EP2294537A1 - Dangerous goods repository checking system and method - Google Patents

Dangerous goods repository checking system and method

Info

Publication number
EP2294537A1
EP2294537A1 EP09737536A EP09737536A EP2294537A1 EP 2294537 A1 EP2294537 A1 EP 2294537A1 EP 09737536 A EP09737536 A EP 09737536A EP 09737536 A EP09737536 A EP 09737536A EP 2294537 A1 EP2294537 A1 EP 2294537A1
Authority
EP
European Patent Office
Prior art keywords
dangerous goods
repository
user
goods
container
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP09737536A
Other languages
German (de)
French (fr)
Other versions
EP2294537A4 (en
Inventor
John Moore
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Global Tracking Solutions Pty Ltd
Original Assignee
Global Tracking Solutions Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2008902091A external-priority patent/AU2008902091A0/en
Application filed by Global Tracking Solutions Pty Ltd filed Critical Global Tracking Solutions Pty Ltd
Publication of EP2294537A1 publication Critical patent/EP2294537A1/en
Publication of EP2294537A4 publication Critical patent/EP2294537A4/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders

Definitions

  • the present invention relates to a system and method for checking dangerous goods into and out of a dangerous goods repository.
  • Dangerous goods are often stored in a repository, such as a depot, typically at or near a location at which they are used. They may arrive from the manufacturer, be checked in and, when desired for use, checked out. Current systems are prone to error.
  • a mine site will often have a repository, referred to as a magazine, for storing explosives and other related dangerous goods. It is known for explosives to go missing and for tracking records to be inaccurate or incomplete, generally through mistakes but sometimes owing to inappropriate or criminal activities.
  • a dangerous goods repository checking system comprising: a user identifier device for identifying a user accessing a repository, arranged to output user data indicative of an identity of said user; a dangerous goods identifier device for identifying dangerous goods checked into or out of the repository, arranged to output goods data indicative of an identity of said dangerous goods; and a data storage configured to receive and record the user data and the goods data when the identified user checks the dangerous goods into or out of the repository.
  • the storage is mounted to the dangerous goods.
  • the storage is located at the repository.
  • the storage is located remotely from the repository.
  • the system comprises a second storage located at the repository, the second storage being configured to record an association between the data indicative of the identified user and the data indicative of the identified dangerous goods.
  • the system comprises a third storage located remotely from the repository, the third storage being configured to record an association between the data indicative of the identified user and the data indicative of the identified dangerous goods.
  • the user data is recorded in association with the goods data.
  • the user identifier device is arranged to identify a subsequent user accessing the repository and output subsequent user data indicative of an identity of said subsequent user;
  • the dangerous goods identifier device is arranged to identify dangerous goods subsequently checked into or out of the repository and output subsequent goods data indicative of an identity of said dangerous goods subsequently checked into or out of the repository;
  • the data storage is configured to receive and record the subsequent user in association with the subsequent goods data.
  • the user identifier device is arranged to identify a subsequent user accessing the repository and output subsequent user data indicative of an identity of said subsequent user;
  • the dangerous goods identifier device is arranged to identify dangerous goods subsequently checked into or out of the repository and output subsequent goods data indicative of an identity of said dangerous goods subsequently checked into or out of the repository; and the system further comprises a further data storage configured to receive and record the subsequent user data and subsequent goods data.
  • the storage is configured to receive one or more data indicative of, and record one or more of, the following in association with the identified dangerous goods: the quantity of dangerous goods checked in or out; the type of dangerous goods checked in or out; the time and date of checking in or out; and information related to the checking in or out.
  • the quantity is a number of discrete units of dangerous goods, a number of packages of dangerous goods, a volume of dangerous goods or a weight of dangerous goods.
  • the information related to checking in is the source of the dangerous goods and the reason for checking in.
  • the repository is mobile, and the information related to checking in is the intended destination of the repository.
  • the information related to checking out is the destination and intended use of the dangerous goods or reason for checking out.
  • the storage is configured, to record a representation of the geographic location of one or more of: the user identifier when the user identifier identifies the user; the dangerous goods identifier when the dangerous goods identifier identifies the dangerous goods; and the repository when the dangerous goods are checked in or out.
  • the geographic location is obtained from a global positioning satellite receiver.
  • system further comprises a report generator for reporting on each recorded association between the identified user and the identified dangerous goods.
  • system further comprises a risk analyser for determining a risk associated with the identified user checking dangerous goods into or out of the repository.
  • the risk analyser is configured to determine the risk by determining a likelihood of an adverse occurrence happening and the severity of the consequence of the adverse occurrence happening.
  • the risk analyser is configured such that certain possible occurrences have their risk predetermined.
  • system further comprises an alert generator for raising an alert when the determined risk meets one or more criteria.
  • system further comprises a station located at or near the repository, or at or near a point of entry to or exit from the repository.
  • the station comprises the second storage.
  • the storage is configured to record a representation of the geographic location of the station when the dangerous goods are checked in or out of the repository.
  • the user identifier comprises an input device for receiving a user code and a comparator for comparing the user code with a code associated with a known user identity.
  • the user identifier comprises a biometric reader.
  • the user data is a biometric reading from the biometric reader.
  • the user data is a representation of a known user identity that matches a associated stored reference biometric to a read biometric from the biometric reader.
  • the dangerous goods identifier comprises a label reader connected with the station for reading a label on the dangerous goods.
  • the label reader comprises a RFID chip reader.
  • the station comprises a label output device, preferably capable of writing to an RFID chip in the label.
  • the dangerous goods identifier is in the form of a portable device arranged to communicate with the station.
  • the dangerous goods identifier is an electronic label on the dangerous goods.
  • system further comprises an identifier writer for writing information to an identification item associated with the checked dangerous goods.
  • system is configured to record the identified user on an identification item associated with the dangerous goods.
  • the identification item comprises information on the nature, type, and number of goods at package or unit level.
  • the identifier writer is configured to record an identification of the repository on the identification item.
  • the storage is arranged to record an inventory of dangerous goods held at the repository, which is updated as dangerous goods are checked in and out.
  • the report generator is arranged to output a report on the inventory.
  • the report generator is arranged to output a report on the occurrence of determined risks of dangerous goods checked into or out of the repository.
  • the storage is arranged to store an expiry date in association with each one of the identified dangerous goods.
  • the storage is arranged to store a first type of expiry date for a closed dangerous goods package and a second type of expiry date for units of dangerous goods from an opened dangerous goods package.
  • the station is configured to use the second type of expiry date instead of the first type of expiry date from when the package is opened.
  • system further comprises an expiry date tracker for flagging when a dangerous goods package or unit has reached its expiry date.
  • the expiry date tracker is configured to calculate the expiry date of units of dangerous goods from an opened dangerous goods package.
  • the system is configured to send recorded information to a remote computer.
  • the remote computer comprises the third storage.
  • the dangerous goods are explosives, explosives pre-cursor materials, or explosives related goods.
  • the repository is an explosives magazine.
  • the dangerous goods are industrial chemicals.
  • a dangerous goods repository checking system comprising: a user identifier device for identifying a user accessing a repository, arranged to output user data indicative of an identity of said user; and a data storage mounted to the dangerous goods and configured to receive and record the user data when the identified user checks the dangerous goods into or out of the repository.
  • system further comprise a dangerous goods identifier device mounted to the dangerous goods for identifying dangerous goods checked into or out of the repository, the dangerous goods identifier device arranged to output goods data indicative of an identity of said dangerous goods; and the data storage is arranged to output user data indicative of an identity of user who checked the dangerous goods into or out of the repository.
  • a method of checking dangerous goods into or out of a repository comprising: identifying a user accessing a repository with a user identifying device; identifying dangerous goods checked into or out of the repository with a dangerous goods identifying device; and recording in a data storage user data indicative of an identity of said user and goods data indicative of an identity of said dangerous goods when the identified user checks the dangerous goods into or out of the repository.
  • the method further comprises recording the data indicative of the identified user in association with the data indicative of the identified dangerous goods in a remotely located second storage.
  • a method of checking dangerous goods into or out of a repository comprising: identifying a user accessing a repository; identifying dangerous goods being checked into or out of the repository; recording the identified user in association with the identified dangerous goods on a storage device located with the dangerous goods when the identified user checks dangerous goods into or out of the repository.
  • the method comprises identifying the repository and recording an association between the identified dangerous goods and the identified repository.
  • the method comprises identifying the location of the repository when the dangerous goods are checked into or out of the repository and recording an association between the identified location and the identified dangerous goods.
  • the association is automatically recorded electronically in a storage device of a station at the repository.
  • identifying the user is a prerequisite before granting access to the repository.
  • the identifying the dangerous goods is conducted by electronic scanning of a label attached to the dangerous goods. In an embodiment one or more of the following is also recorded: the quantity of dangerous goods checked in or out; the type of dangerous goods checked in or out; the time and date of checking; and information related to the checking in or out.
  • the information related to checking in is the source of the dangerous goods and the reason for checking in.
  • the information related to the checking out is the destination and intended use of the dangerous goods or reason for checking out.
  • the identified user and the identified dangerous goods are also recorded as associated with a representation of the geographic location of one or more of: the user when they are identified; the dangerous goods when they are identified; and the repository when the dangerous goods are checked in or out.
  • the method further comprises determining the risk associated with the identified user checking dangerous goods into or out of the repository.
  • the user is identified by a biometric reading.
  • the dangerous goods are identified by reading an RFID chip associated with the dangerous goods.
  • the method further comprises attaching the RFID chip to the dangerous goods at the time of checking in or out of the repository.
  • the identified user is recoded on an identification label associated with the dangerous goods.
  • the identification is in the form of encoded data.
  • assess to the repository is restricted and the method further comprises comparing the user's identification with a list of authorised users, wherein access to the repository is granted only when the identification of the user is on the list of authorised users.
  • the method further comprises recording an identification of the repository in association with the dangerous goods.
  • the information is recoded when the dangerous goods are received at the repository.
  • the information is recoded when the dangerous goods are removed from the repository.
  • a method of checking dangerous goods into or out of a repository comprising: identifying a user accessing a repository; and recording user data indicative of an identity of said user in a data storage mounted to the dangerous goods when the identified user checks the dangerous goods into or out of the repository.
  • a computer program for controlling a processor to perform a method of checking dangerous goods into or out of a repository comprising: identifying a user accessing a repository with a user identifying device; identifying dangerous goods checked into or out of the repository with a dangerous goods identifying device; and recording in a data storage user data indicative of an identity of said user and goods data indicative of an identity of said dangerous goods when the identified user checks the dangerous goods into or out of the repository.
  • the present invention also provides a method of determining when to deliver dangerous goods to a repository, the method comprising: maintaining an inventory of dangerous goods stored at a repository; identifying a user accessing a repository to check dangerous goods in or out of the repository; identifying dangerous goods checking into or out of the repository; updating the inventory as dangerous goods are checked into and out of the repository, where the inventory has a representation of the identity of the user that checks goods in or out recorded; initiating the delivery of dangerous goods to the repository when the amount of the dangerous goods recorded in the inventory drops below a threshold.
  • a system for determining when to deliver dangerous goods to a repository comprising: a processor for maintaining an inventory of dangerous goods stored at a repository in a storage device, the processor is configured to update the inventory as dangerous goods are checked into and out of the repository, and record in the storage device a representation of an identity of the user that checks goods in or out; a user identifier for identifying a user accessing a repository to check dangerous goods in or out of the repository; a goods identifier for identifying dangerous goods checking into or out of the repository; and an order generator for initiating the delivery of dangerous goods to the repository when the amount of the dangerous goods recorded in the inventory drops below a threshold.
  • the present invention further provides a method of sending data over a communications medium, the method comprising: identifying a user accessing a repository in which dangerous goods are stored; identifying dangerous goods checked into or out of the repository by the identified user; sending a representation of the identified user and a representation of the identified dangerous goods as data over the communications medium.
  • a system for sending data over a communications medium comprising: a user identifier for identifying a user accessing a repository in which dangerous goods are stored; a goods identifier for identifying dangerous goods checked into or out of the repository by the identified user; a transmitter for sending a representation of the identified user and a representation of the identified dangerous goods as data over the communications medium.
  • Also according to the present invention there is a method of handling bulk material comprising: measuring the quality of material in a container for holding bulk material; reading an identification of the container from an identifier device located with the container; and storing the identification in association with the measured quantity of material in the container at a particular time.
  • the method further comprises detecting whether an opening to the container has been accessed prior to transferring material into or out of the container. In an embodiment the method further comprises applying a stopper to the opening, such that the stopper must be removed or opened before material can be transferred into or out of the container, identifying the stopper and recording the identity of the stopper.
  • the method further comprises reading the identity of the stopper at a later time when material is to be transferred to or from the container, and comparing the read identity to the recorded identity.
  • measuring the quantity of material in the container comprises weighing the container before and after material is transferred into or out of the container.
  • measuring the quantity of material in the container comprises weighing another container to which at least a portion of the material is transferred to or from before and after material is transferred into or out of the other container.
  • the particular time is either prior to or after transfer of material into or out of the container.
  • a material handling facility comprising: a container for holding bulk material; a quantity measuring device for measuring the quality of material in the container; an identifier device located with the container for providing an identification of the container; and a recording system for storing the identification in association with a measured quantity of material in the container at a particular time.
  • the facility further comprises a reader for reading the provided identification of the container and for providing the identification to the recording system.
  • the facility further comprises an access detector for detecting access of an opening of the container.
  • the facility further comprises a stopper to the opening arranged so that the stopper must be removed or opened before material can be transferred into or out of the container.
  • the facility further comprises an identifier of the stopper and a recorder of an identity of the stopper.
  • the facility further comprises a reader for reading the identity of the stopper prior to when material is to be transferred to or from the container and a comparator for comparing the read identity to the recorded identity.
  • the stopper comprises a closure or a valve.
  • the opening comprises an outlet chute, pipe, hose or transfer medium from the container.
  • a monitoring system comprising: an input for receiving a measurement of the quality of material in the container; an input for receiving identification of the container from an identifier located with the container; and a storage device for storing the container identification in association with the measured quantity of material in the container at a particular time.
  • the system further comprises an input of a signal indicative of whether an opening to the container has been accessed prior to transferring material into or out of the container.
  • system further comprises an input of an identification of a stopper which is applied to the opening, such that the stopper must be removed or opened before material can be transferred into or out of the container and a comparator for comparing the input of the stopper identification at two different times, where in the event that the input stopper identification is different a signal is produced that is indicative of the opening to the container having been accessed prior to transfer of material to or from the container.
  • system further comprises an output of a signal indicative of the stored container identification and the associated measured quantity.
  • Figure 1 is a schematic representation of a repository of an embodiment of the present invention
  • Figure 1A is a schematic plan view representation of an alternative repository of an embodiment of the present invention
  • Figure 1 B is a schematic view of representation of a bulk goods handling repository of an embodiment of the present invention
  • Figure 2 is a schematic representation of a station at the repository of Figure 1 ;
  • Figure 3 is a flow chart showing a method of checking dangerous goods into the repository of Figure 1 according to an embodiment of the present invention;
