EP3732905A1 - Sécurisation d'un environnement de travail a l'aide d'au moins une balise électronique et d'une étiquette électronique - Google Patents
Sécurisation d'un environnement de travail a l'aide d'au moins une balise électronique et d'une étiquette électroniqueInfo
- Publication number
- EP3732905A1 EP3732905A1 EP18845440.9A EP18845440A EP3732905A1 EP 3732905 A1 EP3732905 A1 EP 3732905A1 EP 18845440 A EP18845440 A EP 18845440A EP 3732905 A1 EP3732905 A1 EP 3732905A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- operator
- tag
- work environment
- beacon
- exclusion zone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 230000007717 exclusion Effects 0.000 claims abstract description 59
- 238000000034 method Methods 0.000 claims abstract description 49
- 238000004891 communication Methods 0.000 claims abstract description 43
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 6
- 230000006870 function Effects 0.000 claims description 11
- 238000004590 computer program Methods 0.000 claims description 9
- 238000005259 measurement Methods 0.000 claims description 6
- 238000013475 authorization Methods 0.000 claims description 5
- 230000000295 complement effect Effects 0.000 claims description 5
- 238000006073 displacement reaction Methods 0.000 claims description 4
- 238000003860 storage Methods 0.000 claims description 4
- 238000012545 processing Methods 0.000 claims description 2
- 238000004092 self-diagnosis Methods 0.000 claims description 2
- 230000005236 sound signal Effects 0.000 claims description 2
- 239000011324 bead Substances 0.000 claims 1
- 238000013459 approach Methods 0.000 description 25
- 238000009434 installation Methods 0.000 description 16
- 238000010276 construction Methods 0.000 description 8
- 230000033001 locomotion Effects 0.000 description 8
- 238000012423 maintenance Methods 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 230000006378 damage Effects 0.000 description 4
- 238000005265 energy consumption Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000004807 localization Effects 0.000 description 4
- 238000009412 basement excavation Methods 0.000 description 3
- 230000006866 deterioration Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 238000011144 upstream manufacturing Methods 0.000 description 3
- 206010014405 Electrocution Diseases 0.000 description 2
- 230000015556 catabolic process Effects 0.000 description 2
- 238000005094 computer simulation Methods 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000001914 filtration Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000009418 renovation Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 229910000831 Steel Inorganic materials 0.000 description 1
- 208000027418 Wounds and injury Diseases 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 239000000853 adhesive Substances 0.000 description 1
- 230000001070 adhesive effect Effects 0.000 description 1
- 230000036626 alertness Effects 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000010616 electrical installation Methods 0.000 description 1
- 230000005672 electromagnetic field Effects 0.000 description 1
- 231100001261 hazardous Toxicity 0.000 description 1
- 208000014674 injury Diseases 0.000 description 1
- 238000004377 microelectronic Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000010422 painting Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000013138 pruning Methods 0.000 description 1
- 230000009257 reactivity Effects 0.000 description 1
- 230000004043 responsiveness Effects 0.000 description 1
- 239000010959 steel Substances 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- 238000011179 visual inspection Methods 0.000 description 1
- 230000002747 voluntary effect Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/021—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S1/00—Beacons or beacon systems transmitting signals having a characteristic or characteristics capable of being detected by non-directional receivers and defining directions, positions, or position lines fixed relatively to the beacon transmitters; Receivers co-operating therewith
- G01S1/02—Beacons or beacon systems transmitting signals having a characteristic or characteristics capable of being detected by non-directional receivers and defining directions, positions, or position lines fixed relatively to the beacon transmitters; Receivers co-operating therewith using radio waves
- G01S1/68—Marker, boundary, call-sign, or like beacons transmitting signals not carrying directional information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/105—Human resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/109—Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/20—Administration of product repair or maintenance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0806—Configuration setting for initial configuration or provisioning, e.g. plug-and-play
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Definitions
- the present invention relates to the field of security.
- the present invention relates more particularly to the securing of a working environment of the type, for example a construction site comprising at least one working zone and at least one exclusion zone such as for example a danger zone.
