EP3825972B1 - Smoke detection system - Google Patents

Smoke detection system Download PDF

Info

Publication number
EP3825972B1
EP3825972B1 EP19210470.1A EP19210470A EP3825972B1 EP 3825972 B1 EP3825972 B1 EP 3825972B1 EP 19210470 A EP19210470 A EP 19210470A EP 3825972 B1 EP3825972 B1 EP 3825972B1
Authority
EP
European Patent Office
Prior art keywords
computing device
mobile computing
group
test
self
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP19210470.1A
Other languages
German (de)
French (fr)
Other versions
EP3825972A1 (en
Inventor
Reinhard Muth
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to EP19210470.1A priority Critical patent/EP3825972B1/en
Publication of EP3825972A1 publication Critical patent/EP3825972A1/en
Application granted granted Critical
Publication of EP3825972B1 publication Critical patent/EP3825972B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B17/00Fire alarms; Alarms responsive to explosion
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/12Checking intermittently signalling or alarm systems
    • G08B29/14Checking intermittently signalling or alarm systems checking the detection circuits
    • G08B29/145Checking intermittently signalling or alarm systems checking the detection circuits of fire detection circuits
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/18Prevention or correction of operating errors
    • G08B29/181Prevention or correction of operating errors due to failing power supply

Definitions

  • the invention relates to smoke detection systems.
  • Smoke detectors can provide a warning when a fire has started inside of a building. To ensure that smoke detectors are functioning properly they should be tested at regular intervals.
  • International patent application publication WO2019079862A1 discloses methods of determining a likely end of life of a detector of a fire protection system, such as a smoke detector, comprise acquiring a plurality of measurements of an obscuration value of the detector from a fire indicator panel (FIP) and calculating a rate of contamination of the detector based on the plurality of measurements of the obscuration value.
  • the methods comprise determining a likely end of life of the detector based on the calculated rate of contamination of the detector and a nominal end of life (EOL) value for the detector set by a manufacturer of the detector.
  • EOL nominal end of life
  • United States patent application US 2018/0114431 A1 describes a method of sensor communication testing.
  • a sensor comprising a wireless transmitter configured to generate a radio-frequency (RF) signal, an RF attenuator configured to direct the RF signal in a pre-determined direction, and a controller configured to receive a self-test command to execute a communication test, send a communication test signal to a sensor panel in response to the self-test command, and receive a communication test response signal from the sensor panel in response to the communication test signal, where the communication test response signal indicates whether the sensor has passed or failed the communication test.
  • RF radio-frequency
  • United States patent application US 2019/088109 A1 describes a service management system that validates service on building management systems.
  • Devices of the building management systems include wireless transmitters (for example, radiofrequency identification (RFID) tags) for transmitting wireless signals containing identification information.
  • RFID radiofrequency identification
  • a technician reads the identification information using a mobile computing device (for example, an RFID reader) while also recording the signal strength of the wireless signals.
  • the mobile computing device sends the identification information and signal strength information to a connected services system along with information about the service, and a validation module confirms that the identification information and signal strength information indicates that the technician was actually in the vicinity of the devices that were serviced.
  • the invention provides for a smoke detector system, a computer program product, and a method of operating a smoke detector system in the independent claims. Embodiments are given in the dependent claims.
  • Embodiments may provide for an improved smoke detector system.
  • a group of smoke detector establishes a wireless communication channel with a personal mobile computing device. This eliminates the need for a central control panel.
  • the personal mobile computing device requests a self-test from the group of smoke detectors and receives self-test data in response.
  • the personal mobile computing device then sends the self-test data to a computer via a wireless internet connection.
  • the smoke detectors are firstly not connected directly to the internet. This may reduce the risk that hackers access the smoke detectors. It also enables lower energy protocols to be used for forming the wireless communication channel.
  • the invention provides for a smoke detector system, as described in claim 1, that comprises a computer.
  • the smoke detector system further comprises a personal mobile computing device.
  • the personal mobile computing device is configured to connect to the computer via a wireless internet connection.
  • the personal mobile computing device comprises a first wireless communication module.
  • the smoke detector system further comprises a group of smoke detectors that comprise a second wireless communication module. Each of smoke detectors comprises their own second wireless communication module.