  • Figure 4 is a flow chart showing a method of checking dangerous goods out of the repository of Figure 1 according to an embodiment of the present invention;
  • Figure 5 is a flow chart showing a method of checking dangerous goods back into the repository of Figure 1 according to an embodiment of the present invention;
  • Figure 6 is a diagrammatic representation of a process of placing orders for dangerous goods, according to an embodiment of the present invention.
  • Figure 7 is a diagrammatic representation of a process of applying an identifier to a package of dangerous goods, according to an embodiment of the present invention.
  • Figure 8 is a diagrammatic representation of a process of dispatching an order for dangerous goods, according to embodiment the present invention.
  • Figure 9 is a diagrammatic representation of a process of receiving a delivery of dangerous goods at a repository, according to an embodiment the present invention.
  • Figure 10 is a diagrammatic representation of a process of checking in of dangerous goods to a repository, according to an embodiment of present invention.
  • Figure 11 is a diagrammatic representation of a process of sending of information to a computer according to an embodiment the present invention.
  • Figure 12 is a diagrammatic representation of a process for obtaining records of goods checked in to and out of a repository, according to an embodiment the present invention
  • Figure 13 is a diagrammatic representation of a process for reporting checking of dangerous goods in to and out of a repository, according to an embodiment of present invention
  • Figure 14 is a diagrammatic representation of a process of statutory reporting in relation to dangerous goods, according to an embodiment of present invention
  • Figure 15 is a diagrammatic representation of a process of granting access control to a repository of dangerous goods according to an embodiment of the present invention
  • Figure 16 is a diagrammatic representation of a process for the procurement support according to an embodiment of the present invention.
  • FIG. 1 there is shown an embodiment of a repository 10 for storing dangerous goods located at, for example, a mine site.
  • the repository 10 in this embodiment is a magazine for storing explosives and related goods at locations 20, 22 and 24 in the repository 10 for use on the mine site.
  • the dangerous goods may also be other energetic substances or deflagrable substances such as propellants and pyrotechnics.
  • the repository may be at other locations, such as an industrial estate, research facility, plant, underground facility, in the ocean etc and that the repository could store other types of dangerous goods.
  • the repository may also be mobile, such as a bin or container, on a truck, railcar, ship or airplane.
  • Examples of other dangerous goods stored on a mine site or industrial estate include packages, containers, bottles or tanks of corrosive chemicals, such as acids and caustic chemicals; highly reactive, toxic or other industrial chemicals, such as oxidising agents or sodium cyanide; flammable chemicals, fuels and solvents; or bottles of compressed gas.
  • corrosive chemicals such as acids and caustic chemicals
  • highly reactive, toxic or other industrial chemicals such as oxidising agents or sodium cyanide
  • flammable chemicals fuels and solvents
  • fuels and solvents or bottles of compressed gas.
  • Still other dangerous goods include packages, containers, bottles or tanks of radioactive goods, biological agents, infectious substances or munitions.
  • the repository 10 is a fenced area defined by fence 12 or preferably secured in some other way, such as being in a secure room or building.
  • the repository 10 has a lockable gate 14 or other entry/exit, such as a lockable door.
  • Adjacent the gate 14 is a station 30.
  • the station 30 is arranged to identify a user accessing the repository 10 and to identify dangerous goods being checking into or out of the repository 10.
  • the station 30 also records an association between the identified user and the identified dangerous goods when the identified user checks dangerous goods into or out of the repository 10.
  • the repository is mobile the station 30 may be carried by a vehicle for transporting the repository.
  • the station 30 may be configured to unlock the gate 14 for authorised personnel. Alternatively electronic unlocking of the gate 14 may active the station 30.
  • the gate 14 may be electronically unlocked by receiving a biometric reading of a person identified as being authorised to access the repository.
  • the repository 10' may be widely dispersed with one or more locations 20 and 22 for storing dangerous goods. Typically different types of dangerous goods are stored in the repository 10/10' at these separate locations.
  • High Explosives (HE) are at location 20
  • Initiating Explosives (IE) are at location 22.
  • the gate 14 may be located some distance from the location (for example a number of or a large number of kilometres).
  • a road 18 allows a truck 28 to travel between the locations 20 and 22 and the gate 14.
  • the station 30 may be replaced with stations 30', and 30" near locations 20 and 22, respectively.
  • stations 30, 30' and 30" may all be employed.
  • one of the locations comprises a facility in the repository 10' for storing bulk goods, such as for example, ammonium nitrate, an emulsion or Diesel fuel. These components are used to make the high explosive ANFO, commonly used on mine sites.
  • the facility 21 comprises a container 400 for holding the bulk goods.
  • the bulk good is prill form ammonium nitrate 402.
  • the container 400 is a silo-type container, which funnels into a feed chute 406.
  • the feed chute 406 has a valve 408 or some other stopper, such as a closure, for controlling the egress of material 402 from the container 400.
  • the container 400 is mounted on a weigh stand 410, which allows the container 400 and its contents to be weighed. As the amount of material in the container 400 varies, its weight will vary. By measuring variations in the weight the quantity of the material within the container 400 can be determined. If the container 400 is holding a liquid, an outlet pipe would be provided instead of the chute 406.
  • the container 400 may take other forms. Material that is to be transferred into the container 400 may be tipped through a top opening in the container 400 from a raised tilting tray or dropped from a conveyor, or it may be pumped in when it is liquid. Other suitable means of transferring the material into the container 400 may be employed.
  • the weight of the container 400 including the material in it can be determined both before and after material is transferred into the container, as well as before and after the material is transferred out of the container 400. This allows the quantity of material to be transferred into and out of the container 400 to be determined. Other methods of determining the quantity of material can be used, such as, by use of a flow meter.
  • the truck 28 has a container 404 which receives the material via the chute 406 or pipe.
  • the truck 28 is parked at a weigh station of the facility 21 , which comprises a weigh bed 412.
  • the truck can be weighed before and after the material is transferred to or from the container 400.
  • the amount of material transferred to or from the truck container 404 can be determined according to the difference in weights.
  • the container 400 has an identifying component of identifier 420 attached to it.
  • the truck 28 also has an identifier 424 attached to it and the valve 408 or other stopper has an identifier 422 attached to it.
  • the identifiers 420, 422 and 424 are preferably Radio Frequency Identification (RFID) labels as described below, but for example they may be barcodes.
  • RFID Radio Frequency Identification
  • a reader such as the portable device described below, is able to read an identification representing an identity of the container 400, container 404 or the stopper/valve 408 from the identifier 420, 424 or 422, respectively.
  • Adjacent to the container 400 is the station 30'.
  • the truck 28 has another station 30'", that is mounted to and travels with the truck 28.
  • the weigh stand 410 and/or the weigh bed 412 may be arranged to transfer readings of the weight of the container 400 or the truck 28 to the station 30'. By reading the identification of the container 400 at a particular time and by measuring the amount of material in the container 400 or the amount transferred to or from the container 400 movement of the material can be tracked as described further below.
  • the identifier 422 may be configured to act as a detector of whether or not the valve 408 is opened or stopper removed, such that in order to activate the valve 408 or remove the stopper the identifier must be removed or destroyed. Therefore, prior to activation of the valve 408 the identifier would be read. The valve would then be activated, and then when it is deactivated a new identifier is installed. The identification of the new identifier is stored. Sometime later, when the valve 408 is to be activated again, the identification of the new identifier can be read and checked against the stored identifier. Alternatively, measurements of the quantity of material in the container or transfered from the container can serve the purpose of determining whether any material has been removed from the container in an unauthorized or inappropriate manner.
  • the facility 21 for handling bulk material can be used to handle bulk material (other than dangerous goods), for example the facility can be useful for tracking valuable bulk material.
  • the station 30 comprises a processor and a storage device.
  • the processor and storage device form part of a computer 32 of the station 30.
  • the computer 32 also comprises a memory, I/O and display driver.
  • the storage device is typically in the form of a hard disk drive.
  • the computer 32 is connected to an external solid state storage device (SSSD) 34, such as flash RAM.
  • SSSD solid state storage device
  • the station 30 further comprises a display 36, such as a CRT, LCD, or plasma display, connected to the display driver.
  • the display 36 has a touch screen input 38 connected to the I/O.
  • the station 30 may also include a keyboard 40 and/or a mouse 42 connected to the I/O.
  • the station 30 further comprises a connector 44 to a portable device 46 or a transponder of a scanning zone 26 of the repository 10.
  • the connector 44 connects the portable device 46 to the I/O.
  • the connector 44 may be a docking port (as shown) or a wireless interface, such as a Bluetooth TM interface, an 802.11x interface or an infrared interface.
  • the portable device 46 may be a PDA which is able to read an identifying component tag/label 48 associated with an item of dangerous goods. Typically the label 48 will be stuck to the item by an adhesive. Alternatively an identifying component may be embedded in the item.
  • the item may be an individual unit or package of units.
  • the unit may be for example a detonator, initiator, fuse, explosive compound, booster etc., a container of a solid or liquid, a tank or bottle of liquid or gas.
  • the package may be for example a box or pallet.
  • the unit is a container the quantity of solid or liquid therein is typically known. The quantity may be measured by weight or volume, for example as described above in relation to the bulk material handling facility 21..
  • the label 48 or identifying component may comprise a barcode or a RFID chip or some other form of identification.
  • the portable device 46 is able to read the barcode and/or read data from the RFID chip and/or other identification. Preferably the portable device 46 is also able to write data to the RFID chip.
  • the transponder of the scanning zone 26 is able to communicate with one or more of the RFID chips inside the scanning zone 26.
  • the station 30 further comprises a label output device 50 and a printer 52 connected to the I/O.
  • the label output device 50 is capable of producing a label 48 and writing to an RFID chip in the label 48 and/or printing information in the label 48, such as a barcode.
  • the station 30 comprises a cabinet housing 54, in which are housed the computer 32 and SSSD 34 in a first lockable section 56, the label output device 50 and the printer 52 in a second lockable section 58, and the display 38, keyboard 40, mouse 42 and docking port 44 in a third lockable section 60. It is preferred that the SSSD 34 is hidden from view and difficult to access.
  • the station 30 further comprises a biometric reader connected to the I/O.
  • the biometric reader may be located on the PDA 46, the keyboard 40, on the housing 54 or else where on the station 30 or in proximity to the station 30 (for example on or near the gate 14). The biometric reader can be used to identify authorised personnel for unlocking the gate 14.
  • the station 30, the repository 10, or preferably the portable device 46 has a geographic location determining device, such as a Global Positioning Satellite (GPS) receiver installed.
  • the GPS receiver receives positioning information to enable the latitude and longitude (lat. and long.) of the GPS receiver to be determined. Other forms of location determining device may be employed.
  • the GPS receiver is interfaced to the computer 32, (preferably via the portable device 46) such that the lat. and long, are recorded in the storage of the computer 32.
  • the geographic location of the following is recorded: the user when the biometric reader identifies the user; the dangerous good when they are identified; the station when the dangerous goods are checked in or out; or the repository when the dangerous goods are checked in or out.
  • the processor is controlled by logic in the form of at least one computer program installed on the computer 32.
  • the computer program is stored on the hard disk drive and loaded into memory (such as RAM) when activated. It is preferred that the computer program automatically activate when the computer 32 is powered on. Typically this in implemented by setting an operating system of the computer 32 to automatically run the computer program on start up.
  • the station 30 may also have a power management system for sequentially powering up devices when the station 30 is activated. For example upon opening of the third lockable section 60, the computer may be powered up first, followed by the display 36, then the printer 52 and the label output device 50.
  • the power management system may also control the powering down sequence (for example in reverse order to the power up sequence).
  • the processor under the instruction of the computer program, interfaces to and controls the storage devices, display 36 via the display controller, connector 44, label output device 50 and the printer 52 via the I/O and receives input from the touch screen input 38, keyboard 40, mouse 42, connector 44 and biometric reader via the I/O.
  • the computer program controls the processor to output to the display 36 a request to receive an identifier of an authorised user.
  • the output may be displayed on a display 62 of the portable device 46.
  • Such an output might be for example, "please enter identification number", or "please scan your thumb over the thumb scanner”.
  • the computer program controls the processor to receive an input so as to identify a user accessing the repository 10. This may be for example by receiving entry of an identification number/name/password on the touch screen/keyboard or a biometric scan, such as for example a thumb print scan. Other biometric readings can be used.
  • a security token may be used to verify/identify the user.
  • the security token may produce a code or may display a code which is transmitted to/entered into the station 30. Entry of a special number/name/password can trigger a duress alarm.
  • the computer program controls the processor to output to the display 36 and/or 62 a request for an identifier of dangerous goods being checking into or out of the repository 10. Such an output might be for example "please scan package” or "please scan the container”.
  • the computer program controls the processor to receive an identification of the dangerous goods being checking into or out of the repository 10. This may be for example by entry of an identification code in to the touch screen 38 or keyboard 40. Preferably the entry is via the portable device 46 reads the label 48. Reading the label 48 may involve scanning a barcode on the label or preferably reading a RFID chip in the label 48 attached to the goods.
  • the computer program controls the processor to record in one or more of the storage devices an association between the identified user and the identified dangerous goods.
  • the computer program then controls the processor to output to the display 36 and/or 62 a message indicating that the dangerous goods can now be checked into or out of the repository 10.
  • the computer program is configured at this stage to unlock the gate 14 and allow the dangerous goods in or out of the repository 10. in the case of the goods being a container 404 of bulk material, the material may be transferred to the container 400 or the container may be cleared to leave the facility 21.
  • the computer program also controls the processor to record in the storage the quantity of dangerous goods checked in or out; the type of dangerous goods checked in or out; the time and date of checking; and other information related to the checking in or out.
  • the other information related to checking in may be for example the source of the dangerous goods, the reason for checking in, the destination of the repository in the event that it is mobile (that is, for example, the container 404 may be considered a repository), or the destination and intended use of the dangerous goods or reason for checking out and location information.
  • the computer program is configured to write a representation of the identity of the authorised user to the RFID chip of the label 48/424.
  • the computer program is configured to record the location of the user when the biometric reader identifies the user. This enables the station 30 to log the location of the user to verify correct use of the system.
  • the computer program is configured to record the location of the dangerous goods when the portable device identifies the dangerous goods. This enables the station 30 to log the location of the goods to verify correct use of the system.
  • the recorded location can be used to verify the identity of the goods or to verify that the identified goods are placed in the correct location 20, 22, 24 in the repository 10. Further alternatives are to record the location of the station 30 or the repository 10 when the dangerous goods are checked in or out. This allows for movement of the station 30 or the repository 10.
  • the station 30 also comprises a communicator for communicating with a remote computer.
  • the computer program controls the processor to send the recorded information to the remote computer.
  • the transmitted information is encoded in data and may be encrypted.
  • the remote computer may be running an accounting/stock management system, such as marketed under the trade marks Pronto or SAP.
  • the remote computer may run a database which has the recorded information added or may be operated by a government agency, such as for example the Australian Bomb Data Centre.
  • Station 30 can also received data from or send data to a tracking database of the remote computer to check that the amount, type and location of explosives removed match what was used.
  • a database/tracking system may be as described in International patent publication number WO2008074071 , which is incorporated herein by reference.
  • the computer program controls the processor to compile and output a report on the each recorded association between each identified user and the identified dangerous goods, along with other recorded information.
  • the remote computer may also generate such a report.
  • the report can be printed on the printer 52 or the compiled report can be communicated to the remote computer.
  • the report can be generated automatically or upon request. 5 Automatic reports can be generated periodically or when certain conditions are met.
  • Example reports are:
  • the computer program controls the processor to operate as a risk analyser for determining the risk associated with the identified user checking dangerous goods into or out of the repository.
  • Other information may5 be taken into account when assessing the risk.
  • the risk analyser assesses the risk by determining a likelihood of an adverse occurrence happening as the result of an instance of checking in/out and the severity of the consequence if the adverse occurrence were to happen. Alternatively, or in addition, instances with certain details have the level of risk predetermined. When the determined o risk meets one or more criteria an alert is raised. Typically those possible adverse occurrences which have a high to certain likelihood and moderate to catastrophic consequences trigger an alert. For example alerts can be generated if one or more of the following occurs:
  • Different priority of alerts can be generated. For example three colour flags can be generated with an alert, depending of the levels set
  • Red flag - (major) have the highest alert level and require immediate action and would be reportable directly to Senior Site Management including Safety/Security management; Orange flag - (moderate) is just under high and require immediate action by Safety/Security management; and
  • a method 100 of checking in of dangerous goods to the repository is shown.
  • the method in this embodiment is applied to a situation where the dangerous goods are explosives for use on a mine site, and the repository 10 is a magazine located at the mine site.