- One of the objects of the present invention consists in proposing a so-called "micro-localization” solution making it possible to achieve a very precise localization of the personnel involved in a working environment in order to secure this environment.
- the present invention will find many advantageous applications in the field of industrial sites such as for example the sites involving electrical work on transformer stations and / or electrical installations with high or high voltage.
- the present invention will find other advantageous applications in other fields such as, for example, securing track works such as road renovation works, securing work in the building sector, securing work on a site. in the wider industry (chemical, petrochemical, production, waste treatment, logistics, automotive, aeronautics, steel, etc.) or securing work in nuclear power plants.
- securing track works such as road renovation works, securing work in the building sector, securing work on a site. in the wider industry (chemical, petrochemical, production, waste treatment, logistics, automotive, aeronautics, steel, etc.) or securing work in nuclear power plants.
- the prevention of damage to an archaeological excavation site for which the exclusion zone may correspond to a search zone that may contain fossils or other fragile remains access to this zone must be done with caution so as not to not degrade the site
- the securing of agricultural parcels or agricultural work areas for which the exclusion zone may correspond to a space presenting risks of falling or for which the exclusion zone may correspond to an agricultural machine.
- Said area exclusion can then be in motion (the machine moving) with respect to the work area;
- working environment in the present description means an environment in which one or more human interventions are provided (for example: work, maintenance operation, renovation, excavation, etc.).
- exclusion zone within the meaning of the present invention is meant in the present description which follows an area (or possibly an object forming part of the working environment) in which (or with which) an operator is likely to encounter a risk such as a risk of electrocution, a risk of bodily injury or a risk of irradiation or others.
- all or part of the intervening personnel must be informed when a person enters (or approaches) in such a zone (or of such an object), this notably for reasons of safety and / or reasons of accreditation or accreditation.
- an exclusion zone can be fixed or mobile (for example when it is a dangerous object likely to move in the environment).
- This physical marking is often supplemented by signage of the danger sign or equivalent type, or even manuals and paper or digital protocols provided to stakeholders upstream or during interventions.
- red or orange to indicate the presence of a hazard
- blue or green color to indicate safety (or lack of danger).
- Physical tags and associated signage are passive: they do not interact with people in the work environment.
- a person who spans a beacon or enters a danger zone that is not properly marked is not warned of the danger it incurs.
- the Applicants have indeed found that the human factor plays a determining role for a large part of the accidents that occur on a construction site or during a maintenance operation.
- Physical tags and signage are also subject to deterioration over time. This deterioration most often of climate and / or human origin is silent.
- each participant is equipped with a receiver that communicates with fixed anchors such as electronic beacons which themselves communicate with a hub (or "gateway") capable of determining the position of each of the speakers with respect to the different virtual danger zones configured upstream (in 2D or 3D).
- fixed anchors such as electronic beacons which themselves communicate with a hub (or "gateway") capable of determining the position of each of the speakers with respect to the different virtual danger zones configured upstream (in 2D or 3D).
- UWB for "Ultra Wide-Band”
- the localization techniques are based on the trilateration and on the propagation time of the UWB signals in the air.
- tags most often require a power supply and require the ability to communicate with a concentrator via a dedicated network: wired (Ethernet for example) or wireless (Wifi for example).
- Such a concentrator is in the form of a server capable of communicating with all the beacons and having a high computing power.
- the implementation of the network dedicated to the communication between the hub and the beacons poses numerous constraints of installation, configuration and power supply.
- FIG. 1 An exemplary embodiment of such an installation known from the state of the art is shown in FIG.
- FIG. 1 there is shown a working environment ZT with an exclusion zone ZD.
- the operator in charge of the safety in the working environment ZT positions the beacons B and the concentrator G with all the constraints beforehand associated with such a configuration, namely mainly the constraints relating to the power supply of each beacon B and the concentrator C and the constraints relating to the installation of the beacons B, namely the height adjustment of each beacon B as well as the tests on the signal range of each beacon B.
- each beacon B can communicate directly with the concentrator G.
