EP0859998A1 - Systeme et reseau electronique de commande - Google Patents

Systeme et reseau electronique de commande

Info

Publication number
EP0859998A1
EP0859998A1 EP95940619A EP95940619A EP0859998A1 EP 0859998 A1 EP0859998 A1 EP 0859998A1 EP 95940619 A EP95940619 A EP 95940619A EP 95940619 A EP95940619 A EP 95940619A EP 0859998 A1 EP0859998 A1 EP 0859998A1
Authority
EP
European Patent Office
Prior art keywords
tag
node
fpn
nodes
location
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP95940619A
Other languages
German (de)
English (en)
Other versions
EP0859998A4 (fr
Inventor
N. Bert Loosmore
Kenneth Ehrman
Bruce Jagid
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ID Systems Inc
Original Assignee
ID Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ID Systems Inc filed Critical ID Systems Inc
Publication of EP0859998A1 publication Critical patent/EP0859998A1/fr
Publication of EP0859998A4 publication Critical patent/EP0859998A4/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2451Specific applications combined with EAS
    • G08B13/2462Asset location systems combined with EAS
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1436Mechanical actuation by lifting or attempted removal of hand-portable articles with motion detection
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2465Aspects related to the EAS system, e.g. system components other than tags
    • G08B13/2468Antenna in system and the related signal processing
    • G08B13/2471Antenna signal processing by receiver or emitter
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B3/00Audible signalling systems; Audible personal calling systems
    • G08B3/10Audible signalling systems; Audible personal calling systems using electric transmission; using electromagnetic transmission
    • G08B3/1008Personal calling arrangements or devices, i.e. paging systems
    • G08B3/1016Personal calling arrangements or devices, i.e. paging systems using wireless transmission
    • G08B3/1083Pager locating systems