  • the group of smoke detectors are configured for performing a self-test.
  • the smoke detectors are configured for testing the condition of a battery supplying power to each of the smoke detectors.
  • the smoke detectors may also be configured for performing a self-test of a smoke detecting element or sensor.
  • the group of smoke detectors are configured for acquiring self-test data measured during the self-test.
  • the self-test data provides such data as a battery voltage or level.
  • the self-test data may also include data measured with one or more sensors during the self-test. This may include such things as measurements which may be used for determining the condition of a smoke sensor.
  • the personal mobile computing device is configured for directly forming the wireless communication channel with the group of smoke detectors.
  • directly forming the communication channel means that the wireless communication channel is formed between the personal mobile computing device and the group of smoke detectors without any intermediate computer or other system forming a part of the wireless communication channel.
  • the personal mobile computing device forms the wireless communication channel with each of the group of smoke detectors individually. Instead of connecting through a remote server or other device the personal mobile computing device is able to communicate with the smoke detectors of the group of smoke detectors via the wireless communication channel.
  • the personal mobile computing device is configured for requesting the self-test from the group of smoke detectors via the wireless communication channel.
  • the personal mobile computing device forms the wireless communication channel with each of the group of smoke detectors and then request the self-test from each of the group of smoke detectors.
  • the personal mobile computing device is configured for receiving the self-test data from the group of smoke detectors via the wireless communication channel in response to requesting the self-test.
  • the personal mobile computing device is configured for sending the self-test data to the computer via the wireless internet connection.
  • the personal mobile computing device functions as an intermediary between the group of smoke detectors and the computer. This may have the advantage of enabling the computer to receive the self-test data without the need of an internet connection between the computer and the group of smoke detectors. This may for example have advantages in the longevity of battery life of the group of smoke detectors.
  • the personal mobile computing device may form a low energy wireless communication channel in some examples. If for example the group of smoke detectors were connected to the computer via a Wi-Fi connection the maintenance of this Wi-Fi connection may drain the batteries of the group of smoke detectors rapidly. Using the personal mobile computing device may therefore provide for a reduced consumption of energy by the group of smoke detectors. Connecting the group of smoke detectors through the personal mobile computing device may also provide for additional security of the group of smoke detectors.
  • the group of smoke detectors are not able to be contacted directly via the internet.
  • the security of the personal mobile computing device may then be used to protect the group of smoke detectors. Additionally the user of the personal mobile computing device does not need to enable communication with the group of smoke detectors constantly.
  • a personal mobile computing device as used herein may encompass a battery powered computing device that may be carried by a single person. This may for example be a so called smartphone or a tablet or a laptop or netbook computer.
  • the wireless internet connection could be provided via different ways. For example this may be provided via a Wi-Fi system or even a data connection over a cellular network.
  • the first communication module may also be used for forming the wireless internet connection but in some examples it may be different.
  • the first wireless communication module may use for example Bluetooth to communicate with the group of smoke detectors.
  • the self-test data comprises a time stamp and/or a cryptographic signature.
  • the time stamp may be useful for identifying when the test of the group of smoke detector took place.
  • the cryptographic signature may be useful to verify that the self-test data is authentic.
  • the time stamp and/or cryptographic signature may be added by the group of smoke detectors.
  • the time stamp and/or cryptographic signature may be appended to the self-test data by the personal mobile computing device.
  • the computer is configured for generating a test summary report for the group of smoke detectors by inputting the self-test data into a report generation module.
  • the report generation module may for example comprise machine-executable code that receives the self-test data and then calculates or generates the test summary. This for example may include such things as receiving raw sensor data and then analyzing this raw sensor data to determine if the sensor is functioning properly.
  • the report generation module may also receive other data which is descriptive of the operation of a smoke detector and use this to establish if the smoke detector and its sensors are functioning properly.
  • test summary report may, for example be a summary of the operational status and function of the smoke detectors at the time the self-test data was acquired.
  • the test summary report may also be formatted to conform with regulatory requirements.
  • the test summary report may also be digitally signed by the computer to validate its origin and/or authenticity.
  • test summary report is not just the result of the self-test, the self-test data is evaluated by the computer to generate the test summary report, not the smartphone. This may reduce the amount of complicated software on the personal mobile computing device and the group of smoke detectors. This may also enables a big data approach on the server: data from multiple groups of smoke detectors may be analyzed.