- the implementation of such a concentrator G therefore imposes several constraints including power supply, network connectivity and a specific location in the ZT working environment allowing it to communicate with each beacon B via the dedicated network.
- Such a hub-based installation therefore requires a specific configuration depending on the layout of the premises, which requires, in particular, prior identification, the production of plans, measurements, modeling of the working environment, tests, calibration, etc.
- Precise localization of people with emerging techniques therefore requires a specific configuration of the environment: the localization techniques deployed up to now propose a volumetric approach which is equivalent to the construction of a landmark in which the danger zones are defined in relation to which stakeholders are located.
- These techniques require, in particular, a power supply, a specific configuration (beacons at signal range, high-level beacons, etc.), upstream modeling (which takes time), the use of a concentrator, and a good one. connectivity.
- the object of the present invention is to improve the situation described above.
- One of the objectives of the present invention is to remedy the various disadvantages mentioned above by proposing an innovative security solution for a work environment using at least one electronic tag and an electronic tag carried by a user. operator.
- the object of the present invention relates in a first aspect to a method of securing a work environment using at least one electronic tag and an electronic tag carried by an operator.
- the electronic tag is compact and electrically autonomous battery operated (or alternatively electrically connected to a communication terminal serving as a power source).
- the at least one tag and the tag are able to communicate with each other according to a communication scheduler implementing a communication management algorithm.
- Such a scheduler is preferably integrated in each tag and each tag and avoids the use of a "master" device such as a concentrator as proposed in the emerging techniques described in the preamble and proposing a volumetric approach to the location.
- the working environment comprises at least one exclusion zone for the operator.
- the method is implemented by computer means and the communication scheduler and comprises:
- the configuration phase comprises the following steps:
- the use phase comprises the following steps:
- the present invention relies on a logic of virtual security cordon and not on a location of the operators at any point in the work environment.
- the approach proposed in this paper is a perimeter approach to modeling the exclusion zone with a virtual security cordon.
- This virtual security cordon logic defined in the numerical model of the work environment by the position of the beacons makes it possible to materialize the exclusion zones with a minimum of computing time and to detect approaches or entries in these zones for send alerts to the operators concerned.
- This perimeter approach coupled with the implementation of a scheduler to avoid the use of a "master" device such as a concentrator focuses on the location of the operator or operators in the vicinity of the zone or zones of Exclusion only (here, the most relevant areas in relation to the problem of security) and not on the position of operators at any point in the working environment (volumetric approach).
- beacons to delimit exclusion zones also makes it possible to reduce installation costs by having a quick plug & play solution to install.
- the markup step comprises positioning a single electronic beacon to delimit the exclusion zone. In this mode, it generates during the modeling step, a virtual security cordon in the form of a virtual circle whose radius corresponds to a determined safety distance around said tag.
- the markup step comprises positioning at least two tags at the periphery of the at least one exclusion zone. In this mode, it generates during the modeling step a virtual security cordon in the form of a corridor comprising at least one segment defined by the at least two tags. It is understood here that this corridor delimits the working space in which the operators can work and the exclusion zone in which their presence is not desired, for example for security reasons and / or reasons of accreditation or habilitation.
- the distance between the electronic tag and each tag is measured during the measuring step.
- the at least one tag and the tag are able to communicate with each other according to a communication protocol of the UWB type configured to determine the distance between the tag and the at least one tag.
- a comparison of these distances is provided to determine the shortest distances between the tag and each of the tags.
- this protocol also makes it possible to circulate information or instructions between the tags and the tags.
- each pair of positioned beacons makes it possible to create a corridor segment.
- said at least two beacons are able to communicate with each other according to a communication protocol of the UWB type configured to determine the shortest distances between the beacons.
- each segment of the virtual security corridor is defined by the successive tags, two by two, in the order in which they were configured.
- it is for example the two tags closest to each other among a plurality of tags.
- the use of such a protocol is therefore advantageous in that it facilitates the determination of the distances between the tags for modeling the exclusion zone or zones.