Definitions

  • This invention relates to systems for object or person identification and location, particularly systems used for employee and material tracking purposes.
  • Figure 1 is a block diagram illustrating the node tag components
  • Figure 2 is a block diagram illustrating the Fixed Position Node member components
  • Figure 3 is a schematic of the placement of tag and Fixed Position Node' s (FPN' s) for monitoring of objects or people and for identification, location, and other condition evaluation of such information.
  • FPN' s Fixed Position Node' s
  • the present invention comprises a method for location and identification of objects and people, the monitoring thereof, and of system relevant parameters under situation conditions, and a method for controlling these situations.
  • the present invention further comprises a stand-alone, parameter monitoring and evaluation system and a location and identification control system comprising two or more active operation nodes, with at least one programmable, movable identification and processing tag node or at least one programmable fixed position node (FPN).
  • FPN's are in known fixed positions and the tag nodes are movable, relative thereto.
  • the relation between the fixed and movable nodes i.e., the movable tag node relative in proximity to one or more fixed nodes
  • All nodes are initially provided with identification coding indicating where each node will be installed and who or what it is monitoring.
  • the movable tag node is also programmed, where applicable, to monitor, store, change, and/or process environmental conditions in its varying locations.
  • the nodes each comprise means for direct inter-node communication and means for decision making capability, without a central processor.
  • the tag nodes further comprise means for responsive communication to other tag nodes or an FPN via wireless communications.
  • the individual nodes include an integral power source, such as a long term battery for the movable nodes and a hard wired power source for the fixed nodes.
  • the nodes further comprise microprocessor and memory elements which are pre-programmed, where appropriate to the application, to recognize external environmental conditions and inquiries and to logically act on the basis of recognized condition parameters (received via i/o means) , and means to communicate with other nodes for total or partial network action, e.g. via transceiver means.
  • the distance of the communication, via wireless transceiver is determined by the microprocessor means and is related to the message being transmitted.
  • the external environmental conditions information is attained via wireless inquiry through communication interaction from other nodes as well as from attached i/o means.
  • Each tag node and FPN is identified with a unique ID number by which it is uniquely addressed and identified.
  • Each node comprises an integrated circuit, operatively controlled thereby, preferably having at least three independent microprocessors which share a common memory and control circuitry but with separate sets of registers:
  • a first microprocessor or communication CPU provides media access control and includes linkage to transceiver means for receiving and transmitting information between the nodes (such as between the tag and an FPN, inter-tag, or FPN to FPN) .
  • a second microprocessor is the application CPU which runs code written for the node's particular use. This second microprocessor is provided with direct linkage to i/o means for initial processing based on environmental conditions, as preprogrammed, and for human interaction for information entry and receipt. Examples of input means include keypad, condition sensors such as a temperature gauge, etc. Examples of output means include LCD display, sound alarms, and the like.
  • the third microprocessor a network CPU, links the applications CPU with the communication CPU, and handles network variable processing, addressing, transaction processing, authentication, network management and the like.
  • the microprocessors provide components of an independently operable network in a defined area of operation capable of location identification, monitoring and logical control of preprogrammed environmental conditions and logical interaction with external inquiries for transactional operations.
  • Specific applications include employee location within a work site.
  • Other applications include locating doctors and equipment within a hospital, patient monitoring, product and inventory location and production monitoring within a warehouse or factory, automated time and motion studies, cargo transport monitoring and the like, and includes security applications in university settings and in monitoring unauthorized entry in secure locations and monitoring temperature conditions of perishable inventories.
  • the individual nodes provide intelligent processing function. For example, in employee or personnel location applications, with security control, the tag nodes are programmed with security level parameters to enable the system to determine the proper location for the tags and the wearers thereof. Additionally, the tag nodes retain location information and process profiles of employee work habits and time spent at work or with specific work functions. The tags may be programmed to recognize normal usage patterns and to signal an alarm if such patterns are deviated from.
  • the present invention further comprises specific utilization of the network system for application in hospital, factory and warehouse environments, a university setting, as well as in cargo transport monitoring.
  • the system is configured to fit the needs of a particular monitoring or identification application with the use of appropriate firmware to run on the second microprocessor (application CPU) and input/output devices attached to the microprocessor and appropriate network configuration to run on the third microprocessor (network CPU) .
  • application CPU application CPU
  • network CPU third microprocessor
  • the communication and interconnection (wireless or otherwise) between more than one FPN and/or tag node creates a network.
  • Three microprocessors, combined into one integrated circuit, as described above, are available and specifically include the Neuron® 3150 integrated circuit, manufactured by
  • the first microprocessor (communication CPU, as described above) handles the media access algorithm (predictive p-persistent CSMA) .
  • the second microprocessor handles the application code.
  • the final microprocessor handles network variable processing and network management.
  • each integrated circuit contains a unique 48 bit ID, stored in read-only memory, which facilitates network addressing and identification.
  • a tag node receives a message from an
  • FPN FPN or other tag node which contains the ID number of the node, and therefore returns an intelligently directed response only to the sending node.
