphical interface (33) of the mobile reading terminal (3), the file being in the form of a pre-filled report.
10. The method according to any one of the preceding claims, wherein the detection method may be a penetrant inspection method, comprising a step of cleaning the surface of the object (S) and a step of applying a colored penetrant product to the cleaned surface, the method comprising the steps of:
-taking a picture of the surface of the object (S) after cleaning,
-applying a penetrant product onto the surface of the cleaned object (S),
-taking a first photograph of the cleaned surface of the object (S) with the penetrant product applied thereon,
-taking a second photograph of the cleaned surface of the object (S) with the penetrant product applied thereon, said second photograph being taken after a specified time interval after the first photograph was taken.
11. The method according to any one of the preceding claims, wherein said detection method may be a penetrant inspection method, comprising a step of applying a developer to the surface of said object (S), said method comprising the steps of:
-taking a first photograph of the surface of said object (S) on which said developer product is applied,
-taking a second picture of the surface of said object (S) on which the developer product is applied, said second picture being taken after a specified time interval after the first picture has been taken.
12. The method according to any of the preceding claims, comprising: a carrier (1) in the form of a label, a sleeve or a plate is used and the unique identifier is written into an RFID chip (10), a bar code or in the form of a set of coded or encrypted characters suitable for reading by an optical character recognition device.
CN201980034499.9A 2018-05-23 2019-05-23 Safety method for penetrant or magnetic powder inspection Pending CN112154321A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FR1854319A FR3081553B1 (en) 2018-05-23 2018-05-23 PROCESS FOR SECURING A DETECTION METHOD BY WIPING OR MAGNETOSCOPY
FR1854319 2018-05-23
PCT/FR2019/051187 WO2019224490A1 (en) 2018-05-23 2019-05-23 Method for securing a detection method by dye penetration or magnetoscopy

Publications (1)

Publication Number Publication Date
CN112154321A true CN112154321A (en) 2020-12-29

Family

ID=65685410

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201980034499.9A Pending CN112154321A (en) 2018-05-23 2019-05-23 Safety method for penetrant or magnetic powder inspection

Country Status (4)

Country Link
EP (1) EP3797284A1 (en)
CN (1) CN112154321A (en)
FR (1) FR3081553B1 (en)
WO (1) WO2019224490A1 (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007205941A (en) * 2006-02-02 2007-08-16 Hitachi Ltd Image inspection method, image inspection program, and image inspection device
CN101533489A (en) * 2008-03-11 2009-09-16 株式会社日立制作所 System and method for factory work logging
US20110173127A1 (en) * 2010-01-08 2011-07-14 Albert Ho System and method used for configuration of an inspection compliance tool with machine readable tags and their associations to inspected components
WO2015119450A1 (en) * 2014-02-06 2015-08-13 조병모 Mobile total quality control management system for minimizing process delay and test and inspection failures and improving reliability, and method therefor
CN105182935A (en) * 2015-08-29 2015-12-23 中山市万进智能科技有限公司 Product production control system and control method
CN106133506A (en) * 2014-02-21 2016-11-16 拜维斯公司 Use the flow process of x-ray detection weld seam
CN106164666A (en) * 2014-03-24 2016-11-23 新东工业株式会社 Surface characteristic inspection method and surface characteristic check device
US20170066020A1 (en) * 2014-02-27 2017-03-09 Walter Surface Technologies Inc. Industrial cleanliness measurement methodology
CN206300902U (en) * 2016-12-22 2017-07-04 洁誉科技(上海)股份有限公司 A kind of automobile component processing detection traceability system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007205941A (en) * 2006-02-02 2007-08-16 Hitachi Ltd Image inspection method, image inspection program, and image inspection device
CN101533489A (en) * 2008-03-11 2009-09-16 株式会社日立制作所 System and method for factory work logging
US20110173127A1 (en) * 2010-01-08 2011-07-14 Albert Ho System and method used for configuration of an inspection compliance tool with machine readable tags and their associations to inspected components
WO2015119450A1 (en) * 2014-02-06 2015-08-13 조병모 Mobile total quality control management system for minimizing process delay and test and inspection failures and improving reliability, and method therefor
CN106133506A (en) * 2014-02-21 2016-11-16 拜维斯公司 Use the flow process of x-ray detection weld seam
US20170066020A1 (en) * 2014-02-27 2017-03-09 Walter Surface Technologies Inc. Industrial cleanliness measurement methodology
CN106164666A (en) * 2014-03-24 2016-11-23 新东工业株式会社 Surface characteristic inspection method and surface characteristic check device
CN105182935A (en) * 2015-08-29 2015-12-23 中山市万进智能科技有限公司 Product production control system and control method
CN206300902U (en) * 2016-12-22 2017-07-04 洁誉科技(上海)股份有限公司 A kind of automobile component processing detection traceability system

Also Published As

Publication number Publication date
FR3081553A1 (en) 2019-11-29
WO2019224490A1 (en) 2019-11-28
EP3797284A1 (en) 2021-03-31
FR3081553B1 (en) 2020-12-04

Similar Documents

Publication Publication Date Title
JP5557718B2 (en) Piping construction management system, portable terminal and construction information management server
WO2015054367A2 (en) Image capturing and automatic labeling system
CN110675171A (en) Anti-counterfeiting tracing method based on block chain
CN106133506B (en) Using the process of x-ray detection weld seam
CN102156891A (en) Information processing device, information processing system and program
US20100321722A1 (en) Document processing apparatus, document processing method, document processing system, and computer readable medium
JP6871511B2 (en) Information processing equipment, information processing system and its processing method and program
CN110717564A (en) Material evidence traceability management system
JP2006252364A (en) Inspection work management system
CN112154321A (en) Safety method for penetrant or magnetic powder inspection
JP2009070010A (en) Clothing information management system and clothing information management method
CN112288052B (en) Anti-counterfeiting identification method, device and system for concrete test block
JP2005327170A (en) Quality check system in construction site
RU2688298C2 (en) Delivery tracking system with a seal
CN209765564U (en) Electronic identification system for sampling sample identification
CN106775960B (en) Unique marking method and system for Windows process
JP2008020676A (en) Laser marking method
CN113361671A (en) Anti-fake method for building material
CN112834531A (en) Method and system for accurately matching articles and scanned images in security inspection industry
CN106355519A (en) Method of sampling, detection and supervision of samples based on supervision code
US11783347B2 (en) Tamper-preventing system and related method for sharing, collecting and processing data
JP2006201849A (en) System and method for guaranteeing authenticity of process data, process recording device, and program
CN109978100A (en) A kind of test sample authentication method and Verification System based on image recognition
FR3029670A1 (en) METHOD AND SYSTEM FOR TRACKING AND IDENTIFYING AN OBJECT ALONG A PROCESSING CHAIN
Antony et al. Material Management on Construction Site Using ICT Strategy

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20201229

WD01 Invention patent application deemed withdrawn after publication