  • the computer is further configured for generating a task completion signal after generating the test summary report. After the test summary report has been generated the smoke detector system may then generate the task completion signal.
  • the computer is then further configured for sending the task completion signal to the personal mobile computing device via the wireless communication channel. This for example may be useful in forming a closed control loop that enables the user of the personal mobile computing device to understand when the test summary report has been completed.
  • the personal mobile computing device can be connected intermittently or only when selected to communicate with the group of smoke detectors via the wireless communication channel. When the personal mobile computing device receives the task completion signal then the personal mobile computing device can for example disconnect or deactivate the wireless communication channel.
  • the smoke detector system comprises multiple of the group of smoke detectors.
  • the computer stores a self-test database that comprises self-test data from the multiple of the group of smoke detectors. For example, within a building or across different buildings there may be different and independent groups of smoke detectors. Each of these may connect to the computer via the personal mobile computing device or different personal mobile computing devices. For example there could be a personal mobile computing device that is able to pair or connect with each group of smoke detectors.
  • This embodiment may be beneficial because the data from the self-test for each of the multiple of the group of smoke detectors may be located on the single computer. This may be useful for centrally generating the test report summary for each group. It may also be useful because the self-test data is collected and stored in a single location. This may facilitate analyzing the self-test data and recognizing patterns which may help improve the maintenance or maintaining of the various groups of smoke detectors.
  • the computer is configured for generating a maintenance schedule for the group of smoke detectors by inputting at least a portion of the self-test database into a control system module.
  • the control system module may contain computer-executable instructions that are used to cause a processor of the computer to check various conditions of the smoke detectors using a predetermined set of criterion or examine the self-test database for patterns.
  • the control system module may in some examples comprise a neural network, a machine learning module, an expert system, and/or predetermined logic. This embodiment may be beneficial because the collection of the self-test database may be useful in maintaining the multiple groups of smoke detectors.
  • the computer is configured for generating a shipping order to ship repair parts to a location of the group of smoke detectors at a chosen time determined by the maintenance schedule.
  • the computer may send the shipping order to a logistic center or order it online.
  • the computer is further configured for detecting a delivery of the repair parts to the location. Often times when a logistics or delivery company delivers a package a message may be sent to an account that ordered the shipping of the repair parts.
  • the computer may for example be configured for receiving this message directly or for checking the account to see if the repair parts have been delivered.
  • the computer is further configured for displaying maintenance instructions on the user interface of the mobile computing device via the wireless communication channel after detecting the delivery of the repair parts. For example, once the computer detects that the repair parts have been delivered to the location a message or messages may be sent to the personal mobile computing device which either comprise instructions or trigger the instructions to be displayed by the personal mobile computing device. This may for example be beneficial in a situation where the group of smoke detectors is installed in an apartment and the personal mobile computing device is for example a smartphone of a tenant.
  • the computer is further configured for detecting when the repair parts have been installed in the group of smoke detectors. This may be used for forming a control loop to ensure that the operator of the personal mobile computing device does in fact repair the group of smoke detectors.
  • the group of smoke detectors comprises an elevator smoke detector mounted in an elevator shaft of an elevator. This embodiment may be beneficial because it may be difficult or inconvenient to perform a self-test of a smoke detector which is located in an elevator shaft.
  • the elevator smoke detector is located in the overhead of the elevator shaft.
  • an overhead of an elevator shaft is the space at the top or upper most portion of the elevator shaft. This contains a space into which the elevator does not travel and may be useful for mounting equipment. Also, if there is a fire at some location within the elevator shaft, the hot air and smoke from the fire will naturally rise to the top part of the elevator shaft or the overhead. Placing a smoke detector there ensures that a fire within then elevator shaft will be rapidly detected.
  • Mounting the elevator smoke detector in the overhead may also have the advantage that is facilitates forming the wireless communication channel between the personal mobile computing device and the elevator smoke detector.
  • the door of the elevator is open, there is a gap between the space above the elevator and the open elevator. This provides an unshielded region between the personal mobile communication device and the elevator smoke detector.
  • the elevator comprises a door.
  • the mobile computing device is configured for detecting when the door is at least partially open. This detection may be performed in a variety of ways.