- the relative position of the operator in the work environment is determined according to the distances of the label relative to the segments closest to the exclusion zone.
- each stakeholder, carrying a label is not determined in the absolute on the entire site, it is only determined with respect to the segments closest to the exclusion zones.
- each beacon must be able to communicate only with the preceding and following beacons of a corridor. This is enough to accurately and reliably detect the relative position of each operator in the environment and thus detect segment crossings, and thus a safety corridor.
- the operator is provided with a communication terminal implementing software functions configured to receive the warning signal and to warn the operator by a sound, vibratory and / or light signal.
- the operator is provided with a communication terminal implementing software functions configured to provide location information (for example from a GPS) of the operator in the work environment and display the numerical model of the working environment with the position of the operator according to the geolocation information and the relative position of the operator determined during the determining step.
- location information for example from a GPS
- this geolocation information from, for example, a GPS makes it possible to accompany the user in the configuration of the markings, in particular to provide him with a 2D representation on the map of the segments of the danger zones.
- GPS offers a redundant tracking system, although it is less accurate than the main system.
- the GPS allows to offer complementary services to stakeholders: contextual information, digital signage, etc.
- the electronic tag is provided with at least one complementary sensor of the type, for example an accelerometer capable of detecting a fall and / or an eventual accident, for example when said operator crosses the virtual security cordon and enters said exclusion zone. .
- the relative position of the operator in the work environment is determined according to a dynamically determined period as a function of the distance measured between the last position of said operator and the virtual security cordon.
- This dynamic management of the determination of the relative position of each operator with respect to the exclusion zone or zones makes it possible to limit considerably the communications between the tags and the tags, which reduces the electrical consumption of each device and thus increases the power consumption of each device. 'autonomy.
- the generation of the warning signal is performed according to a determined level of authorization associated with the operator carrying the electronic tag, the level of authorization being recorded in the storage means of the label.
- each operator is provided with a label and is warned by a sound, vibratory and / or light signal in the event of entry into an exclusion zone, a fall zone and / or a possible accident on the part of an operator. one of said operators.
- the method according to the present invention comprises, during the use phase, a continuous self-diagnosis in order to detect the displacement and / or the failure of at least one beacon and to alert at least one operator.
- the subject of the present invention relates, according to a second aspect, to a computer program which comprises instructions adapted to the execution of the steps of the method as described above, this in particular when said computer program is executed by at least one processor.
- a computer program can use any programming language, and be in the form of a source code, an object code, or an intermediate code between a source code and an object code, such as in a partially compiled form, or in any other desirable form.
- the subject of the present invention relates, according to a third aspect, to a computer-readable recording medium on which is recorded a computer program (or embedded software) comprising instructions for carrying out the steps of the method such as as described above.
- the recording medium can be any entity or device capable of storing the program.
- the medium may comprise storage means, such as a ROM, for example a CD-ROM or a microelectronic circuit type ROM, or a magnetic recording means or a hard disk.
- this recording medium can also be a transmissible medium such as an electrical or optical signal, such a signal can be conveyed via an electric or optical cable, by conventional radio or radio or by self-directed laser beam or by other ways.
- the computer program according to the invention can in particular be downloaded to an Internet type network.
- the recording medium may be an integrated circuit in which the computer program is incorporated, the integrated circuit being adapted to execute or to be used in the execution of the method in question.
- the subject of the present invention relates, according to a fourth aspect, to a computer system for securing a work environment using at least one electronic beacon and an electronic tag carried by an operator, said beacon and said tag. being able to communicate with each other according to a communication scheduler implementing a communication management algorithm.
- the system comprises computer means configured for implementing the steps of the method described above.
- the system comprises:
- At least one electronic beacon positioned in the work environment to delimit the exclusion zone
- computer modeling means configured to numerically model the exclusion zone by generating a virtual security cordon according to the positioning of the at least one tag in the work environment, measuring means configured to measure the distance of the electronic tag from at least one tag;
- computer processing means configured to determine the relative position of the operator in the work environment according to the measured distance
- generation means integrated in the label for generating a warning signal to the operator when the operator crosses the virtual security cordon.