  • the method 100 comprises placing an order 102 for certain explosives, such as for example detonators, from an explosives manufacturer.
  • the explosives are delivered 104 to the magazine 10.
  • An authorised user such as a shotfirer takes possession of the explosives by the following process.
  • the authorised user identifies themself 106 to the station 30. Typically, this will be by performing a biometric scan. In an embodiment performing the biometric scan activates the station 30. In another embodiment performing the biometric scan opens the gate 14.
  • This identification may involve entry of a code/PIN instead of or in addition to the biometric scan.
  • the delivered explosives will typically have an identification label 48 attached. Traditionally, this has been by attaching a barcode to the box of explosives. However, it is preferred that the box of explosives have an RFID chip in the label 48 attached to them. The box may have the RFID chip in the label when it arrives from the manufacturer. It is more preferred that each unit of explosives in the box be identified. This could be by a barcode, but is preferably with an RFID chip in a respective label attached to each unit.
  • the label output device 50 can be used to generate a label 48 with the RFID chip, which can then be attached to the box.
  • the label output device 50 can write data to the RFID chip in the label 48.
  • the data written to the RFID chip will include a unique identifier and information about the contents of a box of explosives, such as the number of explosive units in the box, the type of explosive units in the box, the manufacturer and the date of manufacture. This information may be obtained from a barcode or other label on the box, which is entered into the station 30 either scanned or manually entered, or obtained from another data source, such as for example, by upload to the station 30 or from a flash RAM device that was produced by the manufacturer and was delivered with a box. This information is then output to the RFID chip in the label 48. This process 108 ensures that the goods/box has an identifier attached to it.
  • the box already has an RFID label 48 it can be scanned and data sent 110 from the RFID chip to the portable device 46 and then to the station 30.
  • the portable device 46 sends this data to the station 30 via the connector 44.
  • the portable device 46 is returned to the connector 44, in the form of a docking port, the scanned information is sent to the station 30.
  • the portable device 36 may be able to wirelessly transmit the data to the station 30.
  • the station 30 now has an identification of the authorised user and an identification of the explosives delivered. This information is associated 112 and stored 114 in the storage device of the station 30. This information is also transmitted (exported) to an external computer.
  • a delivery docket may be printed using printer 52.
  • the portable device 46 can also write the identification of the authorised user to the RFID chip. This provides an electronic proof of delivery (EPOD) 116 that is associated with the box.
  • EPOD electronic proof of delivery
  • a listing of those goods which were sent from the manufacturer is delivered with the explosives.
  • This may be sent electronically to the station 30 over a computer network or maybe manually provided such as by loading it from a portable flash RAM device or similar.
  • the scanned data can be compared to the data provided with the delivered goods to verify that all the sent goods have arrived and are checked into the magazine.
  • This and other safety assessments 118 can be performed and if the activity or situation gives rise to a risk that meets certain criteria, it will raise an alert 120.
  • a printed report may be produced by the printer 52 and/or the alert can be recorded and/or the alert can be transmitted to another computer, such as the PC of a mine site supervisor/risk officer or to a head office computer for consideration by management.
  • the method 200 comprises identifying 202 an authorised user attempting to check out the goods (explosives) from the repository 10 (magazine).
  • the authorised user uses the handheld device 46 to scan the explosives being removed.
  • An identification of goods from a barcode or preferably from an RFID chip on a label 48 attached to the explosives is read 204 into the station 30.
  • the authorised user enters 206 the details of the destination of goods and the reason for their removal. This may be for example a particular pit on the mine site in which blasting operation is scheduled to occur.
  • the goods may not have an identification label attached, possibly because it is old stock or the label has become damaged or has been removed from the box.
  • the goods have another RFID label prepared and attached 208 in a similar manner to the described above in relation to step 108.
  • the identifier of the user may be recorded on the RFID chip of the box.
  • the identifier of the explosives and the user's identifier are recorded by the station 30 at 210. These details are stored 212 in the storage device.
  • the details may also be sent to a remote computer and/or a paper transfer document may be printed containing details of the explosives being checked out using printer 52.
  • a safety assessment is performed 214 to determine the extent of any risk associated with the removal activity by the authorised user. For example, the authorised user may be trying to remove more explosives than is allowed by one user or required for a particular blasting operation. If the action is of sufficient risk then an alert is raised 216. If no alert is raised or the risk is sufficiently small then the goods are allowed to be removed from the magazine at 218.
  • the method 300 comprises identifying 302 the authorised user attempting to check in returned explosives to the magazine.
  • the authorised user uses the handheld device 46 to scan the label 48 attached to the explosives being returned.
  • Identification of the goods may be from a barcode or preferably from a RFID chip on the label.
  • the identifier is read 304 into the station 30.
  • the authorised user enters 306 the details of the source of the goods and the reason for their return. For example, not all of the explosives may have been used in a particular blasting operation and these are being returned to the magazine.
  • the goods may not have an identifier attached, possibly because the label has become damaged or loose units from an opened box are being returned.
  • the goods have another RFID label prepared and attached 308 similar moment described above in relation to step 108.
  • the identifier of the user may be recorded on the RFID chip attached to the goods.
  • the identified explosives and the identifier of the user are recorded by the station at 310. These details are stored 312 in storage device. Delivery paperwork may be printed on printer 52.
  • a safety assessment is performed at 314 to determine whether there is any risk associated with the return activity by the authorised user. For example, the wrong type of explosive is being returned. If the action is of sufficient risk an alert is raised 216. If no alert is raised, or the risk is sufficiently small then the goods are allowed to be returned to the magazine 318.
  • the RFID chip may record an identification of the repository 10 when checked in or out.
  • the station 30 stores in the storage device an inventory of dangerous goods held at the repository 10, which is updated as dangerous goods are checked in and out.
  • the inventory is updated by recording the identification of packages checked in or out.
  • the inventory is updated by recording the identification of units in each package checked in or out.
  • the inventory is also updated by recording the identification of unpackaged units checked in or out.
  • Various reports can be prepared.
  • a report can be prepared on the current inventory of the magazine, on what dangerous goods were checked into the repository and by whom, what dangerous goods were checked out of the repository and by whom, and what goods were returned to the repository and by whom. Reports can also be generated on any of activities that were assessed as being of sufficient risk to generate an alert or even those activities that were assessed of being some risk, but not sufficient risk to generate an alert.
  • the station 30 can be controlled to store an expiry date with each identified dangerous goods.
  • the storage device can be arranged to store the expiry date of closed packaged dangerous goods and the expiry date of units of dangerous goods from an opened dangerous goods package. This can be relevant as the expiry date of an sealed box of explosives may be for example four years, whereas the expiry date of each unit of explosives inside the box may only be one year once the box is opened.
  • the station 30 can keep track of expiry dates and flag when a dangerous goods package or unit is approaching or has reached its expiry date.
  • a report on when items in the magazine will expire can be produced.
  • a report can be stored, printed and/or transmitted to another computer.
  • Tracking the inventory of goods within the magazine can also be useful for stock control.
  • a manager of the magazine can determine when certain explosives are in need of the ordering.
  • the ordering process can be automated such that when certain explosives reach a threshold, an automatic order can be generated for more.
  • the inventory tracking can be conducted by the station, by an external computer which can keep track of the inventory of many magazines, or by a manufacturer to keep track when their stock requires replacement.
  • Stock usage may be communicated to the distributor/manufacturer's computer which maintains records of delivery and stock levels relevant to the distributor and when stock level reaches a specified level the computer can automatically initiate an order for stock.
  • Tracking of the stock physically present in the repository 30, and reading the EPOD identifier of who received the goods, is useful to match against the records in the station 30 and distributed externally for stocktake and audit purposes. This process can be conducted regularly or whenever desired, such as when an independent audit occurs.
  • the stock level can be determined according to a usage rate, lead time to manufacture and/or delay in delivery.
  • the usage rate may be entered according to planed consumption of specified dangerous goods. Alternatively the usage rate is calculated based on typical historic usage rates.
  • the RFID chip can be read to obtain its identification, and other information stored thereon.
  • the records of the station 30 or external computer consulted to determine who was last in control of the explosive and where it was from based on the identification of the explosive device.
  • this information can be extracted directly from the explosive and questions asked as to how explosive left the control of that user.
  • the EPOD identification of a delivery person can be removed once the explosives are delivered to their approved magazine locations. If a shotfirer removes explosives to be used in the field his EPOD identification of the shotfirer will be placed on the label which will stay there until the explosives are consumed in a blast.
  • the computer program can control the station 30 to present to a user with drop down data menus which have for example: Pre set explosives types; Pre set or able to set a location for explosives movements Transfers, Open Pit
  • the station can auto populate the data stored in the RFID chip;
  • the station can generate an ID number;
  • the station can enter the data with all the management fields; Time / date, Magazine keeper name, Location,
  • the station can look up the checked explosive type, qualities and calculate NEQ, or if the NEQ is known the station can work out volume.
  • Misfired explosives can be identified later by reading the RFID chip attached and a report can be generated.
  • Example The following is an example of an embodiment of the present invention in which the dangerous goods are explosives and the repository is an explosives magazine.
  • Figure 6 shows a user placing an order at 1000 for new stock of dangerous goods.
  • the order is placed at the mine site at 1002.
  • the order will typically contain information such as the date required 1004, the type and volume of explosives required 1006, an order number 1008, and the company or mine site 1010 making the order.
  • the order is sent to the manufacturer typically electronically, and the manufacturer typically manufactures the ordered explosives along with orders made from other mine sites and companies in a batch.
  • Each explosive manufactured may have an identifying label attached to it for example, as described in patent application WO2006/128257, the contents of which are incorporated herein by reference.
  • the container/package/box of explosives will have a label attached 1102. It is preferred that the label include RFID chip.
  • the RFID - ETC protocol 1102 defines how sections of the data space in the RFID chip are used.
  • the first section includes information about the RFID chip supplier 1104, this will include an 8 byte unique identification number (UID) 1106 as well as control and write access information.
  • UID unique identification number
  • the second section includes information about the manufactured explosive 1110.
  • the unit identification 1130 can then be broken down into the date of manufacture 1132, a packaging type 1134, a product type that went into the packaging 1136, and a label/manufacturing identification number 1138.
  • the packaging type will be coded for 'box' as the explosives are in a box type of package.
  • Other types of package could include unit, roll, palette, bag, container, bin, package, coil, bundle, bottle or tank.
  • Product types could be coded by for example: Ammonium Nitrate based product types that are bagged, boosters, cartridges, detonators, exploding cord, other explosives, products not having RFID tags on individual units, or military explosives.
  • the third section has free data space 1140.
  • the fourth section is for electronic signature 1144. An identification number of the user checking explosives out of the magazine, such as a shotfirer number 1148 can be placed here. Reading this data block of the RFID chip will reveal electronic proof of delivery of the explosive to an authorised user.
  • the order is dispatched to the mine site 1200.
  • the truck driver gets a paper delivery docket 1202 and a truck driver is provided with electronic data card 1204 containing information about the delivery.
  • This information includes each box's data 1206, if applicable information about each unit being delivered 1210 and electronic signature information 1212.
  • the box data 1206 is the information in the RFID chip attached to each box at the place of manufacture 1102.
  • Each unit of data 1210 containing information applied to the RFID chip in each unit is preferably recorded according to the RFID - ETC protocol.
  • Electronics signature information 1212 may contain an electronic identification number of the truck driver or an identification number of the user authorised to receive the explosives.
  • the authorised user uses 1300 a biometric reading to access the station 30 at the magazine 10. Taking a biometric reading identifies the user. The authorised user then takes the data card 1204 and sends the data directly into the station 30, at 1304. The authorised user then uses the handheld device 46 to scan each of the boxes at 1306.
  • the handheld device 46 (or scanning area 26) may be able to scan information, not only the pallet and/or box level, but at the individual unit level within the boxes. The scanned information is recorded by the station 30 against the identity of the user. In addition to the biometric scan, access to the station might also require entry of an access code/PIN 1308.
  • the time and date of access is recorded by the station 30 at 1310. Locations 20, 22, 24 of the delivered explosives within the magazine 10 are recorded by the station 30 at 1312.
  • Figure 10 shows a process 1400 of when the explosives are delivered back to the magazine.
  • the authorised user having accessed the station 30 by providing a biometric reading takes the portable device 46 at 1402 and scans each of the returned items. If the returned items do not have an RFID label attached to them, one is attached as described above.
  • the hand held device 46 then transmits its data to the station 30.
  • the records 1404 are then entered into the storage device along with the identity of the authorised user.
  • the data includes records 1406, background data 1416 and risk assessment data 1418.
  • the records 1406 include identification of all users that accessed the station 30 at 1408 including the time and date, movement data 1410, product data 1412 and access data 1414.
  • the movement data 1410 includes information about where the returned explosives came from.
  • the product data 1412 will include the number of units and the type of package along with information from the RFID label associated with the package, and possibly also information from each unit RFID label.
  • the access data 1414 includes the time and date, when the system was accessed, along with an identification of the personnel that accessed the system.
  • the background data 1416 includes goods that have been booked into or out of the station 30 since it was turned on, where the goods have come from or have gone too.
  • the risk assessment data 1418 includes records of each risk assessment, and if the risk assessed satisfies certain criteria, then an alarm or "red flag" is raised.
  • a new box is opened before an old box of units are booked out, or more product is booked back into the magazine than was booked out in a particular box, if access protocols are not followed, if a prohibited destination or source location is recorded, or if the net explosive quantity of the box/magazine/withdrawal is beyond a certain level.
  • Figure 11 shows a process where the station 30 is connected to a remote computer 1500.
  • Information from one or more stations can be sent to the remote computer for things such as stock inventory control 1502 or risk assessment reporting 1504.
  • Stock inventory control 1502 includes updates to stock management system 1504. This can be a delivered at a level of detail required, for example it can include more detail regarding reporting by blasthole 1506, including information on primer size, detonators and explosives down the hole.
  • Stock inventory control 1502 can also include information on explosives loaded 1508, such as by explosive type, and other information on the RFID chip 1510.
  • Examples of risk assessment reporting include: when the explosive volumes exceed set levels, when a box is missing a barcode, when a wrong barcode number is recorded, when a wrong location is entered, when stock is nearing its used by date, when out of date stock is checked in and out, or when a net explosives quantity exceeds a set level.
  • Figure 12 shows a process of sending records from the station 1600.
  • an access code is required 1602.
  • Records are divided into incoming records 1604 and outgoing records 1606.
  • the incoming records 1604 are divided into locations 1608, the magazine section to which the explosives are going 1610 and details of returned explosives 1612.
  • Locations record 1608 is divided into information about where the explosives came from, such as they came from an underground location or an open pit and related details, the supplier, and other information such as a transfer.
  • the magazine section 1610 may be divided into a high explosive section 20, an ignition explosive section 22, a working magazine 24 or other sections.
  • Returns data at 1612 will include details about the returned explosive.
  • the outgoing records 1606 include information about locations to which the explosive are sent such as an underground mine or open pit site along with related information, information about supplier, if the explosives being returned to the supplier, or other information for example related to trials or transfers.
  • Figure 13 shows information relating to reporting.
  • Reporting can be used for data management 1700 or to allow monitoring and tracking of possible issues or opportunities 1702.
  • Reporting can include forecasting 1704 by various options, reporting can be automatically generated 1706 by various criteria, risk assessment reporting 1708, or by information from RFID labels 1710.
  • Figure 14 shows an example of statutory reporting 1800, which includes generation of electronic records 1802, government and internal requirements, and standard written reports on a periodic basis 1804. This can reduce the workload required complying with statutory reports. Some reports can be automatically generated. They can be generated in a secure electronic format. Generation of the reports can therefore be a simple exercise.
  • access control records of the station can be used to identify personnel using the magazines 1900, identify the time personnel access the magazine 1902, and to assess the amount of time a magazine is accessed 1904.
  • Figure 16 shows use of the system or other support functions such as procurement support 1950.
  • Procurement support can be used to direct stock movement/transactions 1952, provide reporting to an explosive supplier 1954 or two find special products that may be available on other sites,
  • the present invention can reduce the time taken to check in or out dangerous goods from a repository, it can reduce mistakes and can provide increased accountability, tracking and risk management.