  • the door of the elevator may be of metal and may partially shield or entirely block the wireless communication channel.
  • the mobile computing device may detect that the door is at least partially open because the signal strength of the wireless communication channel increases.
  • such things as a sensor may be installed in the door which communicates with the mobile computing device or the mobile computing device may have a camera which may be used in detecting optically when the door is at least partially open.
  • the personal mobile computing device is further configured for establishing the mobile communication channel with the elevator smoke detector when the door of the elevator is at least partially open. This embodiment may be beneficial because it may enable the convenient acquisition of the self-test data from the smoke detector in the overhead of the elevator shaft.
  • each of the group of smoke detectors comprises a unique identifier code.
  • the computer is configured for storing a configuration database that comprises configuration data.
  • the personal mobile computing device configured for establishing the wireless communication channel with the group of smoke detectors by configuring the first wireless communication module with the configuration data.
  • the personal mobile computing device is configured for receiving the unique identifier code of a selected smoke detector selected from any of the group of smoke detectors.
  • the personal mobile computing device is configured for sending a configuration request to the computer via the wireless internet connection where in the configuration request comprises the unique identifier code of the selected smoke detector.
  • the computer is configured for selecting the configuration data from a configuration data database by searching the configuration data database for the unique identifier code.
  • the computer is configured for sending the configuration data to the personal mobile computing device via the wireless internet connection in response to receiving the configuration request with the unique identifier code of the selected smoke detector.
  • the personal mobile computing device is configured for configuring the first wireless communication module with the configuration data.
  • the configuration data which is stored on the computer is used for configuring the personal mobile computing device so that it is able to form the wireless communication channel with the group of smoke detectors. It does this by acquiring and receiving one unique identifier code from the group of smoke detectors. This may be beneficial because it enables the operator of the personal mobile computing device to more easily acquire the self-test data because the operator does not need to establish a pairing with each of the group of smoke detectors individually.
  • the initial mobile computing device comprises a third wireless communication module.
  • the initial mobile computing device is configured to connect to the computer via the wireless internet connection.
  • the initial mobile computing device is configured for generating pairing data during a wireless pairing with the group of smoke detectors via the second wireless communication module and the third wireless communication module.
  • the initial mobile computing device is configured for receiving the unique identifier code during the wireless pairing.
  • the initial mobile computing device is configured for receiving location data descriptive of a location of the group of smoke detectors via a user interface. This may for example include the location of different smoke detectors of the group of smoke detectors and their position in different rooms.
  • the initial mobile computing device is configured for constructing the configuration data from the unique identifier and the pairing data.
  • the initial mobile computing device is configured for transferring the configuration data to the computer via the wireless internet connection.
  • the computer is configured for appending the configuration data to the configuration data database.
  • an initial mobile computing device is used to establish the pairing between the initial mobile computing device and the different smoke detectors of the group of smoke detectors. This is then used to construct the configuration data which is then stored in the computer. This enables the personal mobile computing device to then later retrieve this configuration data and with a single unique identifier code from the group of smoke detectors to form the wireless communication channel. This for example may include the ability to form a Bluetooth connection with each of the group of smoke detectors.
  • the group of smoke detectors comprises a test activation element.
  • the selected smoke detector is configured for transmitting the unique identifier code with the second wireless communication module in response to an activation of the test activation element.
  • the test activation element may be a button or switch on a smoke detector which may be operated. When this test activation element is operated then the unique identifier code of that smoke detector is transmitted.
  • the personal mobile computing device may receive this unique identifier code and then contact the computer via the internet and retrieve the proper configuration data using the unique identifier code to reference the correct configuration data.
  • the group of smoke detectors comprises an optical identifier that uniquely identifies the unique identifier code.
  • a barcode or QR code could be printed on the face of each of the smoke detectors.
  • the optical identifier is visible when the group of smoke detectors are in an operational position. This may mean that when each are in operational position.
  • the personal mobile computing device comprises a camera.
  • the personal mobile computing device is configured for determining the unique identifier code from the optical identifier imaging the optical identifier with the camera. For example, if there is a barcode or QR code or other writing or markings on the individual smoke detectors the operator may control the personal mobile computing device to image the smoke detector. The personal mobile computing device may then use this optical image to generate or determine the unique identifier code.