  • Messages between different tag nodes and FPN' s may be effected by using Acknowledged service, Request/Response, Unacknowledged, or other. Most applications use Acknowledged service which allows the sending node to know that its message was received. Additionally, certain messages, such as those alerting security of an intrusion or break-in may be given priority which, under the above protocol, grants them first access to the network as it becomes available. It is preferred that total memory (RAM, ROM, EEPROM, etc.) be at least 64K in order to allow sufficient application code and data storage.
  • each node contains a power source (for tag nodes it is preferable that the power source be mobile, such as a battery or solar cell), memory, a transceiver (transmitter- receiver) and certain input/output (I/O) devices.
  • the transceiver provides a communications link between the node and the rest of the network.
  • Tags communicate with FPN' s or other tags by using a wireless transceiver in order to provide non-contact communications. This allows objects and people to become part of the network without intervention, by only being within a "capture zone", a range suitable for communication.
  • the "capture zone” distance is varied based on the power output of the transceiver and antenna placement or type.
  • the "capture zone” defines the identity of the FPN for relative location of the tag node.
  • Suitable wireless transceivers are available from Motorola (R-net) , Utilicom, and Telxon.
  • FPN's are interconnected using a twisted pair wiring scheme, a powerline, wireless, link power solution, or the like.
  • I/O devices provide a human interface to the tag or FPN' s, such as a keypad and display, or may provide connections to other sensors and actuators the tag or FPN is adapted to monitor.
  • the applications CPU decides (based on timers, i/o inputs, etc.) that it needs to send a message out over the network to communicate certain information to other nodes, as a "network variable", which the application processor updates.
  • the variable is transferred by the network CPU to a network buffer.
  • the network CPU modifies the memory to include other information such as address (to and from) , and any special handling information such as authentication. Addresses of the nodes of the system, to which the specific messages are being sent, are stored in memory such as at installation time.
  • the communication CPU monitors network communications until the communication channel is clear, at which time it transmits the message out over the network through the transceiver and via media such as twisted pair wires, radio frequency, etc.
  • the algorithm used to determine when a message is being sent is predictive p-persistent CSMA.
  • the message travels along the network until it is attenuated by the media to the point that is unrecognizable as a valid message. Only those nodes that are within the defined reachable network area (i.e. based on the characteristics of the transceiver) will receive a valid message.
  • the message is received via its transceiver, where the message is transmitted to the communication CPU.
  • the communication CPU makes sure that the received message contains a valid format. If so, it is stored in its network buffer.
  • the network CPU knowing that a message has been received, decodes the message to check whether the message was intended for that node. If not, it is discarded. If it was, additional checking or processing is performed, if necessary, e.g. authentication and acknowledgment.
  • the new value of the network variable is extracted and passed via the application buffer back to the application program of the application CPU. The program then uses the new value in accordance with parameters of the specific application.
  • a range of operation or capture zone wherein a tag in such zone can communicate with other nodes.
  • the range varies with the particular application, as well as the type of message being sent. For example, in an employee monitoring application, a capture zone for an FPN that is monitoring employee security levels is limited to an entrance or a single room. Additionally, if the FPN is looking for employees that wish to enter the door, it sends out a seek-tag message to reach the only entranceway of the door. If the FPN is attempting to determine the names of all employees in the room, the message would be sent out a distance that covers the entire room.
  • capture zones of various tags or FPN's may be slightly overlapped to insure complete areal coverage by at least one node. Receipt of location feedback from two or more FPN's, automatically more narrowly locates the tag, in the overlapping area between the respective capture zones.
  • a human interface node it may be desired to connect a human interface node to the network.
  • a Personal Computer or the like may be attached to the network to view and change information on the network which it is authorized to access and with which it is capable of achieving network communications.
  • Example 1 Security and Timecard application
  • Employees carry or wear tags which are programmed in memory with information which includes employee identification means, specifically the employee's name, and employee ID number.
  • employee identification means specifically the employee's name, and employee ID number.
  • individual tags provide employee time tracking means by keeping track of employee's time in, time out and the amount of time at the employment site, i.e., total time worked (presumably). This function also serves to provide a means for locating specific employees.
  • tags contain the employee's security level, an electronically stored version of the employee's thumbprint, a security PIN number, etc. Security clearance, as used in this context, either specifically details or determines which doors (and therefore areas) the employee can enter, at which times and dates.
  • FPN's are placed throughout the work place, with preferably at least one per room or area to be monitored, as well as along hallways, and at entry and exit locations, included gated employee parking lots. Nodes at the entry and exit locations constantly send out "seek-tag" messages. Tags receive this message and respond with their security level, in order to determine whether the employee is authorized to enter. When validated, which is achieved either by correct security levels on the tag or by the use of a PIN, the FPN output means causes the door to open for entry. However, should a group of employees enter at a single time with a single validation to open the door, all tags are still verified. A security alert is generated if any of the tags indicates that the employee is not authorized for entry. Actual monitoring of tag use can be checked by employees, where employees must ensure that no one enters a door without a tag or by coupling the FPN to a motion sensor input device to sense an entry without a corresponding tag message.
  • the tag As the tag (and therefore employee) is granted access to enter the building, the tag receives and stores messages from the FPN and in turn stores entry time and location in its memory. As the employee leaves the premises, an FPN located above the exit doorway, which also constantly sends out "seek-tag" messages, contacts the exiting tag with exiting time and date information. The tag calculates the total time worked (i.e., defined as total time within the workplace) and then passes the calculated value to the FPN. This information is stored and then used for payroll or other employee evaluation purposes.