Abstract

A dangerous goods repository checking system comprises a user identifier device for identifying a user accessing a repository, arranged to output user data indicative of an identity of said user; a dangerous goods identifier device for identifying dangerous goods checked into or out of the repository, arranged to output goods data indicative of an identity of said dangerous goods; and a data storage configured to receive and record the user data and the goods data when the identified user checks the dangerous goods into or out of the repository.

Description

DANGEROUS GOODS REPOSITORY CHECKING SYSTEM AND METHOD
Field of the Invention
The present invention relates to a system and method for checking dangerous goods into and out of a dangerous goods repository.
Background
It is important to account for the movement of dangerous goods. Dangerous goods are often stored in a repository, such as a depot, typically at or near a location at which they are used. They may arrive from the manufacturer, be checked in and, when desired for use, checked out. Current systems are prone to error.
For example, a mine site will often have a repository, referred to as a magazine, for storing explosives and other related dangerous goods. It is known for explosives to go missing and for tracking records to be inaccurate or incomplete, generally through mistakes but sometimes owing to inappropriate or criminal activities.
Summary of the Present Invention
According to an aspect of the present invention there is provided a dangerous goods repository checking system comprising: a user identifier device for identifying a user accessing a repository, arranged to output user data indicative of an identity of said user; a dangerous goods identifier device for identifying dangerous goods checked into or out of the repository, arranged to output goods data indicative of an identity of said dangerous goods; and a data storage configured to receive and record the user data and the goods data when the identified user checks the dangerous goods into or out of the repository.
In an embodiment the storage is mounted to the dangerous goods. Alternatively the storage is located at the repository. Alternatively the storage is located remotely from the repository.
In an embodiment when the storage is mounted to the dangerous goods, the system comprises a second storage located at the repository, the second storage being configured to record an association between the data indicative of the identified user and the data indicative of the identified dangerous goods. In an embodiment the system comprises a third storage located remotely from the repository, the third storage being configured to record an association between the data indicative of the identified user and the data indicative of the identified dangerous goods.
In an embodiment the user data is recorded in association with the goods data.
In an embodiment the user identifier device is arranged to identify a subsequent user accessing the repository and output subsequent user data indicative of an identity of said subsequent user; the dangerous goods identifier device is arranged to identify dangerous goods subsequently checked into or out of the repository and output subsequent goods data indicative of an identity of said dangerous goods subsequently checked into or out of the repository; the data storage is configured to receive and record the subsequent user in association with the subsequent goods data.
In an embodiment the user identifier device is arranged to identify a subsequent user accessing the repository and output subsequent user data indicative of an identity of said subsequent user; the dangerous goods identifier device is arranged to identify dangerous goods subsequently checked into or out of the repository and output subsequent goods data indicative of an identity of said dangerous goods subsequently checked into or out of the repository; and the system further comprises a further data storage configured to receive and record the subsequent user data and subsequent goods data.
In an embodiment the storage is configured to receive one or more data indicative of, and record one or more of, the following in association with the identified dangerous goods: the quantity of dangerous goods checked in or out; the type of dangerous goods checked in or out; the time and date of checking in or out; and information related to the checking in or out.
In an embodiment the quantity is a number of discrete units of dangerous goods, a number of packages of dangerous goods, a volume of dangerous goods or a weight of dangerous goods.
In an embodiment the information related to checking in is the source of the dangerous goods and the reason for checking in.
In an embodiment the repository is mobile, and the information related to checking in is the intended destination of the repository.
In an embodiment the information related to checking out is the destination and intended use of the dangerous goods or reason for checking out.
In an embodiment the storage is configured, to record a representation of the geographic location of one or more of: the user identifier when the user identifier identifies the user; the dangerous goods identifier when the dangerous goods identifier identifies the dangerous goods; and the repository when the dangerous goods are checked in or out. In an embodiment the geographic location is obtained from a global positioning satellite receiver.
In an embodiment the system further comprises a report generator for reporting on each recorded association between the identified user and the identified dangerous goods.
In an embodiment the system further comprises a risk analyser for determining a risk associated with the identified user checking dangerous goods into or out of the repository.
In an embodiment the risk analyser is configured to determine the risk by determining a likelihood of an adverse occurrence happening and the severity of the consequence of the adverse occurrence happening.
In an embodiment the risk analyser is configured such that certain possible occurrences have their risk predetermined.
In an embodiment the system further comprises an alert generator for raising an alert when the determined risk meets one or more criteria.
In an embodiment the system further comprises a station located at or near the repository, or at or near a point of entry to or exit from the repository. In an embodiment the station comprises the second storage.
In an embodiment the storage is configured to record a representation of the geographic location of the station when the dangerous goods are checked in or out of the repository.
In an embodiment the user identifier comprises an input device for receiving a user code and a comparator for comparing the user code with a code associated with a known user identity. In an embodiment the user identifier comprises a biometric reader. In an embodiment the user data is a biometric reading from the biometric reader. In an embodiment the user data is a representation of a known user identity that matches a associated stored reference biometric to a read biometric from the biometric reader.
In an embodiment the dangerous goods identifier comprises a label reader connected with the station for reading a label on the dangerous goods.
In an embodiment the label reader comprises a RFID chip reader.
In an embodiment the station comprises a label output device, preferably capable of writing to an RFID chip in the label.
In an embodiment the dangerous goods identifier is in the form of a portable device arranged to communicate with the station.
In an embodiment the dangerous goods identifier is an electronic label on the dangerous goods.
In an embodiment the system further comprises an identifier writer for writing information to an identification item associated with the checked dangerous goods.
In an embodiment the system is configured to record the identified user on an identification item associated with the dangerous goods.
In an embodiment the identification item comprises information on the nature, type, and number of goods at package or unit level. - S -
In an embodiment the identifier writer is configured to record an identification of the repository on the identification item.
In an embodiment the storage is arranged to record an inventory of dangerous goods held at the repository, which is updated as dangerous goods are checked in and out.
In an embodiment the report generator is arranged to output a report on the inventory.
In an embodiment the report generator is arranged to output a report on the occurrence of determined risks of dangerous goods checked into or out of the repository.
In an embodiment the storage is arranged to store an expiry date in association with each one of the identified dangerous goods.
In an embodiment the storage is arranged to store a first type of expiry date for a closed dangerous goods package and a second type of expiry date for units of dangerous goods from an opened dangerous goods package.
In an embodiment the station is configured to use the second type of expiry date instead of the first type of expiry date from when the package is opened.
In an embodiment the system further comprises an expiry date tracker for flagging when a dangerous goods package or unit has reached its expiry date.
In an embodiment the expiry date tracker is configured to calculate the expiry date of units of dangerous goods from an opened dangerous goods package. In an embodiment the system is configured to send recorded information to a remote computer. In an embodiment the remote computer comprises the third storage.
In an embodiment the dangerous goods are explosives, explosives pre-cursor materials, or explosives related goods.
In an embodiment the repository is an explosives magazine.
In an embodiment the dangerous goods are industrial chemicals.
According to another aspect of the present invention there is provided a dangerous goods repository checking system comprising: a user identifier device for identifying a user accessing a repository, arranged to output user data indicative of an identity of said user; and a data storage mounted to the dangerous goods and configured to receive and record the user data when the identified user checks the dangerous goods into or out of the repository.
In an embodiment the system further comprise a dangerous goods identifier device mounted to the dangerous goods for identifying dangerous goods checked into or out of the repository, the dangerous goods identifier device arranged to output goods data indicative of an identity of said dangerous goods; and the data storage is arranged to output user data indicative of an identity of user who checked the dangerous goods into or out of the repository.
Also according to the present invention there is provided a method of checking dangerous goods into or out of a repository, the method comprising: identifying a user accessing a repository with a user identifying device; identifying dangerous goods checked into or out of the repository with a dangerous goods identifying device; and recording in a data storage user data indicative of an identity of said user and goods data indicative of an identity of said dangerous goods when the identified user checks the dangerous goods into or out of the repository.
In an embodiment the method further comprises recording the data indicative of the identified user in association with the data indicative of the identified dangerous goods in a remotely located second storage.
Also according to the present invention there is provided a method of checking dangerous goods into or out of a repository, the method comprising: identifying a user accessing a repository; identifying dangerous goods being checked into or out of the repository; recording the identified user in association with the identified dangerous goods on a storage device located with the dangerous goods when the identified user checks dangerous goods into or out of the repository.
In an embodiment the method comprises identifying the repository and recording an association between the identified dangerous goods and the identified repository.
In an embodiment the method comprises identifying the location of the repository when the dangerous goods are checked into or out of the repository and recording an association between the identified location and the identified dangerous goods. In an embodiment the association is automatically recorded electronically in a storage device of a station at the repository.
In an embodiment identifying the user is a prerequisite before granting access to the repository.
In an embodiment the identifying the dangerous goods is conducted by electronic scanning of a label attached to the dangerous goods. In an embodiment one or more of the following is also recorded: the quantity of dangerous goods checked in or out; the type of dangerous goods checked in or out; the time and date of checking; and information related to the checking in or out.
In an embodiment the information related to checking in is the source of the dangerous goods and the reason for checking in.
In an embodiment the information related to the checking out is the destination and intended use of the dangerous goods or reason for checking out.
In an embodiment the identified user and the identified dangerous goods are also recorded as associated with a representation of the geographic location of one or more of: the user when they are identified; the dangerous goods when they are identified; and the repository when the dangerous goods are checked in or out.
In an embodiment the method further comprises determining the risk associated with the identified user checking dangerous goods into or out of the repository.
In an embodiment the user is identified by a biometric reading.
In an embodiment the dangerous goods are identified by reading an RFID chip associated with the dangerous goods.
In an embodiment the method further comprises attaching the RFID chip to the dangerous goods at the time of checking in or out of the repository. In an embodiment the identified user is recoded on an identification label associated with the dangerous goods. Preferably the identification is in the form of encoded data.
In an embodiment assess to the repository is restricted and the method further comprises comparing the user's identification with a list of authorised users, wherein access to the repository is granted only when the identification of the user is on the list of authorised users.
In an embodiment the method further comprises recording an identification of the repository in association with the dangerous goods.
In an embodiment the information is recoded when the dangerous goods are received at the repository.
In an embodiment the information is recoded when the dangerous goods are removed from the repository.
According to another aspect of the present invention there is provided a method of checking dangerous goods into or out of a repository, the method system comprising: identifying a user accessing a repository; and recording user data indicative of an identity of said user in a data storage mounted to the dangerous goods when the identified user checks the dangerous goods into or out of the repository.
Also according to the present invention there is provided a computer program for controlling a processor to perform a method of checking dangerous goods into or out of a repository, the method comprising: identifying a user accessing a repository with a user identifying device; identifying dangerous goods checked into or out of the repository with a dangerous goods identifying device; and recording in a data storage user data indicative of an identity of said user and goods data indicative of an identity of said dangerous goods when the identified user checks the dangerous goods into or out of the repository.
The present invention also provides a method of determining when to deliver dangerous goods to a repository, the method comprising: maintaining an inventory of dangerous goods stored at a repository; identifying a user accessing a repository to check dangerous goods in or out of the repository; identifying dangerous goods checking into or out of the repository; updating the inventory as dangerous goods are checked into and out of the repository, where the inventory has a representation of the identity of the user that checks goods in or out recorded; initiating the delivery of dangerous goods to the repository when the amount of the dangerous goods recorded in the inventory drops below a threshold.
Also according to the present invention there is a system for determining when to deliver dangerous goods to a repository, the system comprising: a processor for maintaining an inventory of dangerous goods stored at a repository in a storage device, the processor is configured to update the inventory as dangerous goods are checked into and out of the repository, and record in the storage device a representation of an identity of the user that checks goods in or out; a user identifier for identifying a user accessing a repository to check dangerous goods in or out of the repository; a goods identifier for identifying dangerous goods checking into or out of the repository; and an order generator for initiating the delivery of dangerous goods to the repository when the amount of the dangerous goods recorded in the inventory drops below a threshold. The present invention further provides a method of sending data over a communications medium, the method comprising: identifying a user accessing a repository in which dangerous goods are stored; identifying dangerous goods checked into or out of the repository by the identified user; sending a representation of the identified user and a representation of the identified dangerous goods as data over the communications medium.