- the object of the present invention relates, according to a fifth aspect, to a use of the method as described above for securing a work environment of the construction site type in which the at least one exclusion zone is a danger zone. for the operator.
- the subject of the present invention relates, according to a sixth aspect, to a use of the method as described above for securing a work environment of the archaeological site type in which the at least one exclusion zone is a excavation area that may contain fossils or other fragile remains (access to this area must be done carefully so as not to degrade the site, and archaeologists are informed).
- the subject of the present invention relates, according to a seventh aspect, to a use of the method as described above for securing military interventions in which the at least one exclusion zone corresponds to a zone with dangerous access ( potentially mined or contaminated for example)
- the object of the present invention relates according to an eighth aspect a use of the method as described above for the securing of agricultural parcels or agricultural work areas (such as agricultural silos for example) in which the at least one exclusion zone corresponds to a space presenting a risk of falling for example or for which the exclusion zone corresponds to an agricultural machine. Said exclusion zone would then be in motion (the machine moving) relative to the work zone.
- the subject of the present invention relates, according to a ninth aspect, to a use of the method as described above for the securing of sites or zones in the context of the search for victims of accidents or natural disasters in which the at least one exclusion zone is an insecure zone and access to which would be restricted to the rescue services or government structures in charge of securing the area.
- the subject of the present invention relates, according to a tenth aspect, to a use of the method as described above for the delimitation of "forbidden" zones in the context of leisure or recreational activities in which the at least one zone exclusion is a an area that would enter, for example, in the implementation of a virtual maze or a virtual role play.
- the object of the present invention by its various functional and structural aspects described above, provides operators in a work environment an approach requiring installation and configuration of simple hardware and easy to implement allowing to precisely locate the operators in a work environment with respect to one or more exclusion zones.
- FIGS. 2 to 5 illustrate an example of embodiment that is devoid of any limiting character and on which:
- FIG. 2 schematically represents the implementation of a system for securing a work environment using at least one electronic beacon and an electronic tag carried by an operator;
- Figure 3 is a flowchart showing the steps implemented in the process of securing work environment using at least one electronic tag and an electronic tag carried by an operator;
- FIG. 4 schematically represents the implementation of a security system according to the present invention for securing a mobile yard on a motorway-type taxiway with a mobile danger zone; and
- Figure 5 schematically shows the implementation of a security system according to the present invention for securing a very extensive work area.
- one of the objectives of the present invention is to propose an innovative approach for securing a work environment ZT of the type for example a worksite comprising one or more exclusion zones ZD corresponding, for example, to a danger zone in which the operator incurs a risk such as for example a risk of electrocution or others.
- a work environment ZT of the type for example a worksite comprising one or more exclusion zones ZD corresponding, for example, to a danger zone in which the operator incurs a risk such as for example a risk of electrocution or others.
- a danger zone ZD FOG. 2
- each operator moving on the site ZT must be equipped with a label T and possibly a communication terminal SP type for example "SmartPhone" able to communicate with the label T.
- a communication terminal SP type for example "SmartPhone"
- Enabling the deployment of a system 100 easy to install, energy-independent and not requiring the use of a master device of the concentrator type is one of the objectives of the present invention, the challenge here being to be able to quickly and easily communicate potential danger zones communicating with operators via connected objects.
- the concept underlying the present invention is to use the tags B to define the ZD danger zones and determine a CSV virtual security cordon that the operator must not cross.
- the latter thus positions the B beacons in order to virtualise the ZD danger zones on the ZT building site by means of specific computer means and notably a dedicated application software installed on its SD communication terminal.
- the manager positions a first beacon B on the ZT site at the periphery of the danger zone ZD. Once it is installed, it feeds it electrically using one of the supplied external batteries. Then, it scans it with the dedicated software installed on its communication terminal SP:
- the software application tells him in a few seconds that the beacon B has been detected and configured.
- the latter validates the creation of the ZD danger zone from the software application.