  • Tags can be programmed to have different security levels based on time of day or based on usage. For high security applications, the tags have employee photographs laminated to the case for visual inspection.
  • unique biometric information such as an image of the employee's thumbprint, is stored within the tag's memory.
  • the employee uses a thumbprint reader to scan his or her thumb. The image is processed and compared to the stored image on the tag. A match causes the entry door to open. If not, security is alerted.
  • other biometric information can be stored on the tag, such as retinal scan, etc.
  • the tag is loaded with personal data of the employee, and randomly presented questions regarding such data are put to the employee and answers are entered via a local keyboard. A correct answer permits entry.
  • tags are initially programmed with termination dates. On a monthly basis, tags consult a validation node, a node which stores current security validation levels, to compare current employees and their clearances. Tags of terminated employees are deactivated. Subcontractors and visitors are provided with tags with short term validity of appropriate clearance. When modifications are made to a tag's security level, which can be upgraded or downgraded as appropriate, a message is sent out to all FPN' s to locate the tag. Should the tag not be present in the premises for validation or different revalidation, the new parameters are stored in memory of each entry FPN for a month or until the tag is brought within appropriate range and is modified or deactivated. These changes are then updated in the validation node.
  • tags are automatically deactivated and can then be reactivated by the security office and the changes made at that time. Because of the communication link between the tags, the FPN's, and the validation node, changes to tags are made automatically without the necessity for collection and return of tags.
  • the wireless transceiver allows employees not to remove ID badges from their person so that there is no need for swiping of cards with recordation of entry and exit times. Multiple swipes by groups of authorized employees are therefore also not required, (i.e., if multiple employees enter a doorway simultaneously, they are not ALL required to individually actively validate their badges). With recordation of movement of each employee, an employee's location is known at all times for monitoring and two-way paging.
  • each tag is encoded with a unique identification marker, such as employee name or employee ID number, the tag can be utilized to locate an employee or a group of employees within the work area (or a doctor within a hospital, etc.).
  • An FPN is accessed through its i/o port with entered employee identification (name or ID number) and generates a locate message.
  • the locate message is transmitted to all of the FPN' s which then makes inquiry of all of the tags in the capture zone of the relevant areas.
  • the located tag acknowledges receipt of the message with an indication of location to the sending FPN.
  • An audible tone on the employee tag alerts the wearer regarding the paging and/or a message on an LCD view screen displays a personalized message.
  • the proximate FPN creates a new message indicating that the tag in question is within its capture zone, and transmits it back to the initial FPN, advising the inquirer where the employee or other personnel are located. Responses can be similarly sent to the original pager or to any other relevant person.
  • a human interface(HI) node is able to poll any node on the network that is reachable from the human interface node, and retrieve any information stored in that node's memory.
  • An example of this capability is the following: software running on such an HI node allows managers to view their employee's locations. It additionally allows a manager to compile statistics of their employees' work habits.
  • a validation node an example HI node, contains all security clearances and a manager or other security personnel can view and change this node at any time from such an HI node. A manager therefore, by accessing the network, has a list or his/her employees and their clearances.
  • accounting software is contained on an accounting HI node which receives information from the tag nodes to keep track of time worked (based on entry and exit times), which may be accumulated on a weekly/monthly basis. This information is then used for payroll purposes.
  • Tag nodes are worn by doctors, patients and other hospital personnel and may also be attached to crucial movable equipment for various functions related to monitoring, identification and location.
  • the system provides security functions allowing only authorized personnel in restricted area and also limits the use and movement of tagged equipment.
  • most patients are in a fixed position (a hospital bed or surrounding environments) , patients with a tendency to wander can be monitored.
  • doctors and patient location By consistently monitoring doctor and patient location, incoming telephone calls can be directed to the phone nearest the doctor or patient and can also thereby function as a two way paging system.
  • the tags are provided with information inputting keypads to permit information to be remotely transferred to other tags, including the people or equipment to which they are attached, including a specific doctor's patient.
  • While the system can be utilized as a time card system, two-way paging device, and employee tracking means, it can also be used as a production control and cost accounting tool, with the tags worn by the employees automatically keeping track of their entry and exit times and tracking their use on specific machinery or on certain jobs, i.e. productivity. Tags on inventory and work orders throughout the production facility monitor usage, inform planners of quantities and locations, and monitor jobs throughout the production process.
  • the employee tag is used for measurement of employee's use of machinery for output and time to evaluate employee performance and track labor costs (i.e. which employee worked on which workorder for what amount of time).
  • the tags communicate with FPN' s attached to the output of the machinery.
  • the machinery which identifies the employee using it, is automatically customized to the user's needs, such as for accommodation of handicapped personnel, or customization for a particular work order' s needs.
  • Tags of specialized dimensions with imbedded keypads are attached to work orders and routed to appropriate work stations to monitor stages of the production processes via i/o means, yield data is entered onto the tag, for comparison to formulas perfected by industrial engineers to optimize internal and external quality, which are stored on the tag. This data can be used to determine the routing of a work order. Failure rates or large deviations indicate a process which is out of control and a supervisor is immediately notified by the tag via the previously described communication link or by direct inquiry of the tag.