  • the personal mobile computing device is configured for forming the wireless communication channel with the group of smoke detectors in response to receiving a test request.
  • This embodiment may be beneficial because the personal mobile computing device does not form the wireless communication channel unless it is desired to perform a self-test. This may provide for reduced energy consumption as well as better security for the group of smoke detectors.
  • the personal mobile computing device is configured to generate the test request in response to a user input.
  • a user input For example there may be a dialogue box or user interface on the personal mobile computing device where the operator can manually cause the test request to be initiated.
  • the computer is configured for sending a test request to the personal mobile computing device via the wireless internet connection.
  • the computer may centrally schedule when the group of smoke detectors should be tested using the self-test. This for example may be useful in forming an automatic control loop for testing and/or repairing the group of smoke detectors.
  • the personal mobile computing device is configured for automatically generating the test request according to a predetermined schedule.
  • a predetermined schedule For example there may be calendar data or other data which is included on an application or program of the personal mobile computing device which causes the test request to be initiated according to the predetermined schedule.
  • the personal mobile computing device is configured for displaying a test request pop-up in response to receiving the test request.
  • the test request pop-up comprises a delay selector configured for delay information of the wireless communication channel with the group of smoke detectors.
  • the personal mobile computing device may be away from the group of smoke detectors and the operator may delay until it is possible to perform the self-test. Also for other reasons the operator may wish to perform the self-test at a different time.
  • the test request pop-up comprises a device selector configured for selecting one smoke detector of the group of smoke detectors to initiate forming the wireless communication channel.
  • the personal mobile computing device may connect in some examples to each of the set of smoke detectors individually.
  • the use of the device selector may enable the personal mobile computing device to query or test the group of smoke detectors individually and in a predetermined or sequential order.
  • the wireless communication channel is a Bluetooth wireless communication channel.
  • the wireless communication channel is a Bluetooth LE or low energy wireless communication channel.
  • the wireless communication channel is a wireless communication channel with a maximum power of 100 mW.
  • the wireless communication channel is a wireless communication channel with a maximum power of 2.5 mW.
  • the wireless communication channel is a wireless communication channel with a maximum power of 1 mW.
  • the invention provides for a computer program product, as described in claim 11, comprising machine-executable instructions for execution by a processor controlling a mobile computing device.
  • the personal mobile computing device comprises a first wireless communication module.
  • Execution of the machine-executable instructions causes the processor to form the wireless communication channel with a group of smoke detectors with the first wireless communication module. This may be with the group of smoke detectors as a whole or it may include individual pairings with each of the group of smoke detectors.
  • Execution of the machine-executable instructions further causes the processor to request a self-test of the group of smoke detectors via the wireless communication channel. Again this may be a request which is sent to all the group or it may be with each of the group of smoke detectors sequentially.
  • Execution of the machine-executable instructions further causes the processor to receive self-test data from the group of smoke detectors via the wireless communication channel in response to requesting the self-test.
  • Execution of the machine-executable instructions further causes the processor to connect to a computer via a wireless internet connection.
  • Execution of the machine-executable instructions further causes the processor to send the self-test data to the computer via the wireless internet connection.
  • This computer program product may for example be beneficial because it may provide for a means of providing the self-test data from a group of smoke detectors that are not connected directly with the computer.
  • the invention provides for a method of operating a smoke detector system as described in claim 12.
  • aspects of the present invention may be embodied as an apparatus, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a "circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer executable code embodied thereon.
  • the computer readable medium may be a computer readable signal medium or a computer readable storage medium.
  • a 'computer-readable storage medium' as used herein encompasses any tangible storage medium which may store instructions which are executable by a processor of a computing device.
  • the computer-readable storage medium may be referred to as a computer-readable non-transitory storage medium.
  • the computer-readable storage medium may also be referred to as a tangible computer readable medium.
  • a computer-readable storage medium may also be able to store data which is able to be accessed by the processor of the computing device.
  • Examples of computer-readable storage media include, but are not limited to: a floppy disk, a magnetic hard disk drive, a solid state hard disk, flash memory, a USB thumb drive, Random Access Memory (RAM), Read Only Memory (ROM), an optical disk, a magnetooptical disk, and the register file of the processor.