- This site configuration phase P1 then comprises a modeling step S2.
- a label T carried by the person in charge be connected to the terminal SP of the latter, for example via a wire connection (USB) or via a wireless connection (Bluetooth).
- This tag T connected to the communication terminal SP is used to detect each of the installed tags B and determine their location relative to each other.
- This modeling S2 carried out by computer modeling means and the dedicated application software makes it possible to determine the composition and the characteristics of the segments SC of the virtual security corridor CSV delimiting the danger zone ZD.
- the distances d2 are measured and compared between each of the beacons B to determine SC segments of the corridor between the beacons B.
- This distance d2 between each tag B corresponds to the distance between two successive tags, two by two, in the order in which they were configured. It is these successive tags that determine the shortest SC segments.
- the manager continues this configuration phase Pl and reproduces these different steps for all ZD danger zones that he wants to define and model with a CSV virtual security cordon.
- the electronic beacons B are positioned in addition to an existing physical markup using the integrated adhesive strips.
- the tags B are positioned in height to maximize the accuracy of the system.
- the minimum height is preferably about 50 cm.
- the manager ensures during this phase P 1 to comply with certain rules including the spacing between the tags B. This is flexible and depends on the constraints of the environment (presence of obstacles, electromagnetic field, etc.) this spacing usually varies between five and twenty meters.
- each operator intervening on the site ZT connects the electronic tag T that he carries with his communication terminal SP; this can be achieved either via a wire connection of the type for example USB or via a wireless connection of the "Bluetooth" type.
- the operator wears the label T on him at the place that is most convenient (arm, torso, helmet, pocket, etc.).
- the T label of the wearer ensures the location of the latter vis-à-vis ZD danger zones previously defined using the B tags.
- a measurement S3 of the distance d1 of the electronic tag T with respect to each tag B is performed by measuring means.
- This measurement S3 is here achieved by establishing a communication between the tags B and the tag T via a UWB radio technology.
- This UWB technology makes it possible to calculate the distance between two objects thanks to the ToF (for'T / me of flight ”): one measures the propagation time of a radio wave between two objects in order to determine the distance separating them.
- the tag T seeks to calculate its distance d1 only with a limited number of tags B (depending on its last computed position and the positioning of the tags on the place) in order to limit the number of messages exchanged and thus avoid congestion of the network while limiting energy consumption.
- the distance d1 between the tag T and each relevant tag B is known.
- the TWR mechanism (for "7wo Way Ranging") based on the ToF is implemented to determine the distance between two objects.
- the tag T exchanges messages with all the beacons B around to determine its distance with respect to each of them.
- Such an approach does not require a master entity or a network connection.
- the label emits a single message. This message is received by the surrounding tags B and it is the difference in time between the reception of the message by the different tags B which makes it possible to position the label T.
- the tags B that carry the positioning logic of the label T.
- the tag T sends a message; the beacons B receive it and transmit it to a master entity via a network communication (generally "Wifi" or ethemet) which determines the position of the tag T.
- a network communication generally "Wifi" or ethemet
- This alternative is however less advantageous because it requires a master device ensuring the synchronization beacon clocks, but also a dedicated network on which are connected all the beacons B and the master device.
- a time slot as a unit of time necessary to ensure that a message is sent and received by the entity for which it is intended.
- This slot corresponds to the maximum duration necessary, the duration of transmission of a message being dependent on its size. In other words, this slot is not the transmission time of the message but the time it takes to make sure this message does not collide with another message.
- the communication scheduler is configured as follows:
- the communication cycle of a beacon B during a phase P2 is divided into six periods ranging from 1) to 6):
- beacon B is active on hold for a random time (defined in tenth of time slot). During this waiting period, she listens to the radio exchanges around her;
- Beacon B issues a "BeaconStart” message indicating to other entities around it that it is available to receive messages;
- the beacon listens for a number of time slots determined messages sent by other entities
- the random waiting period is defined in 1) as follows:
- the beacon can temporarily enter the "tag” operating mode (see then the operation of the tag T).