  • the tag is also useful in monitoring inventory location, quantity, age and environmental conditions. Location of inventory is accomplished by methods similar to those previously described with respect to employee location.
  • the tags are initially loaded with product, source, or other identification information and a summation of all the tag identifications serves to identify particular items, and also provides information regarding inventory quantity.
  • the tags are initially encoded with a date which is later utilized in determining age of the particular item of inventory, thereby facilitating use of the FIFO method.
  • Appropriate gauges attached to the tag i/o means provide proximate environmental conditions, such as the temperature at which the products are being stored or to which they have been subjected during storage.
  • the data is entered directly on the appropriate tag with the parts. With pre-determined parameters, when inventories fall below set levels, the system alerts the tag of a purchasing agent, to replenish stock of the identified item.
  • Example 4 Cargo transport monitoring
  • tags are attached to trains, trucks or containers with stored information regarding cargo type, origin, time from destination, current location, etc. , thereby creating an electronic bill of lading.
  • the tags then communicate location and status at set intervals or with proximity location to roadside or trackside fixed location nodes.
  • the tags can also be programmed to provide real-time fuel consumption information, refrigerator car monitoring and the like.
  • Registration information is stored on tags for trucks for communication with weigh-in-motion sensors to store weight, etc.
  • Highway, bridge and tunnel authorities with FPN' s can read the relevant information from the trucks without the necessity for stopping the trucks.
  • the tags input lines on trucks or other vehicles can be linked to speedometers, odometers, brakes, or fuel gauges, etc., to monitor driver and vehicle performance.
  • FPN' s are distributed throughout the facility to receive alerts from persons wearing tags.
  • the FPN' s in the area receive the alert signal from the tag and triangulate the area to determine the specific location. The triangulation is accomplished by the FPN which receives the distress signal communicating with those around it to determine which ones have received the message.
  • the signal is transmitted to a HI node at the closest security center.
  • a return confirmation signal such as an audible tone on the tag confirms that help is on the way.
  • An additional function that is attained by using the same FPN grid is a "guard- tour" function to ensure that guards reach their sentry points at the scheduled times.
  • Tags Other uses for the tag include storage of student or employee ID number and university account information. This account information can be used for on-campus purchases, and library transactions, etc. Students can use the tag to monitor and track their spending habits and keep a budget. Unauthorized access will be eliminated by using the authentication algorithms.
  • the triangulation function described above can be readily utilized with other applications to specifically locate items or people as required by location input from two or more FPN's.
  • the FPN's with variable communication ranges (based on power output) to permit extension of range to more effectively use the triangulation location, where only one FPN is within the "capture zone”.
  • FIG. 1 there is shown a block diagram of the basic hardware components associated with the tag 1, the control device located on an object, in accordance with the present invention.
  • the tag 1 includes an integrated circuit 2 with its three (3) microprocessors 3, 4, and 5, and their associated firmware 6. Included in the firmware 6 is the general communications protocol and the specific application code and specific network configuration for the particular application.
  • the firmware 6 is stored in both on-chip memory 7 and off-chip memory 8.
  • the integrated circuit 2 is also coupled to the wireless transceiver 9.
  • the wireless transceiver takes a digital signal from the microprocessor and converts it into an electromagnetic signal which is then transmitted via the antenna 10. Additionally, the antenna 10 receives electromagnetic signals which it passes to the wireless transceiver 9, which then converts these electromagnetic signals to digital signals which are then passed to the integrated circuit 2.
  • Each tag 1 is powered by a long life battery 12.
  • the integrated circuit 2 will have various input/output (I/O) devices 11 associated with it. These may include sensors and actuators, such as a keypad or display.
  • FIG. 2 depicts a block diagram of the basic hardware components associated with the FPN 20.
  • the node 20, as defined in the present invention, has two main components: the monitor node 22 and the router hardware 21.
  • the power supply 32 means provides power to both parts of the system.
  • the remainder of the monitor node 22 is identical to the tag node 2 above except that communications occur through a twisted pair transceiver 30 and the firmware 27 is changed to be specific to the particular application. Its specific firmware 27 is stored in on-chip memory 28 and off-chip memory 29.
  • Associated with the integrated circuit may be certain I/O devices 31.
  • the router hardware 21 translates messages between different media types, in this case between the wireless transceiver of the tag and the twisted pair transceiver 30 of the monitor node 22.
  • Messages leaving the monitor node 22 travel along the network 37 and are received by the twisted pair transceiver 36.
  • This transceiver converts the signal on the network 37 to a digital signal understandable by the router hardware 35.
  • This signal is then modified into a form recognizable by the wireless transceiver 34 and is then propagated to the airwaves via the antenna 33.
  • messages received from the tag are eventually placed upon the network 37 after being translated through the router 21.
  • an entranceway is fitted with FPN' s 101 having a specified range of inquiry, which may overlap with the range of other nodes in the system.
  • an employee passing through the entranceway, and wearing tag node 201 causes an interrogation conversation between the FPN and the tag regarding security level clearance and employee identity.
  • a lock for door 110 is actuated by the node 101 and opens to admit the employee to the specific area and a record is entered on the tag of the time and date of entry.
  • nodes 101 converse with the tag node 201, note the time of exit, and calculate the total time of presence at the work site from entrance data previously written on the tag.
  • the total time is then transmitted, via the FPN, to an accounting node for determination of pay.
  • Location of an employee within the work site is accomplished by linked FPN' s conversing regarding the tags within their ambit of inquiry until the tag in question is located.
  • the location of the tag (and the employee) is transmitted via the network of inquiry tags to the requester.