Also according to the present invention there is a system for sending data over a communications medium, the system comprising: a user identifier for identifying a user accessing a repository in which dangerous goods are stored; a goods identifier for identifying dangerous goods checked into or out of the repository by the identified user; a transmitter for sending a representation of the identified user and a representation of the identified dangerous goods as data over the communications medium.
Also according to the present invention there is a method of handling bulk material, the method comprising: measuring the quality of material in a container for holding bulk material; reading an identification of the container from an identifier device located with the container; and storing the identification in association with the measured quantity of material in the container at a particular time.
In an embodiment the method further comprises detecting whether an opening to the container has been accessed prior to transferring material into or out of the container. In an embodiment the method further comprises applying a stopper to the opening, such that the stopper must be removed or opened before material can be transferred into or out of the container, identifying the stopper and recording the identity of the stopper.
In an embodiment the method further comprises reading the identity of the stopper at a later time when material is to be transferred to or from the container, and comparing the read identity to the recorded identity.
In an embodiment measuring the quantity of material in the container comprises weighing the container before and after material is transferred into or out of the container.
In an embodiment measuring the quantity of material in the container comprises weighing another container to which at least a portion of the material is transferred to or from before and after material is transferred into or out of the other container.
In an embodiment the particular time is either prior to or after transfer of material into or out of the container.
Also according to the present invention there is a material handling facility comprising: a container for holding bulk material; a quantity measuring device for measuring the quality of material in the container; an identifier device located with the container for providing an identification of the container; and a recording system for storing the identification in association with a measured quantity of material in the container at a particular time. In an embodiment the facility further comprises a reader for reading the provided identification of the container and for providing the identification to the recording system.
In an embodiment the facility further comprises an access detector for detecting access of an opening of the container.
In an embodiment the facility further comprises a stopper to the opening arranged so that the stopper must be removed or opened before material can be transferred into or out of the container.
In an embodiment the facility further comprises an identifier of the stopper and a recorder of an identity of the stopper.
In an embodiment the facility further comprises a reader for reading the identity of the stopper prior to when material is to be transferred to or from the container and a comparator for comparing the read identity to the recorded identity.
In an embodiment the stopper comprises a closure or a valve.
In an embodiment the opening comprises an outlet chute, pipe, hose or transfer medium from the container.
Also according to the present invention there is a monitoring system comprising: an input for receiving a measurement of the quality of material in the container; an input for receiving identification of the container from an identifier located with the container; and a storage device for storing the container identification in association with the measured quantity of material in the container at a particular time. In an embodiment the system further comprises an input of a signal indicative of whether an opening to the container has been accessed prior to transferring material into or out of the container.
In an embodiment the system further comprises an input of an identification of a stopper which is applied to the opening, such that the stopper must be removed or opened before material can be transferred into or out of the container and a comparator for comparing the input of the stopper identification at two different times, where in the event that the input stopper identification is different a signal is produced that is indicative of the opening to the container having been accessed prior to transfer of material to or from the container.
In an embodiment the system further comprises an output of a signal indicative of the stored container identification and the associated measured quantity.
Brief Description of Drawings
In order to provide a better understanding of the present invention, embodiments will be described, by way of example only, with reference to the accompanying drawings, in which:
Figure 1 is a schematic representation of a repository of an embodiment of the present invention;
Figure 1A is a schematic plan view representation of an alternative repository of an embodiment of the present invention; Figure 1 B is a schematic view of representation of a bulk goods handling repository of an embodiment of the present invention;
Figure 2 is a schematic representation of a station at the repository of Figure 1 ; Figure 3 is a flow chart showing a method of checking dangerous goods into the repository of Figure 1 according to an embodiment of the present invention; Figure 4 is a flow chart showing a method of checking dangerous goods out of the repository of Figure 1 according to an embodiment of the present invention; Figure 5 is a flow chart showing a method of checking dangerous goods back into the repository of Figure 1 according to an embodiment of the present invention;
Figure 6 is a diagrammatic representation of a process of placing orders for dangerous goods, according to an embodiment of the present invention;
Figure 7 is a diagrammatic representation of a process of applying an identifier to a package of dangerous goods, according to an embodiment of the present invention;
Figure 8 is a diagrammatic representation of a process of dispatching an order for dangerous goods, according to embodiment the present invention;
Figure 9 is a diagrammatic representation of a process of receiving a delivery of dangerous goods at a repository, according to an embodiment the present invention;
Figure 10 is a diagrammatic representation of a process of checking in of dangerous goods to a repository, according to an embodiment of present invention;
Figure 11 is a diagrammatic representation of a process of sending of information to a computer according to an embodiment the present invention;
Figure 12 is a diagrammatic representation of a process for obtaining records of goods checked in to and out of a repository, according to an embodiment the present invention;
Figure 13 is a diagrammatic representation of a process for reporting checking of dangerous goods in to and out of a repository, according to an embodiment of present invention; Figure 14 is a diagrammatic representation of a process of statutory reporting in relation to dangerous goods, according to an embodiment of present invention;
Figure 15 is a diagrammatic representation of a process of granting access control to a repository of dangerous goods according to an embodiment of the present invention; and Figure 16 is a diagrammatic representation of a process for the procurement support according to an embodiment of the present invention. Detailed Description of Embodiments
Referring to Figure 1 there is shown an embodiment of a repository 10 for storing dangerous goods located at, for example, a mine site. The repository 10 in this embodiment is a magazine for storing explosives and related goods at locations 20, 22 and 24 in the repository 10 for use on the mine site. The dangerous goods may also be other energetic substances or deflagrable substances such as propellants and pyrotechnics. It will be appreciated that the repository may be at other locations, such as an industrial estate, research facility, plant, underground facility, in the ocean etc and that the repository could store other types of dangerous goods. The repository may also be mobile, such as a bin or container, on a truck, railcar, ship or airplane. Examples of other dangerous goods stored on a mine site or industrial estate include packages, containers, bottles or tanks of corrosive chemicals, such as acids and caustic chemicals; highly reactive, toxic or other industrial chemicals, such as oxidising agents or sodium cyanide; flammable chemicals, fuels and solvents; or bottles of compressed gas.
Still other dangerous goods include packages, containers, bottles or tanks of radioactive goods, biological agents, infectious substances or munitions.
In this example the repository 10 is a fenced area defined by fence 12 or preferably secured in some other way, such as being in a secure room or building. The repository 10 has a lockable gate 14 or other entry/exit, such as a lockable door. Adjacent the gate 14 is a station 30. The station 30 is arranged to identify a user accessing the repository 10 and to identify dangerous goods being checking into or out of the repository 10. The station 30 also records an association between the identified user and the identified dangerous goods when the identified user checks dangerous goods into or out of the repository 10. When the repository is mobile the station 30 may be carried by a vehicle for transporting the repository. The station 30 may be configured to unlock the gate 14 for authorised personnel. Alternatively electronic unlocking of the gate 14 may active the station 30. The gate 14 may be electronically unlocked by receiving a biometric reading of a person identified as being authorised to access the repository.
As shown in Figure 1A, the repository 10' may be widely dispersed with one or more locations 20 and 22 for storing dangerous goods. Typically different types of dangerous goods are stored in the repository 10/10' at these separate locations. In this case High Explosives (HE) are at location 20 and Initiating Explosives (IE) are at location 22. The gate 14 may be located some distance from the location (for example a number of or a large number of kilometres). In this case a road 18 allows a truck 28 to travel between the locations 20 and 22 and the gate 14. In alternative embodiments the station 30 may be replaced with stations 30', and 30" near locations 20 and 22, respectively. In a further embodiment, stations 30, 30' and 30" may all be employed.
In an embodiment, as shown in Figure 1 B, one of the locations comprises a facility in the repository 10' for storing bulk goods, such as for example, ammonium nitrate, an emulsion or Diesel fuel. These components are used to make the high explosive ANFO, commonly used on mine sites. The facility 21 comprises a container 400 for holding the bulk goods. In this example the bulk good is prill form ammonium nitrate 402. The container 400 is a silo-type container, which funnels into a feed chute 406. The feed chute 406 has a valve 408 or some other stopper, such as a closure, for controlling the egress of material 402 from the container 400. In an embodiment the container 400 is mounted on a weigh stand 410, which allows the container 400 and its contents to be weighed. As the amount of material in the container 400 varies, its weight will vary. By measuring variations in the weight the quantity of the material within the container 400 can be determined. If the container 400 is holding a liquid, an outlet pipe would be provided instead of the chute 406. The container 400 may take other forms. Material that is to be transferred into the container 400 may be tipped through a top opening in the container 400 from a raised tilting tray or dropped from a conveyor, or it may be pumped in when it is liquid. Other suitable means of transferring the material into the container 400 may be employed.
The weight of the container 400 including the material in it can be determined both before and after material is transferred into the container, as well as before and after the material is transferred out of the container 400. This allows the quantity of material to be transferred into and out of the container 400 to be determined. Other methods of determining the quantity of material can be used, such as, by use of a flow meter.
Often the material is transferred into a vehicle such as truck 28 or mobile manufacturing unit for transfer to a blast site. The truck 28 has a container 404 which receives the material via the chute 406 or pipe. The truck 28 is parked at a weigh station of the facility 21 , which comprises a weigh bed 412. The truck can be weighed before and after the material is transferred to or from the container 400. Thus, the amount of material transferred to or from the truck container 404 can be determined according to the difference in weights.
The container 400 has an identifying component of identifier 420 attached to it. in an embodiment the truck 28 also has an identifier 424 attached to it and the valve 408 or other stopper has an identifier 422 attached to it. The identifiers 420, 422 and 424 are preferably Radio Frequency Identification (RFID) labels as described below, but for example they may be barcodes. A reader, such as the portable device described below, is able to read an identification representing an identity of the container 400, container 404 or the stopper/valve 408 from the identifier 420, 424 or 422, respectively. Adjacent to the container 400 is the station 30'. Furthermore, in an embodiment the truck 28 has another station 30'", that is mounted to and travels with the truck 28. The weigh stand 410 and/or the weigh bed 412 may be arranged to transfer readings of the weight of the container 400 or the truck 28 to the station 30'. By reading the identification of the container 400 at a particular time and by measuring the amount of material in the container 400 or the amount transferred to or from the container 400 movement of the material can be tracked as described further below.
The identifier 422 may be configured to act as a detector of whether or not the valve 408 is opened or stopper removed, such that in order to activate the valve 408 or remove the stopper the identifier must be removed or destroyed. Therefore, prior to activation of the valve 408 the identifier would be read. The valve would then be activated, and then when it is deactivated a new identifier is installed. The identification of the new identifier is stored. Sometime later, when the valve 408 is to be activated again, the identification of the new identifier can be read and checked against the stored identifier. Alternatively, measurements of the quantity of material in the container or transfered from the container can serve the purpose of determining whether any material has been removed from the container in an unauthorized or inappropriate manner. The facility 21 for handling bulk material can be used to handle bulk material (other than dangerous goods), for example the facility can be useful for tracking valuable bulk material.
Referring to Figure 2, an embodiment of the station 30 is shown in more detail. The station 30 comprises a processor and a storage device. Typically the processor and storage device form part of a computer 32 of the station 30. The computer 32 also comprises a memory, I/O and display driver. The storage device is typically in the form of a hard disk drive. In an embodiment the computer 32 is connected to an external solid state storage device (SSSD) 34, such as flash RAM. The station 30 further comprises a display 36, such as a CRT, LCD, or plasma display, connected to the display driver. In an embodiment the display 36 has a touch screen input 38 connected to the I/O. The station 30 may also include a keyboard 40 and/or a mouse 42 connected to the I/O. The station 30 further comprises a connector 44 to a portable device 46 or a transponder of a scanning zone 26 of the repository 10. The connector 44 connects the portable device 46 to the I/O. The connector 44 may be a docking port (as shown) or a wireless interface, such as a Bluetooth ™ interface, an 802.11x interface or an infrared interface. The portable device 46 may be a PDA which is able to read an identifying component tag/label 48 associated with an item of dangerous goods. Typically the label 48 will be stuck to the item by an adhesive. Alternatively an identifying component may be embedded in the item. The item may be an individual unit or package of units. The unit may be for example a detonator, initiator, fuse, explosive compound, booster etc., a container of a solid or liquid, a tank or bottle of liquid or gas. The package may be for example a box or pallet. When the unit is a container the quantity of solid or liquid therein is typically known. The quantity may be measured by weight or volume, for example as described above in relation to the bulk material handling facility 21..
The label 48 or identifying component may comprise a barcode or a RFID chip or some other form of identification. The portable device 46 is able to read the barcode and/or read data from the RFID chip and/or other identification. Preferably the portable device 46 is also able to write data to the RFID chip. In addition or instead, if a scanning zone 26 is implemented, the transponder of the scanning zone 26 is able to communicate with one or more of the RFID chips inside the scanning zone 26.