  • Examples of optical disks include Compact Disks (CD) and Digital Versatile Disks (DVD), for example CD-ROM, CD-RW, CD-R, DVD-ROM, DVD-RW, or DVD-R disks.
  • the term computer readable-storage medium also refers to various types of recording media capable of being accessed by the computer device via a network or communication link.
  • a data may be retrieved over a modem, over the internet, or over a local area network.
  • Computer executable code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wire line, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
  • a computer readable signal medium may include a propagated data signal with computer executable code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof.
  • a computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
  • Computer memory is any memory which is directly accessible to a processor.
  • a 'processor' as used herein encompasses an electronic component which is able to execute a program or machine executable instruction or computer executable code.
  • References to the computing device comprising "a processor” should be interpreted as possibly containing more than one processor or processing core.
  • the processor may for instance be a multi-core processor.
  • a processor may also refer to a collection of processors within a single computer system or distributed amongst multiple computer systems.
  • the term computing device should also be interpreted to possibly refer to a collection or network of computing devices each comprising a processor or processors.
  • the computer executable code may be executed by multiple processors that may be within the same computing device or which may even be distributed across multiple computing devices.
  • Computer executable code may comprise machine executable instructions or a program which causes a processor to perform an aspect of the present invention.
  • Computer executable code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages and compiled into machine executable instructions.
  • object oriented programming language such as Java, Smalltalk, C++ or the like
  • conventional procedural programming languages such as the "C" programming language or similar programming languages and compiled into machine executable instructions.
  • the computer executable code may be in the form of a high level language or in a pre-compiled form and be used in conjunction with an interpreter which generates the machine executable instructions on the fly.
  • the computer executable code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
  • the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
  • the computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • a ⁇ user interface' as used herein is an interface which allows a user or operator to interact with a computer or computer system.
  • a 'user interface' may also be referred to as a 'human interface device.
  • a user interface may provide information or data to the operator and/or receive information or data from the operator.
  • a user interface may enable input from an operator to be received by the computer and may provide output to the user from the computer.
  • the user interface may allow an operator to control or manipulate a computer and the interface may allow the computer indicate the effects of the operator's control or manipulation.
  • the display of data or information on a display or a graphical user interface is an example of providing information to an operator.
  • the receiving of data through a keyboard, mouse, trackball, touchpad, pointing stick, graphics tablet, joystick, gamepad, webcam, headset, pedals, wired glove, remote control, and accelerometer are all examples of user interface components which enable the receiving of information or data from an operator.
  • a 'hardware interface' as used herein encompasses an interface which enables the processor of a computer system to interact with and/or control an external computing device and/or apparatus.
  • a hardware interface may allow a processor to send control signals or instructions to an external computing device and/or apparatus.
  • a hardware interface may also enable a processor to exchange data with an external computing device and/or apparatus. Examples of a hardware interface include, but are not limited to: a universal serial bus, IEEE 1394 port, parallel port, IEEE 1284 port, serial port, RS-232 port, IEEE-488 port, Bluetooth connection, Wireless local area network connection, TCP/IP connection, Ethernet connection, control voltage interface, MIDI interface, analog input interface, and digital input interface.
  • a 'display' or ⁇ display device' as used herein encompasses an output device or a user interface adapted for displaying images or data.
  • a display may output visual, audio, and or tactile data.
  • Examples of a display include, but are not limited to: a computer monitor, a television screen, a touch screen, tactile electronic display, Braille screen, Cathode ray tube (CRT), Storage tube, Bi-stable display, Electronic paper, Vector display, Flat panel display, Vacuum fluorescent display (VF), Light-emitting diode (LED) displays, Electroluminescent display (ELD), Plasma display panels (PDP), Liquid crystal display (LCD), Organic light-emitting diode displays (OLED), a projector, and Head-mounted display.
  • VF Vacuum fluorescent display
  • LED Light-emitting diode
  • ELD Electroluminescent display
  • PDP Plasma display panels
  • LCD Liquid crystal display
  • OLED Organic light-emitting diode displays
  • Fig. 1 illustrates a functional diagram of a smoke detector 100.
  • the smoke detector 100 comprises a processor 102.
  • the smoke detector 100 is powered by a battery 104.