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Electromagnetism (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Alarm Systems (AREA)
  • Paper (AREA)
  • Selective Calling Equipment (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Un système de réseau de n÷uds à position fixe programmables (20) et de n÷uds mobiles à étiquette (1) fournit une capacité de communication directe entre les n÷uds. Les différents n÷uds sont préprogrammés pour reconnaître les conditions environnantes extérieures et agir de manière logique sur la base de paramètres reconnus concernant les conditions, et pour communiquer avec d'autres n÷uds. Chaque n÷ud comprend un circuit intégré (2) pourvu de trois processeurs indépendants (3, 4, 5) qui se partagent une mémoire commune (7, 28) et des circuits de commande communs (6, 27) mais dont les ensembles de registres sont séparés. Un premier processeur (3) fournit la commande d'accès aux supports et la communication entre n÷uds, et il comprend des éléments (9, 36) émetteurs-récepteurs d'informations. Un deuxième processeur (5) met en ÷uvre un code écrit pour l'utilisation particulière dont il s'agit ainsi que le système d'exploitation d'ensemble, qui est pourvu d'une liaison directe avec un organe d'entrée-sortie (11, 31) pour le traitement initial ayant pour base les conditions environnantes. Le troisième processeur (4) relie le processeur d'applications (5) au processeur de communication (3) et il est chargé du traitement variable du réseau, de l'adressage, etc. Les n÷uds donnent un réseau d'ensemble qui est utilisable de manière indépendante.
EP95940619A 1995-11-06 1995-11-06 Systeme et reseau electronique de commande Withdrawn EP0859998A4 (fr)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US1995/014376 WO1997017683A1 (fr) 1995-11-06 1995-11-06 Systeme et reseau electronique de commande