The station 30 further comprises a label output device 50 and a printer 52 connected to the I/O. The label output device 50 is capable of producing a label 48 and writing to an RFID chip in the label 48 and/or printing information in the label 48, such as a barcode. The station 30 comprises a cabinet housing 54, in which are housed the computer 32 and SSSD 34 in a first lockable section 56, the label output device 50 and the printer 52 in a second lockable section 58, and the display 38, keyboard 40, mouse 42 and docking port 44 in a third lockable section 60. It is preferred that the SSSD 34 is hidden from view and difficult to access. In an embodiment the station 30 further comprises a biometric reader connected to the I/O. The biometric reader may be located on the PDA 46, the keyboard 40, on the housing 54 or else where on the station 30 or in proximity to the station 30 (for example on or near the gate 14). The biometric reader can be used to identify authorised personnel for unlocking the gate 14.
In an embodiment the station 30, the repository 10, or preferably the portable device 46 has a geographic location determining device, such as a Global Positioning Satellite (GPS) receiver installed. The GPS receiver receives positioning information to enable the latitude and longitude (lat. and long.) of the GPS receiver to be determined. Other forms of location determining device may be employed. The GPS receiver is interfaced to the computer 32, (preferably via the portable device 46) such that the lat. and long, are recorded in the storage of the computer 32. Thus depending on the implementation one or more of the geographic location of the following is recorded: the user when the biometric reader identifies the user; the dangerous good when they are identified; the station when the dangerous goods are checked in or out; or the repository when the dangerous goods are checked in or out.
The processor is controlled by logic in the form of at least one computer program installed on the computer 32. Typically the computer program is stored on the hard disk drive and loaded into memory (such as RAM) when activated. It is preferred that the computer program automatically activate when the computer 32 is powered on. Typically this in implemented by setting an operating system of the computer 32 to automatically run the computer program on start up. The station 30 may also have a power management system for sequentially powering up devices when the station 30 is activated. For example upon opening of the third lockable section 60, the computer may be powered up first, followed by the display 36, then the printer 52 and the label output device 50. The power management system may also control the powering down sequence (for example in reverse order to the power up sequence).
The processor, under the instruction of the computer program, interfaces to and controls the storage devices, display 36 via the display controller, connector 44, label output device 50 and the printer 52 via the I/O and receives input from the touch screen input 38, keyboard 40, mouse 42, connector 44 and biometric reader via the I/O.
In one embodiment the computer program controls the processor to output to the display 36 a request to receive an identifier of an authorised user. The output may be displayed on a display 62 of the portable device 46. Such an output might be for example, "please enter identification number", or "please scan your thumb over the thumb scanner". The computer program controls the processor to receive an input so as to identify a user accessing the repository 10. This may be for example by receiving entry of an identification number/name/password on the touch screen/keyboard or a biometric scan, such as for example a thumb print scan. Other biometric readings can be used. In addition or instead a security token may be used to verify/identify the user. The security token may produce a code or may display a code which is transmitted to/entered into the station 30. Entry of a special number/name/password can trigger a duress alarm.
In one embodiment the computer program controls the processor to output to the display 36 and/or 62 a request for an identifier of dangerous goods being checking into or out of the repository 10. Such an output might be for example "please scan package" or "please scan the container". The computer program controls the processor to receive an identification of the dangerous goods being checking into or out of the repository 10. This may be for example by entry of an identification code in to the touch screen 38 or keyboard 40. Preferably the entry is via the portable device 46 reads the label 48. Reading the label 48 may involve scanning a barcode on the label or preferably reading a RFID chip in the label 48 attached to the goods.
As an alternative to using the handheld device 46, simply moving the dangerous goods through the scanning zone 26, which has a suitable transponder may be sufficient for all of the of RFID labels 48 moving through the scanning zone 26 to be read and/or written to.
Once the identifier of the authorised user and the identifier of the dangerous goods is received, the computer program controls the processor to record in one or more of the storage devices an association between the identified user and the identified dangerous goods.
In an embodiment the computer program then controls the processor to output to the display 36 and/or 62 a message indicating that the dangerous goods can now be checked into or out of the repository 10. In an embodiment the computer program is configured at this stage to unlock the gate 14 and allow the dangerous goods in or out of the repository 10. in the case of the goods being a container 404 of bulk material, the material may be transferred to the container 400 or the container may be cleared to leave the facility 21.
In an embodiment the computer program also controls the processor to record in the storage the quantity of dangerous goods checked in or out; the type of dangerous goods checked in or out; the time and date of checking; and other information related to the checking in or out. The other information related to checking in may be for example the source of the dangerous goods, the reason for checking in, the destination of the repository in the event that it is mobile (that is, for example, the container 404 may be considered a repository), or the destination and intended use of the dangerous goods or reason for checking out and location information. In an embodiment the computer program is configured to write a representation of the identity of the authorised user to the RFID chip of the label 48/424.
In an embodiment the computer program is configured to record the location of the user when the biometric reader identifies the user. This enables the station 30 to log the location of the user to verify correct use of the system. Alternatively the computer program is configured to record the location of the dangerous goods when the portable device identifies the dangerous goods. This enables the station 30 to log the location of the goods to verify correct use of the system. In some implementations the recorded location can be used to verify the identity of the goods or to verify that the identified goods are placed in the correct location 20, 22, 24 in the repository 10. Further alternatives are to record the location of the station 30 or the repository 10 when the dangerous goods are checked in or out. This allows for movement of the station 30 or the repository 10.
In an embodiment the station 30 also comprises a communicator for communicating with a remote computer. In an embodiment the computer program controls the processor to send the recorded information to the remote computer. The transmitted information is encoded in data and may be encrypted. The remote computer may be running an accounting/stock management system, such as marketed under the trade marks Pronto or SAP. The remote computer may run a database which has the recorded information added or may be operated by a government agency, such as for example the Australian Bomb Data Centre. Station 30 can also received data from or send data to a tracking database of the remote computer to check that the amount, type and location of explosives removed match what was used. Such a database/tracking system may be as described in International patent publication number WO2008074071 , which is incorporated herein by reference.
In an embodiment the computer program controls the processor to compile and output a report on the each recorded association between each identified user and the identified dangerous goods, along with other recorded information. The remote computer may also generate such a report. The report can be printed on the printer 52 or the compiled report can be communicated to the remote computer. The report can be generated automatically or upon request. 5 Automatic reports can be generated periodically or when certain conditions are met. Example reports are:
Net Explosives Quantity (NEQ) within the magazine;
Volume of product by unit type;
Explosives movement into and out of the magazine; o Stock returns;
Out of hours access;
Amount of explosives used and type;
Trial and/or damaged products;
Transfers; 5 Delivery times;
Shift, daily, weekly monthly, quarterly and year; and
Risk alerts /red flags generated by whom, when, why;
Date of Manufacture (DOM) of products by type;
Movement of explosives to what location and form what location; and o Stock out reports.
In an embodiment the computer program controls the processor to operate as a risk analyser for determining the risk associated with the identified user checking dangerous goods into or out of the repository. Other information may5 be taken into account when assessing the risk. The risk analyser assesses the risk by determining a likelihood of an adverse occurrence happening as the result of an instance of checking in/out and the severity of the consequence if the adverse occurrence were to happen. Alternatively, or in addition, instances with certain details have the level of risk predetermined. When the determined o risk meets one or more criteria an alert is raised. Typically those possible adverse occurrences which have a high to certain likelihood and moderate to catastrophic consequences trigger an alert. For example alerts can be generated if one or more of the following occurs:
Scanning more explosives out of a box than it can hold;
Scanning the same box or units twice; Scanning boxes or units back in that have not being booked out;
Old stock in a magazine not being removed;
Moving product to a non approved location; and
Exceeding the magazine NEQ limits.
Different priority of alerts can be generated. For example three colour flags can be generated with an alert, depending of the levels set
Red flag - (major) have the highest alert level and require immediate action and would be reportable directly to Senior Site Management including Safety/Security management; Orange flag - (moderate) is just under high and require immediate action by Safety/Security management; and
Yellow flag - (minor) this would require the reporting to Safety/Security management.
Referring to Figure 3, a method 100 of checking in of dangerous goods to the repository according to an embodiment of the present invention is shown. The method in this embodiment is applied to a situation where the dangerous goods are explosives for use on a mine site, and the repository 10 is a magazine located at the mine site. The method 100 comprises placing an order 102 for certain explosives, such as for example detonators, from an explosives manufacturer. The explosives are delivered 104 to the magazine 10. An authorised user, such as a shotfirer takes possession of the explosives by the following process. The authorised user identifies themself 106 to the station 30. Typically, this will be by performing a biometric scan. In an embodiment performing the biometric scan activates the station 30. In another embodiment performing the biometric scan opens the gate 14. This identification may involve entry of a code/PIN instead of or in addition to the biometric scan. The delivered explosives will typically have an identification label 48 attached. Traditionally, this has been by attaching a barcode to the box of explosives. However, it is preferred that the box of explosives have an RFID chip in the label 48 attached to them. The box may have the RFID chip in the label when it arrives from the manufacturer. It is more preferred that each unit of explosives in the box be identified. This could be by a barcode, but is preferably with an RFID chip in a respective label attached to each unit.
If the box does not have a RFID label attached to it the label output device 50 can be used to generate a label 48 with the RFID chip, which can then be attached to the box. The label output device 50 can write data to the RFID chip in the label 48. The data written to the RFID chip will include a unique identifier and information about the contents of a box of explosives, such as the number of explosive units in the box, the type of explosive units in the box, the manufacturer and the date of manufacture. This information may be obtained from a barcode or other label on the box, which is entered into the station 30 either scanned or manually entered, or obtained from another data source, such as for example, by upload to the station 30 or from a flash RAM device that was produced by the manufacturer and was delivered with a box. This information is then output to the RFID chip in the label 48. This process 108 ensures that the goods/box has an identifier attached to it.
If the box already has an RFID label 48, it can be scanned and data sent 110 from the RFID chip to the portable device 46 and then to the station 30.
When all of the boxes are scanned the portable device 46 sends this data to the station 30 via the connector 44. For example when the portable device 46 is returned to the connector 44, in the form of a docking port, the scanned information is sent to the station 30. As an alternative the portable device 36 may be able to wirelessly transmit the data to the station 30. The station 30 now has an identification of the authorised user and an identification of the explosives delivered. This information is associated 112 and stored 114 in the storage device of the station 30. This information is also transmitted (exported) to an external computer. A delivery docket may be printed using printer 52.
In addition to scanning the identifier and other supplementary information on the RFID label of each box. At the time of scanning, the portable device 46 can also write the identification of the authorised user to the RFID chip. This provides an electronic proof of delivery (EPOD) 116 that is associated with the box.
Preferably a listing of those goods which were sent from the manufacturer is delivered with the explosives. This may be sent electronically to the station 30 over a computer network or maybe manually provided such as by loading it from a portable flash RAM device or similar.
The scanned data can be compared to the data provided with the delivered goods to verify that all the sent goods have arrived and are checked into the magazine. This and other safety assessments 118 can be performed and if the activity or situation gives rise to a risk that meets certain criteria, it will raise an alert 120. A printed report may be produced by the printer 52 and/or the alert can be recorded and/or the alert can be transmitted to another computer, such as the PC of a mine site supervisor/risk officer or to a head office computer for consideration by management.
If an alert is raised that is of sufficiently high priority this may prohibit the goods being deposited in the repository 10. Otherwise, if the alert raised is of a lesser nature or no alert is raised at all, then the goods may be placed in the repository 10 at 122.
Referring to Figure 4, a method 200 of checking dangerous goods out of the repository is shown. The method 200 comprises identifying 202 an authorised user attempting to check out the goods (explosives) from the repository 10 (magazine). The authorised user then uses the handheld device 46 to scan the explosives being removed. An identification of goods from a barcode or preferably from an RFID chip on a label 48 attached to the explosives is read 204 into the station 30. The authorised user enters 206 the details of the destination of goods and the reason for their removal. This may be for example a particular pit on the mine site in which blasting operation is scheduled to occur.
It is possible that the goods may not have an identification label attached, possibly because it is old stock or the label has become damaged or has been removed from the box. In this case, the goods have another RFID label prepared and attached 208 in a similar manner to the described above in relation to step 108. The identifier of the user may be recorded on the RFID chip of the box. The identifier of the explosives and the user's identifier are recorded by the station 30 at 210. These details are stored 212 in the storage device. The details may also be sent to a remote computer and/or a paper transfer document may be printed containing details of the explosives being checked out using printer 52.
A safety assessment is performed 214 to determine the extent of any risk associated with the removal activity by the authorised user. For example, the authorised user may be trying to remove more explosives than is allowed by one user or required for a particular blasting operation. If the action is of sufficient risk then an alert is raised 216. If no alert is raised or the risk is sufficiently small then the goods are allowed to be removed from the magazine at 218.
Referring to Figure 5, a method 300 of checking dangerous goods back into the magazine is shown. The method 300 comprises identifying 302 the authorised user attempting to check in returned explosives to the magazine. The authorised user uses the handheld device 46 to scan the label 48 attached to the explosives being returned. Identification of the goods may be from a barcode or preferably from a RFID chip on the label. The identifier is read 304 into the station 30. The authorised user enters 306 the details of the source of the goods and the reason for their return. For example, not all of the explosives may have been used in a particular blasting operation and these are being returned to the magazine.