- the duration of the active listening period 3) adapts dynamically according to the number of messages received during the period 3) of the previous communication cycle keeping a number of slots equal to the number of messages received + 1.
- period 6 a period of inactivity which is dependent on the number of beacons B used and the number of tags B and T tags with communication range. It then dynamically adapts as time goes by between a minimum duration allowing all the elements of the device to communicate without colliding and a maximum duration ensuring that the system 100 is sufficiently responsive to locate the tags nearby. After a certain number of cycles without receiving messages, the beacon goes into partial sleep (maximum idle time).
- the communication cycle of a label T is divided into five periods ranging from 1) to 5):
- the maximum speed of movement of a tag T of a danger zone ZD (if it is associated with a moving object) is taken into account in the calculation. the duration of the next period of inactivity.
- the tag T can also be put on standby for an indefinite duration via a user action.
- a MAC filtering is applied in order not to process received messages that are not intended for us and thus limit energy consumption. From the determination of the measurement S3 of the distances between the tag T and each relevant tag B, there is provided a determination S4 of the relative position of the operator in the work environment ZT as a function of the measured distance dl. .
- the approach proposed here makes it possible to focus on the location of the operators in the vicinity of the ZS danger zones only, that is to say where it is the most relevant and the most important, and not on a location. space as such.
- the signal s is transmitted to the communication terminal SP which then generates the arlerte (sound and / or visual and / or vibratory).
- the alerts are local and transmitted via the network of tags and UWB tags. Note, however, that if network connectivity is available, the alert can be sent directly to the emergency services or to a control station for example.
- the present invention provides an advantageous security system for securing easily and quickly a site without the constraints encountered so far.
- the system does not impose particular constraints on the installation of the tags: this avoids any preliminary identification or a particular configuration (the system does not obey strict installation and calibration rules).
- the system issues alerts in any situation:
- the system put in place-also wants to be resilient, namely that it is able to self-diagnose continuously in order to detect the displacement or the breakdown of any beacon B and to transmit the information to the stakeholders, if necessary.
- the markup being communicating; it can therefore, actively, notify all stakeholders, even in case of confusion.
- phase P2 it will be noted that it is possible to provide a display S5 of the numerical model of the working environment ZT, the marking of the danger zone ZD and the relative position of the operator.
- This display can also take account of geolocation information from a GPS or other in the communication terminal.
- FIG. 4 illustrates the use of a system 100 according to the present invention for securing a mobile worksite ZT such as a construction site on a motorway-type VC traffic lane (for example pruning, repairing roads, maintenance of lighting or painting of the roadway, etc.).
- a mobile worksite ZT such as a construction site on a motorway-type VC traffic lane
- pruning, repairing roads, maintenance of lighting or painting of the roadway, etc. for example pruning, repairing roads, maintenance of lighting or painting of the roadway, etc.
- the movement of the danger zone necessarily implies the displacement of the beacons as well as that of the concentrator. This movement of the danger zone also implies a reconfiguration and / or recalibration thereof to redefine the new danger zone.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Networks & Wireless Communication (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- Economics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Educational Administration (AREA)
- Data Mining & Analysis (AREA)
- Development Economics (AREA)
- Primary Health Care (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Game Theory and Decision Science (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Emergency Alarm Devices (AREA)