Publications (2)

Publication Number Publication Date
EP0859998A1 true EP0859998A1 (fr) 1998-08-26
EP0859998A4 EP0859998A4 (fr) 1999-03-17

Family

ID=22250088

Family Applications (1)

Application Number Title Priority Date Filing Date
EP95940619A Withdrawn EP0859998A4 (fr) 1995-11-06 1995-11-06 Systeme et reseau electronique de commande

Country Status (4)

Country Link
EP (1) EP0859998A4 (fr)
KR (1) KR100442450B1 (fr)
AU (1) AU718948B2 (fr)
WO (1) WO1997017683A1 (fr)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7062446B1 (en) 1999-11-16 2006-06-13 Dana Corporation Apparatus and method for tracking and managing physical assets
US6952680B1 (en) 1999-11-16 2005-10-04 Dana Corporation Apparatus and method for tracking and managing physical assets
US7395275B1 (en) 1999-11-16 2008-07-01 Dana Automotive Systems Group, Llc System and method for disposing of assets
AU739754C (en) * 2000-11-16 2003-08-28 Paul Manchin Method for identifying the network location of a computer connected to the internet
KR100728605B1 (ko) * 2006-02-18 2007-06-14 전북대학교산학협력단 수술환자 자동식별장치
EP2316180A4 (fr) 2008-08-11 2011-12-28 Assa Abloy Ab Communications par interface wiegand sécurisées
GB2486868B (en) * 2009-10-07 2018-01-24 Awarepoint Corp Wireless tracking system and method for backhaul of information
US10452877B2 (en) 2016-12-16 2019-10-22 Assa Abloy Ab Methods to combine and auto-configure wiegand and RS485
KR102084518B1 (ko) 2018-05-14 2020-03-04 (주)에프알텍 인체 감지 센서를 구비한 조명등을 이용한 사용자 위치 확인 장치 및 시스템

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4656463A (en) * 1983-04-21 1987-04-07 Intelli-Tech Corporation LIMIS systems, devices and methods
US4549264A (en) * 1983-10-04 1985-10-22 B.I. Incorporated Time and accounting system
US4688026A (en) * 1984-05-15 1987-08-18 Scribner James R Method of collecting and using data associated with tagged objects
US5151684A (en) * 1991-04-12 1992-09-29 Johnsen Edward L Electronic inventory label and security apparatus
US5218344A (en) * 1991-07-31 1993-06-08 Ricketts James G Method and system for monitoring personnel
US5426425A (en) * 1992-10-07 1995-06-20 Wescom, Inc. Intelligent locator system with multiple bits represented in each pulse
US5396215A (en) * 1992-10-28 1995-03-07 Hinkle; Terry A. Vehicle operation inhibitor control apparatus

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
No further relevant documents disclosed *
See also references of WO9717683A1 *

Also Published As

Publication number Publication date
WO1997017683A1 (fr) 1997-05-15
AU718948B2 (en) 2000-05-04
EP0859998A4 (fr) 1999-03-17
AU4230796A (en) 1997-05-29
KR100442450B1 (ko) 2004-11-08
KR19990067396A (ko) 1999-08-16

Similar Documents

Publication Publication Date Title
US5682142A (en) Electronic control system/network
US7026937B2 (en) Event driven information system
EP1719086B1 (fr) Procede et dispositif pour la detection et la poursuite d'objets dans une zone definie
US7178729B2 (en) Methods and devices for providing alerts for spoilage and hazardous combinations
US8417538B2 (en) System and method for performing object association based on interaction time using a location tracking system
US8441353B2 (en) Methods, systems and articles of manufacture for monitoring subjects within a facility
US7164354B1 (en) Child protection system
US20100176918A1 (en) Identification and tracking of information stored on radio frequency identification devices
WO2007109241A2 (fr) Systèmes et procédés de suivi d'étiquettes multiples
AU718948B2 (en) Electronic control system/network
AU691491B2 (en) Patient care and communication system
RU2158444C2 (ru) Электронная контролирующая система/сеть
CN1204536C (zh) 电子控制系统/网络
RU98110566A (ru) Электронная контролирующая система/сеть
JP2000501253A (ja) 電子制御システム/ネットワーク
KR19980041808A (ko) 상품등의 예약관리방법 및 그 예약관리장치
Mohammadian et al. Intelligent agent framework for secure patient-doctor profiling and profile matching
JPS6226575A (ja) トランスポンデイングカ−ドによる物品管理方法
Azevedo et al. DEPLOYMENT OF RADIO FREQUENCY IDENTIFICATION TECHNOLOGY IN HEALTHCARE ORGANIZATIONS
US20140210617A1 (en) System to facilitate well-being checks

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 19980605

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LI LU MC NL PT SE

A4 Supplementary search report drawn up and despatched

Effective date: 19990128

AK Designated contracting states

Kind code of ref document: A4

Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LI LU MC NL PT SE

RIN1 Information on inventor provided before grant (corrected)

Inventor name: JAGID, BRUCE

Inventor name: EHRMAN, KENNETH

Inventor name: LOOSMORE, N. BERT

17Q First examination report despatched

Effective date: 20030807

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20040720