It is possible that the goods may not have an identifier attached, possibly because the label has become damaged or loose units from an opened box are being returned. In this case, the goods have another RFID label prepared and attached 308 similar moment described above in relation to step 108. The identifier of the user may be recorded on the RFID chip attached to the goods. The identified explosives and the identifier of the user are recorded by the station at 310. These details are stored 312 in storage device. Delivery paperwork may be printed on printer 52.
A safety assessment is performed at 314 to determine whether there is any risk associated with the return activity by the authorised user. For example, the wrong type of explosive is being returned. If the action is of sufficient risk an alert is raised 216. If no alert is raised, or the risk is sufficiently small then the goods are allowed to be returned to the magazine 318.
The RFID chip may record an identification of the repository 10 when checked in or out.
The station 30 stores in the storage device an inventory of dangerous goods held at the repository 10, which is updated as dangerous goods are checked in and out. The inventory is updated by recording the identification of packages checked in or out. The inventory is updated by recording the identification of units in each package checked in or out. The inventory is also updated by recording the identification of unpackaged units checked in or out. As a result of analysing the stored information in the storage device or sent to external computer. Various reports can be prepared. A report can be prepared on the current inventory of the magazine, on what dangerous goods were checked into the repository and by whom, what dangerous goods were checked out of the repository and by whom, and what goods were returned to the repository and by whom. Reports can also be generated on any of activities that were assessed as being of sufficient risk to generate an alert or even those activities that were assessed of being some risk, but not sufficient risk to generate an alert.
The station 30 can be controlled to store an expiry date with each identified dangerous goods. The storage device can be arranged to store the expiry date of closed packaged dangerous goods and the expiry date of units of dangerous goods from an opened dangerous goods package. This can be relevant as the expiry date of an sealed box of explosives may be for example four years, whereas the expiry date of each unit of explosives inside the box may only be one year once the box is opened.
The station 30 can keep track of expiry dates and flag when a dangerous goods package or unit is approaching or has reached its expiry date. A report on when items in the magazine will expire can be produced. A report can be stored, printed and/or transmitted to another computer.
Tracking the inventory of goods within the magazine can also be useful for stock control. A manager of the magazine can determine when certain explosives are in need of the ordering. Furthermore, the ordering process can be automated such that when certain explosives reach a threshold, an automatic order can be generated for more. The inventory tracking can be conducted by the station, by an external computer which can keep track of the inventory of many magazines, or by a manufacturer to keep track when their stock requires replacement. Stock usage may be communicated to the distributor/manufacturer's computer which maintains records of delivery and stock levels relevant to the distributor and when stock level reaches a specified level the computer can automatically initiate an order for stock. Tracking of the stock physically present in the repository 30, and reading the EPOD identifier of who received the goods, is useful to match against the records in the station 30 and distributed externally for stocktake and audit purposes. This process can be conducted regularly or whenever desired, such as when an independent audit occurs.
The stock level can be determined according to a usage rate, lead time to manufacture and/or delay in delivery. The usage rate may be entered according to planed consumption of specified dangerous goods. Alternatively the usage rate is calculated based on typical historic usage rates.
If an explosive device is found outside of the mine site by relevant authorities, the RFID chip can be read to obtain its identification, and other information stored thereon. In addition the records of the station 30 or external computer consulted to determine who was last in control of the explosive and where it was from based on the identification of the explosive device. Further, if the identification of a user last in control of the explosive is written to the RFID chip, this information can be extracted directly from the explosive and questions asked as to how explosive left the control of that user.
The EPOD identification of a delivery person can be removed once the explosives are delivered to their approved magazine locations. If a shotfirer removes explosives to be used in the field his EPOD identification of the shotfirer will be placed on the label which will stay there until the explosives are consumed in a blast.
The computer program can control the station 30 to present to a user with drop down data menus which have for example: Pre set explosives types; Pre set or able to set a location for explosives movements Transfers, Open Pit
Pit, RL, bench, shot number etc, Underground
Development, Stoping, stripping, rise etc, Pre set explosives identifiers High Explosives, Initiating Explosives, Trial product etc.
When the relevant information is already available or can be referenced, automatic populating of data input fields can be implemented. For example:
When the RFID chip is scanned, the station can auto populate the data stored in the RFID chip;
The station can generate an ID number; The station can enter the data with all the management fields; Time / date, Magazine keeper name, Location,
Product type,
Unit / volume,
Reason for the tag being placed, lost, new, damaged,
Data read from the RFID chip.
The station can look up the checked explosive type, qualities and calculate NEQ, or if the NEQ is known the station can work out volume.
Misfired explosives can be identified later by reading the RFID chip attached and a report can be generated.
Example The following is an example of an embodiment of the present invention in which the dangerous goods are explosives and the repository is an explosives magazine.
Figure 6 shows a user placing an order at 1000 for new stock of dangerous goods. Typically the order is placed at the mine site at 1002. The order will typically contain information such as the date required 1004, the type and volume of explosives required 1006, an order number 1008, and the company or mine site 1010 making the order. The order is sent to the manufacturer typically electronically, and the manufacturer typically manufactures the ordered explosives along with orders made from other mine sites and companies in a batch.
Each explosive manufactured may have an identifying label attached to it for example, as described in patent application WO2006/128257, the contents of which are incorporated herein by reference.
Referring to Figure 7, preferably, the container/package/box of explosives will have a label attached 1102. It is preferred that the label include RFID chip.
Information stored on the RFID chip is preferably stored in a standard manner. More preferably, the information is stored on the RFID chip according to the inventor's "RFID - Explosives Tracking Code (ETC) protocol". The RFID - ETC protocol 1102 defines how sections of the data space in the RFID chip are used. The first section includes information about the RFID chip supplier 1104, this will include an 8 byte unique identification number (UID) 1106 as well as control and write access information. In the 17th to 20th bytes data corresponding to the letters "EXPL" are recorded 1108, which indicate that the RFID chip is attached to an explosives device. The second section includes information about the manufactured explosive 1110. This includes, for example, a number assigned under the United Nations system of codifying dangerous goods 1112, a country code which is assigned to the country manufacture 1114, a manufacturing plant number 1116 (which is, for example, assigned by a government agency), a product code or material number 1118, a batch number 1120, a serial number 1122, a net explosive quantity (NEQ) 1124, the number of units in the box 1126 (or 1 is the RFID chip is attached to a single unit), extra support data 1128 which can be used, for example, to convey other information from the manufacturer, and the unit identification number 1130. The unit identification 1130 can then be broken down into the date of manufacture 1132, a packaging type 1134, a product type that went into the packaging 1136, and a label/manufacturing identification number 1138. In this case the packaging type will be coded for 'box' as the explosives are in a box type of package. Other types of package could include unit, roll, palette, bag, container, bin, package, coil, bundle, bottle or tank. Product types could be coded by for example: Ammonium Nitrate based product types that are bagged, boosters, cartridges, detonators, exploding cord, other explosives, products not having RFID tags on individual units, or military explosives. The third section has free data space 1140. The fourth section is for electronic signature 1144. An identification number of the user checking explosives out of the magazine, such as a shotfirer number 1148 can be placed here. Reading this data block of the RFID chip will reveal electronic proof of delivery of the explosive to an authorised user.
When a box of explosives arrives at the magazine which does not already have individual units labelled with RFID chips the box will be labelled and the 'products not having RFID tags on individual units' field will be marked or indicated.
Referring to Figure 8, when completed, the order is dispatched to the mine site 1200. The truck driver gets a paper delivery docket 1202 and a truck driver is provided with electronic data card 1204 containing information about the delivery. This information includes each box's data 1206, if applicable information about each unit being delivered 1210 and electronic signature information 1212. The box data 1206 is the information in the RFID chip attached to each box at the place of manufacture 1102. Each unit of data 1210 containing information applied to the RFID chip in each unit is preferably recorded according to the RFID - ETC protocol. Electronics signature information 1212 may contain an electronic identification number of the truck driver or an identification number of the user authorised to receive the explosives.
Referring to Figure 9, when the explosives arrive from the manufacturer the authorised user uses 1300 a biometric reading to access the station 30 at the magazine 10. Taking a biometric reading identifies the user. The authorised user then takes the data card 1204 and sends the data directly into the station 30, at 1304. The authorised user then uses the handheld device 46 to scan each of the boxes at 1306. The handheld device 46 (or scanning area 26) may be able to scan information, not only the pallet and/or box level, but at the individual unit level within the boxes. The scanned information is recorded by the station 30 against the identity of the user. In addition to the biometric scan, access to the station might also require entry of an access code/PIN 1308. The time and date of access is recorded by the station 30 at 1310. Locations 20, 22, 24 of the delivered explosives within the magazine 10 are recorded by the station 30 at 1312.
Figure 10 shows a process 1400 of when the explosives are delivered back to the magazine. The authorised user having accessed the station 30 by providing a biometric reading takes the portable device 46 at 1402 and scans each of the returned items. If the returned items do not have an RFID label attached to them, one is attached as described above. The hand held device 46 then transmits its data to the station 30. The records 1404 are then entered into the storage device along with the identity of the authorised user. The data includes records 1406, background data 1416 and risk assessment data 1418. The records 1406 include identification of all users that accessed the station 30 at 1408 including the time and date, movement data 1410, product data 1412 and access data 1414. The movement data 1410 includes information about where the returned explosives came from. For example, they may have come from an underground mine site, open pit mine site, working magazines, from a supplier, may have been transferred from another company or may have been transferred from within the company. The product data 1412 will include the number of units and the type of package along with information from the RFID label associated with the package, and possibly also information from each unit RFID label. The access data 1414 includes the time and date, when the system was accessed, along with an identification of the personnel that accessed the system. The background data 1416 includes goods that have been booked into or out of the station 30 since it was turned on, where the goods have come from or have gone too. The risk assessment data 1418 includes records of each risk assessment, and if the risk assessed satisfies certain criteria, then an alarm or "red flag" is raised. For example, a new box is opened before an old box of units are booked out, or more product is booked back into the magazine than was booked out in a particular box, if access protocols are not followed, if a prohibited destination or source location is recorded, or if the net explosive quantity of the box/magazine/withdrawal is beyond a certain level.
Figure 11 shows a process where the station 30 is connected to a remote computer 1500. Information from one or more stations can be sent to the remote computer for things such as stock inventory control 1502 or risk assessment reporting 1504. Stock inventory control 1502 includes updates to stock management system 1504. This can be a delivered at a level of detail required, for example it can include more detail regarding reporting by blasthole 1506, including information on primer size, detonators and explosives down the hole. Stock inventory control 1502 can also include information on explosives loaded 1508, such as by explosive type, and other information on the RFID chip 1510.
Examples of risk assessment reporting include: when the explosive volumes exceed set levels, when a box is missing a barcode, when a wrong barcode number is recorded, when a wrong location is entered, when stock is nearing its used by date, when out of date stock is checked in and out, or when a net explosives quantity exceeds a set level.
Figure 12 shows a process of sending records from the station 1600. To access the records an access code is required 1602. Records are divided into incoming records 1604 and outgoing records 1606. The incoming records 1604 are divided into locations 1608, the magazine section to which the explosives are going 1610 and details of returned explosives 1612. Locations record 1608 is divided into information about where the explosives came from, such as they came from an underground location or an open pit and related details, the supplier, and other information such as a transfer. The magazine section 1610 may be divided into a high explosive section 20, an ignition explosive section 22, a working magazine 24 or other sections. Returns data at 1612 will include details about the returned explosive.
The outgoing records 1606 include information about locations to which the explosive are sent such as an underground mine or open pit site along with related information, information about supplier, if the explosives being returned to the supplier, or other information for example related to trials or transfers.
Figure 13 shows information relating to reporting. Reporting can be used for data management 1700 or to allow monitoring and tracking of possible issues or opportunities 1702. Reporting can include forecasting 1704 by various options, reporting can be automatically generated 1706 by various criteria, risk assessment reporting 1708, or by information from RFID labels 1710. Figure 14 shows an example of statutory reporting 1800, which includes generation of electronic records 1802, government and internal requirements, and standard written reports on a periodic basis 1804. This can reduce the workload required complying with statutory reports. Some reports can be automatically generated. They can be generated in a secure electronic format. Generation of the reports can therefore be a simple exercise. In Figure 15, access control records of the station can be used to identify personnel using the magazines 1900, identify the time personnel access the magazine 1902, and to assess the amount of time a magazine is accessed 1904.
Figure 16 shows use of the system or other support functions such as procurement support 1950. Procurement support can be used to direct stock movement/transactions 1952, provide reporting to an explosive supplier 1954 or two find special products that may be available on other sites,
The present invention can reduce the time taken to check in or out dangerous goods from a repository, it can reduce mistakes and can provide increased accountability, tracking and risk management.
Modifications and variations may be made to be present invention without departing from the basic inventive concept. Such modifications are intended to fall within the scope of the present invention the nature of which is to be determined from the foregoing description and appended claims.