- Alarm Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1763293A FR3076419B1 (fr) | 2017-12-28 | 2017-12-28 | Securisation d'un environnement de travail a l'aide d'au moins une balise electronique et d'une etiquette electronique |
PCT/FR2018/053550 WO2019129997A1 (fr) | 2017-12-28 | 2018-12-26 | Sécurisation d'un environnement de travail a l'aide d'au moins une balise électronique et d'une étiquette électronique |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3732905A1 true EP3732905A1 (fr) | 2020-11-04 |
Family
ID=62597558
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP18845440.9A Withdrawn EP3732905A1 (fr) | 2017-12-28 | 2018-12-26 | Sécurisation d'un environnement de travail a l'aide d'au moins une balise électronique et d'une étiquette électronique |
Country Status (5)
Country | Link |
---|---|
US (1) | US20210056654A1 (fr) |
EP (1) | EP3732905A1 (fr) |
CA (1) | CA3087108A1 (fr) |
FR (1) | FR3076419B1 (fr) |
WO (1) | WO2019129997A1 (fr) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3964911B1 (fr) * | 2020-09-03 | 2023-08-02 | Volvo Autonomous Solutions AB | Procédé de commande d'un schéma de travail d'une machine de travail autonome sur un chantier |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9494674B2 (en) * | 2014-03-03 | 2016-11-15 | Safetracks Gps Canada Inc. | Personal locator beacon system |
US9544551B2 (en) * | 2014-09-29 | 2017-01-10 | Tyco Fire & Security Gmbh | Store intelligence platform using proximity sensing |
US10162043B2 (en) * | 2015-07-16 | 2018-12-25 | Sensormatic Electronics, LLC | Optical locating system |
-
2017
- 2017-12-28 FR FR1763293A patent/FR3076419B1/fr active Active
-
2018
- 2018-12-26 CA CA3087108A patent/CA3087108A1/fr not_active Abandoned
- 2018-12-26 EP EP18845440.9A patent/EP3732905A1/fr not_active Withdrawn
- 2018-12-26 WO PCT/FR2018/053550 patent/WO2019129997A1/fr unknown
- 2018-12-26 US US16/958,456 patent/US20210056654A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
US20210056654A1 (en) | 2021-02-25 |
FR3076419A1 (fr) | 2019-07-05 |
WO2019129997A1 (fr) | 2019-07-04 |
FR3076419B1 (fr) | 2023-03-24 |
CA3087108A1 (fr) | 2019-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11789460B2 (en) | Self-driving vehicle systems and methods | |
US10269255B2 (en) | Unmanned aircraft systems and methods | |
US11866046B2 (en) | Smart traffic control devices and beacons, methods of their operation, and use by vehicles of information provided by the devices and beacons | |
CN106023657A (zh) | 用于实现受限操作区域的系统、方法和交通工具 | |
US9053625B2 (en) | System and method for group tracking | |
EP3123195B1 (fr) | Systeme de protection de personnes sur chantier par localisation precise | |
CN107210000A (zh) | 用于限制无人机空域访问的系统和方法 | |
US20100057336A1 (en) | System and method for road map creation | |
WO2018102280A1 (fr) | Système de sécurité distribué utilisant le suivi de position | |
CA2668459A1 (fr) | Systeme de badges lumineux de protection, de securite et de suivi des deplacements | |
US11685376B2 (en) | Smart traffic control devices and beacons, methods of their operation, and use by vehicles of information provided by the devices and beacons | |
EP3394845B1 (fr) | Procede de signalisation d'un accident par un drone de signalisation | |
US20190221083A1 (en) | Wireless beacon tracking system for merchandise security | |
US11830366B2 (en) | Using geofences to restrict vehicle operation | |
Noei et al. | Reducing traffic congestion using geo-fence technology: application for emergency car | |
EP3732905A1 (fr) | Sécurisation d'un environnement de travail a l'aide d'au moins une balise électronique et d'une étiquette électronique | |
US20220148421A1 (en) | Instrumented Traffic Cones for 5G/6G Networking | |
WO2012176022A1 (fr) | Détermination d'un trajet traversé par un dispositif de communication mobile | |
US9002376B2 (en) | Systems and methods for gathering information about discrete wireless terminals | |
GB2599465A (en) | System and method for tracking personnel | |
Reclus | Geofencing | |
KR102349465B1 (ko) | 이동체의 위치에 대한 안전 지수 제공 장치 | |
FR2943163A1 (fr) | Dispositif de localisation spatiale, emetteur de reference et systeme de localisation associes | |
BE1022656B1 (fr) | Cloture virtuelle pour chiens | |
EP1481380B1 (fr) | Procede et dispositif d'un balise signaletique |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20200630 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
RBV | Designated contracting states (corrected) |
Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: XP DIGIT |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20220701 |