Claims

Claims
1. A dangerous goods repository checking system comprising: a user identifier device for identifying a user accessing a repository, 5 arranged to output user data indicative of an identity of said user; a dangerous goods identifier device for identifying dangerous goods checked into or out of the repository, arranged to output goods data indicative of an identity of said dangerous goods; and a data storage configured to receive and record the user data and theo goods data when the identified user checks the dangerous goods into or out of the repository.
2. A system as claimed in claim 1 , wherein the storage is mounted to the dangerous goods. 5
3. A system as claimed in claim 1 , wherein the storage is located at the repository.
4. A system as claimed in claim 1 , wherein the storage is located remotely o from the repository.
5. A system as claimed in claim 1 , wherein the storage is mounted to the dangerous goods and the system comprises a second storage located at the repository, the second storage being configured to record an association5 between the data indicative of the identified user and the data indicative of the identified dangerous goods.
6. A system as claimed in claim 5, wherein the system comprises a third storage located remotely from the repository, the third storage being configured 0 to record an association between the data indicative of the identified user and the data indicative of the identified dangerous goods.
7. A system as claimed in claim 1 , wherein the user data is recorded in association with the goods data.
8. A system as claimed in claim 1 , wherein the user identifier device is arranged to identify a subsequent user accessing the repository and output subsequent user data indicative of an identity of said subsequent user; the dangerous goods identifier device is arranged to identify dangerous goods subsequently checked into or out of the repository and output subsequent goods data indicative of an identity of said dangerous goods subsequently checked into or out of the repository; the data storage is configured to receive and record the subsequent user in association with the subsequent goods data.
9. A system as claimed in claim 1 , wherein the user identifier device is arranged to identify a subsequent user accessing the repository and output subsequent user data indicative of an identity of said subsequent user; the dangerous goods identifier device is arranged to identify dangerous goods subsequently checked into or out of the repository and output subsequent goods data indicative of an identity of said dangerous goods subsequently checked into or out of the repository; and the system further comprises a further data storage configured to receive and record the subsequent user data and subsequent goods data.
10. A system as claimed in claim 1 , wherein the storage is configured to receive one or more data indicative of, and record one or more of, the following in association with the identified dangerous goods: the quantity of dangerous goods checked in or out; the type of dangerous goods checked in or out; the time and date of checking in or out; and information related to the checking in or out.
11. A system as claimed in claim 10, wherein the quantity is a number of discrete units of dangerous goods, a number of packages of dangerous goods, a volume of dangerous goods or a weight of dangerous goods.
12. A system as claimed in claim 10, wherein the information related to checking in is the source of the dangerous goods and the reason for checking in.
13. A system as claimed in claim 10, wherein the repository is mobile, and the information related to checking in is the intended destination of the repository.
14. A system as claimed in claim 10, wherein the information related to checking out is the destination and intended use of the dangerous goods or reason for checking out.
15. A system as claimed in claim 1 , wherein the storage is configured to record a representation of the geographic location of one or more of: the user identifier when the user identifier identifies the user; the dangerous goods identifier when the dangerous goods identifier identifies the dangerous goods; and the repository when the dangerous goods are checked in or out.
16. A system as claimed in claim 8, wherein the system further comprises a report generator for reporting on each recorded association between the identified user and the identified dangerous goods.
17. A system as claimed in claim 1 , wherein the system further comprises a risk analyser for determining a risk associated with the identified user checking dangerous goods into or out of the repository.
18. A system as claimed in claim 17, wherein the system further comprises an alert generator for raising an alert when the determined risk meets one or more criteria.
19. A system as claimed in claim 1 , wherein the system further comprises a station located at or near the repository, or at or near a point of entry to or exit from the repository.
20. A system as claimed in claim 19, wherein the storage is configured to record a representation of the geographic location of the station when the dangerous goods are checked in or out of the repository.
21. A system as claimed in claim 1 , wherein the user identifier comprises an input device for receiving a user code and a comparator for comparing the user code with a code associated with a known user identity.
22. A system as claimed in claim 1 , wherein the user identifier comprises a biometric reader.
23. A system as claimed in claim 1 , wherein the dangerous goods identifier comprises a label reader connected with the station for reading a label on the dangerous goods.
24. A system as claimed in claim 23, wherein the label reader comprises a RFID chip reader.
25. A system as claimed in claim 19, wherein the station comprises a label output device, preferably capable of writing to an RFID chip in the label.
26. A system as claimed in claim 1 , wherein the dangerous goods identifier is in the form of a portable device arranged to communicate with the station.
27. A system as claimed in claim 1 , wherein the dangerous goods identifier is an electronic label on the dangerous goods.
28. A system as claimed in claim 1 , wherein the system further comprises an identifier writer for writing information to an identification item associated with the checked dangerous goods.
29. A system as claimed in claim 1 , wherein the system is configured to record the identified user on an identification item associated with the dangerous goods.
30. A system as claimed in claim 28 or 29, wherein the identification item comprises information on the nature, type, and number of goods at package or unit level.
31. A system as claimed in claim 28, wherein the identifier writer is configured to record an identification of the repository on the identification item.
32. A system as claimed in claim 1 , wherein the storage is arranged to record an inventory of dangerous goods held at the repository, which is updated as dangerous goods are checked in and out.
33. A system as claimed in claim 32, wherein the report generator is arranged to output a report on the occurrence of determined risks of dangerous goods checked into or out of the repository.
34. A system as claimed in claim 1 , wherein the storage is arranged to store an expiry date in association with each one of the identified dangerous goods.
35. A system as claimed in claim 1 , wherein the storage is arranged to store a first type of expiry date for a closed dangerous goods package and a second type of expiry date for units of dangerous goods from an opened dangerous goods package.
36. A system as claimed in claim 35, wherein the system further comprises an expiry date tracker for flagging when a dangerous goods package or unit has reached its expiry date.
37. A dangerous goods repository checking system comprising: a user identifier device for identifying a user accessing a repository, arranged to output user data indicative of an identity of said user; and a data storage mounted to the dangerous goods and configured to receive and record the user data when the identified user checks the dangerous goods into or out of the repository.
38. A system as claimed in claim 37, wherein the system further comprises a dangerous goods identifier device mounted to the dangerous goods for identifying dangerous goods checked into or out of the repository, the dangerous goods identifier device arranged to output goods data indicative of an identity of said dangerous goods; and the data storage is arranged to output user data indicative of an identity of user who checked the dangerous goods into or out of the repository.
39. A method of checking dangerous goods into or out of a repository, the method comprising: identifying a user accessing a repository with a user identifying device; identifying dangerous goods checked into or out of the repository with a dangerous goods identifying device; and recording in a data storage user data indicative of an identity of said user and goods data indicative of an identity of said dangerous goods when the identified user checks the dangerous goods into or out of the repository.
40. A method as claimed in claim 39, wherein the method further comprises recording the data indicative of the identified user in association with the data indicative of the identified dangerous goods in a remotely located second storage.
41. A method of checking dangerous goods into or out of a repository, the method comprising: identifying a user accessing a repository; identifying dangerous goods being checked into or out of the repository; recording the identified user in association with the identified dangerous goods on a storage device located with the dangerous goods when the identified user checks dangerous goods into or out of the repository.
42. A method as claimed in claim 41 , wherein the method comprises identifying the repository and recording an association between the identified dangerous goods and the identified repository.
43. A method as claimed in claim 41 , wherein the method comprises identifying the location of the repository when the dangerous goods are checked into or out of the repository and recording an association between the identified location and the identified dangerous goods.
44. A method as claimed in claim 41 or 42, wherein the association is automatically recorded electronically in a storage device of a station at the repository.
45. A method as claimed in claim 41 , wherein identifying the user is a prerequisite before granting access to the repository.
46. A method as claimed in claim 41 , wherein the identifying the dangerous goods is conducted by electronic scanning of a label attached to the dangerous goods.
47. A method as claimed in claim 41 , wherein one or more of the following is also recorded: the quantity of dangerous goods checked in or out; the type of dangerous goods checked in or out; the time and date of checking; and information related to the checking in or out.
48. A method as claimed in claim 47, wherein the information related to
5 checking in is the source of the dangerous goods and the reason for checking in.
49. A method as claimed in claim 47, wherein the information related to the checking out is the destination and intended use of the dangerous goods oro reason for checking out.
50. A method as claimed in claim 41 , wherein the identified user and the identified dangerous goods are also recorded as associated with a representation of the geographic location of one or more of: 5 the user when they are identified; the dangerous goods when they are identified; and the repository when the dangerous goods are checked in or out.
51. A method as claimed in claim 41 , wherein the method further comprises0 determining the risk associated with the identified user checking dangerous goods into or out of the repository.
52. A method as claimed in claim 41 , wherein the user is identified by a biometric reading. 5
53. A method as claimed in claim 41 , wherein the dangerous goods are identified by reading an RFID chip associated with the dangerous goods.
54. A method as claimed in claim 41 , wherein the method further comprises o attaching the RFID chip to the dangerous goods at the time of checking in or out of the repository.
55. A method as claimed in claim 41 , wherein the identified user is receded on an identification label associated with the dangerous goods.
56. A method as claimed in claim 41 , wherein assess to the repository is restricted and the method further comprises comparing the user's identification with a list of authorised users, wherein access to the repository is granted only when the identification of the user is on the list of authorised users.
57. A method as claimed in claim 41 , wherein the method further comprises recording an identification of the repository in association with the dangerous goods.
58. A method as claimed in claim 41 , wherein the information is recoded when the dangerous goods are received at the repository.
59. A method as claimed in claim 41 , wherein the information is recoded when the dangerous goods are removed from the repository.
60. A method of checking dangerous goods into or out of a repository, the method system comprising: identifying a user accessing a repository; and recording user data indicative of an identity of said user in a data storage mounted to the dangerous goods when the identified user checks the dangerous goods into or out of the repository.
61. A computer program for controlling a processor to perform a method of checking dangerous goods into or out of a repository, the method comprising: identifying a user accessing a repository with a user identifying device; identifying dangerous goods checked into or out of the repository with a dangerous goods identifying device; and recording in a data storage user data indicative of an identity of said user and goods data indicative of an identity of said dangerous goods when the identified user checks the dangerous goods into or out of the repository.
62. A method of determining when to deliver dangerous goods to a repository, the method comprising: maintaining an inventory of dangerous goods stored at a repository; identifying a user accessing a repository to check dangerous goods in or out of the repository; identifying dangerous goods checking into or out of the repository; updating the inventory as dangerous goods are checked into and out of the repository, where the inventory has a representation of the identity of the user that checks goods in or out recorded; initiating the delivery of dangerous goods to the repository when the amount of the dangerous goods recorded in the inventory drops below a threshold.
63. A system for determining when to deliver dangerous goods to a repository, the system comprising: a processor for maintaining an inventory of dangerous goods stored at a repository in a storage device, the processor is configured to update the inventory as dangerous goods are checked into and out of the repository, and record in the storage device a representation of an identity of the user that checks goods in or out; a user identifier for identifying a user accessing a repository to check dangerous goods in or out of the repository; a goods identifier for identifying dangerous goods checking into or out of the repository; and an order generator for initiating the delivery of dangerous goods to the repository when the amount of the dangerous goods recorded in the inventory drops below a threshold.
64. A method of sending data over a communications medium, the method comprising: identifying a user accessing a repository in which dangerous goods are stored; identifying dangerous goods checked into or out of the repository by the identified user; sending a representation of the identified user and a representation of the identified dangerous goods as data over the communications medium.
65. A system for sending data over a communications medium, the system comprising: a user identifier for identifying a user accessing a repository in which dangerous goods are stored; a goods identifier for identifying dangerous goods checked into or out of the repository by the identified user; a transmitter for sending a representation of the identified user and a representation of the identified dangerous goods as data over the communications medium.
66. A method of handling bulk material, the method comprising: measuring the quality of material in a container for holding bulk material; reading an identification of the container from an identifier device located with the container; and storing the identification in association with the measured quantity of material in the container at a particular time.
67. A method as claimed in claim 66, wherein the method further comprises detecting whether an opening to the container has been accessed prior to transferring material into or out of the container.
68. A method as claimed in claim 66, wherein the method further comprises applying a stopper to the opening, such that the stopper must be removed or opened before material can be transferred into or out of the container, identifying the stopper and recording the identity of the stopper.
69. A method as claimed in claim 68, wherein the method further comprises reading the identity of the stopper at a later time when material is to be transferred to or from the container, and comparing the read identity to the recorded identity.
70. A method as claimed in claim 66, wherein measuring the quantity of material in the container comprises weighing the container before and after material is transferred into or out of the container.
71. A method as claimed in claim 66, wherein measuring the quantity of material in the container comprises weighing another container to which at least a portion of the material is transferred to or from before and after material is transferred into or out of the other container.
72. A method as claimed in claim 66, wherein the particular time is either prior to or after transfer of material into or out of the container.
73. A material handling facility comprising: a container for holding bulk material; a quantity measuring device for measuring the quality of material in the container; an identifier device located with the container for providing an identification of the container; and a recording system for storing the identification in association with a measured quantity of material in the container at a particular time.
74. A facility as claimed in claim 73, wherein the facility further comprises a reader for reading the provided identification of the container and for providing the identification to the recording system.
75. A facility as claimed in claim 73, wherein the facility further comprises an access detector for detecting access of an opening of the container.
76. A facility as claimed in claim 73, wherein the facility further comprises a stopper to the opening arranged so that the stopper must be removed or opened before material can be transferred into or out of the container.
77. A facility as claimed in claim 76, wherein the facility further comprises an identifier of the stopper and a recorder of an identity of the stopper.
78. A facility as claimed in claim 73, wherein the facility further comprises a reader for reading the identity of the stopper prior to when material is to be transferred to or from the container and a comparator for comparing the read identity to the recorded identity.
79. A facility as claimed in claim 73, wherein In an embodiment the stopper comprises a closure or a valve.
80. A facility as claimed in claim 73, wherein the opening comprises an outlet chute, pipe, hose or transfer medium from the container.
81. A monitoring system comprising: an input for receiving a measurement of the quality of material in the container; an input for receiving identification of the container from an identifier located with the container; and a storage device for storing the container identification in association with the measured quantity of material in the container at a particular time.
82. A system as claimed in claim 81 , wherein the system further comprises an input of a signal indicative of whether an opening to the container has been accessed prior to transferring material into or out of the container.
83. A system as claimed in claim 81 , wherein the system further comprises an input of an identification of a stopper which is applied to the opening, such that the stopper must be removed or opened before material can be transferred into or out of the container and a comparator for comparing the input of the stopper identification at two different times, where in the event that the input stopper identification is different a signal is produced that is indicative of the opening to the container having been accessed prior to transfer of material to or from the container.
84. A system as claimed in claim 81 , wherein system further comprises an output of a signal indicative of the stored container identification and the associated measured quantity.
EP09737536A 2008-04-28 2009-04-28 Dangerous goods repository checking system and method Withdrawn EP2294537A4 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2008902091A AU2008902091A0 (en) 2008-04-28 Dangerous Goods Depot Checking System
PCT/AU2009/000530 WO2009132386A1 (en) 2008-04-28 2009-04-28 Dangerous goods repository checking system and method

Publications (2)

Publication Number Publication Date
EP2294537A1 true EP2294537A1 (en) 2011-03-16
EP2294537A4 EP2294537A4 (en) 2013-01-02

Family

ID=41254695

Family Applications (1)

Application Number Title Priority Date Filing Date
EP09737536A Withdrawn EP2294537A4 (en) 2008-04-28 2009-04-28 Dangerous goods repository checking system and method

Country Status (3)

Country Link
EP (1) EP2294537A4 (en)
AU (1) AU2009242960A1 (en)
WO (1) WO2009132386A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107292548A (en) * 2016-03-31 2017-10-24 富泰华工业(深圳)有限公司 Warehouse material management system and method
CN109115272B (en) * 2018-08-14 2020-11-20 江苏警官学院 Dangerous chemical storage and transportation tank safety detection device based on sensor
CN110580574B (en) * 2019-08-26 2024-02-20 交通运输部水运科学研究所 Method, system, device, medium and computing equipment for acquiring container stacking risk
CN110533370A (en) * 2019-08-26 2019-12-03 交通运输部水运科学研究所 A kind of container stacked arrangement, system, medium and calculate equipment
CN115496244B (en) * 2022-11-17 2023-04-07 北京博腾慧通科技有限公司 Hazardous waste transfer supervision method, system and processor

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5420797A (en) * 1994-08-26 1995-05-30 Burns; Robert R. Method of delivering petroleum and similar products using electronic identification tags and reading probe
FR2744706B1 (en) * 1996-02-12 1998-04-30 Tech Service Carrosserie Ind CONTROLLED DELIVERY AND TRACKING SYSTEM FOR BULK PRODUCTS
US7082344B2 (en) * 2001-10-12 2006-07-25 Touraj Ghaffari Real time total asset visibility system
WO2006128257A1 (en) 2005-06-02 2006-12-07 Global Tracking Solutions Pty Ltd An explosives initiator, and a system and method for tracking identifiable initiators
BRPI0720418A2 (en) 2006-12-18 2013-12-31 Global Tracking Solutions Pty Ltd DRILLING STANDARD TRACKING SYSTEM

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
EPO: "Mitteilung des Europäischen Patentamts vom 1. Oktober 2007 über Geschäftsmethoden = Notice from the European Patent Office dated 1 October 2007 concerning business methods = Communiqué de l'Office européen des brevets,en date du 1er octobre 2007, concernant les méthodes dans le domaine des activités", JOURNAL OFFICIEL DE L'OFFICE EUROPEEN DES BREVETS.OFFICIAL JOURNAL OF THE EUROPEAN PATENT OFFICE.AMTSBLATTT DES EUROPAEISCHEN PATENTAMTS, OEB, MUNCHEN, DE, vol. 30, no. 11, 1 November 2007 (2007-11-01), pages 592-593, XP007905525, ISSN: 0170-9291 *
See also references of WO2009132386A1 *

Also Published As

Publication number Publication date
AU2009242960A1 (en) 2009-11-05
EP2294537A4 (en) 2013-01-02
WO2009132386A1 (en) 2009-11-05

Similar Documents

Publication Publication Date Title
CA2529186C (en) Electronic security system for monitoring and recording activity and data relating to cargo
US7176800B2 (en) Electronic security system for monitoring and recording activity and data relating to persons or cargo
KR100818795B1 (en) A management system of chemicals using rfid
EP1798696A1 (en) Electronic security system for monitoring and recording activity and data relating to persons or cargo
EP2280374A1 (en) Identity verification system for monitoring and authorizing transactions
US7557709B2 (en) Item tracking system
US20070008115A1 (en) System, method and devices for detecting, monitoring, tracking and identifying explosive materials using RFID tags
EP2294537A1 (en) Dangerous goods repository checking system and method
JP2007122333A (en) Transportation management method and transportation management system for industrial waste
US20070229283A1 (en) System and method for detecting, monitoring, tracking and identifying explosive materials
US7860598B2 (en) Method, device, computer system and computer program product for controlling a material flow
EP1883909A2 (en) System and method for detecting, monitoring, tracking and identifying explosive materials
WO2010037175A1 (en) Hazardous goods tracking system
JP2006089163A (en) Physical distribution management apparatus, physical distribution management pallet and physical distribution management system
CN108136789B (en) Secure transport system, recording module and container with access control
US9087315B1 (en) Method and apparatus for a handheld terminal and applications for implementation of secure authorization for handling freight
WO2009149494A1 (en) A method of recordal of information related to a product and the manufacture of a product
JP2004262617A (en) Control method and control system of stock, quality, property, logistics and so on of spare parts of aircraft equipment and the like
US20070268135A1 (en) System and method for detecting, monitoring, tracking and identifying explosive materials using visibility devices
US20070188330A1 (en) System and method for detecting, monitoring, tracking and identifying explosive materials using ID marks
KR101958602B1 (en) System for providing explosives delivery service
US20080042805A1 (en) System and method for detecting, monitoring, tracking and identifying explosive materials
CN114997200A (en) Method and system for tracking and identifying civil explosive
Greenberg et al. Truck shipment risks for assessing hazardous materials-a new paradigm incorporating safety and security

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20101126

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA RS

DAX Request for extension of the european patent (deleted)
A4 Supplementary search report drawn up and despatched

Effective date: 20121204

RIC1 Information provided on ipc code assigned before grant

Ipc: G06Q 10/00 20120101AFI20121128BHEP

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Effective date: 20130628