  • the smoke detector 100 also comprises an internal memory 106, a smoke detector component 108, a self-test component 110, and a second wireless communication module 112 that are each connected to the processor 102.
  • the smoke detector 100 is further shown as containing an optional environmental sensor 114 which is also connected to the processor 102.
  • the smoke detector component 108 may be used for detecting smoke and/or heat for detecting a fire.
  • the self-test component 110 contains components for testing the smoke detector component 108.
  • the second wireless communication module 112 may for example be useful for establishing a wireless communication channel with a personal mobile computing device.
  • the optional environmental sensor 114 may be used to optionally gather data descriptive of the environment around the smoke detector 100.
  • the self-test component 110 may also contain components which may be used to verify the correct placement and operation of the smoke detector 100. For example, the self-test component 110 may also contain a proximity sensor to determine if the smoke detector 100 is placed too close to a wall or other structure.
  • the self-test component 110 may also contain components for measuring the voltage or capacity of the battery 104.
  • the internal memory 106 is shown as containing machine-executable instructions 120. These machine-executable instructions 120 enable the processor 102 to perform various operational tasks in running the smoke detector 100 and also for performing various methods of controlling the smoke detector 100. For example the machine-executable instructions 120 may implement a routine to self-test the smoke detector 100.
  • the memory 106 is further shown as containing a self-test request 122 that the smoke detector 100 has received via the second wireless communication module 112. The reception of the self-test request 122 may cause the machine-executable instructions 120 to execute a self-test routine.
  • the machine-executable instructions 120 then control the other components such as the self-test component 110 to acquire self-test data 124.
  • the self-test data 124 can for example be used to provide the self-test data 124 over the second wireless communication module 112.
  • the smoke detector 100 is further shown as containing environmental sensor data 126 that has been acquired by the environmental sensor 114.
  • the environmental sensor data 126 may also be acquired by external environmental sensors that communicate with the smoke detector 100 via the second wireless communication module 112.
  • the memory 106 is further shown as containing a unique identifier code 128.
  • the smoke detector 100 is further shown as containing an optional test activation element 118.
  • the test activation element 118 may be a button on an external surface of the smoke detector 100 which causes the smoke detector to test itself.
  • the processor 102 can be programmed to transmit the unique identifier code 128 via the second wireless communication module 112. This for example may be useful in pairing the smoke detector 100 with other devices.
  • Fig. 2 illustrates an example of a personal mobile computing device 200.
  • the personal mobile computing device 200 may for example be a smartphone or a tablet in some examples.
  • the personal mobile computing device 200 comprises a display and/or user interface 202.
  • the personal mobile computing device 200 further comprises a processor 204.
  • the personal mobile computing device 200 is powered by a battery 206.
  • the personal mobile computing device 200 is shown as comprising a first wireless communication module 208 and an optional transmitter 210.
  • the first wireless communication module 208 may for example be useful for communicating with the second wireless communication module 112 of the smoke detector 100.
  • the transmitter 210 may in some instances be a cellular communication transmitter used for communicating with a cellular network such as used for telephones.
  • the transmitter 210 may provide access to a mobile data network and the internet.
  • the transmitter 210 may comprise a transmitter which is adapted for connecting to a Wi-Fi system.
  • the transmitter 210 in this case may also provide access to the internet.
  • the personal mobile computing device 200 is further shown as containing a memory 212.
  • the display and/or user interface 202, the first wireless communication module 208, the transmitter 210, and the memory 212 are connected to the processor 204.
  • the memory 212 is shown as containing machine-executable instructions 214 which enable the processor 204 to control the operation and function of the personal mobile computing device 200.
  • the memory 212 is further shown as containing a test request 216.
  • the test request 216 may for example have been generated by the personal mobile computing device 200 or it may for example have been received via the transmitter 210.
  • the personal mobile computing device 200 then generates a self-test request 122 and sends it to the smoke detector 100 via a wireless communication channel formed by the first wireless communication module 208 and the second wireless communication module 112.
  • the memory 212 is further shown as containing pairing data and/or configuration data 218 which enables configuration of the first wireless communication module 208 so it is able to communicate with the second wireless communication module 212.
  • Fig. 3 shows a flowchart which illustrates a method of operating the mobile computing device 200.
  • a wireless communication channel is formed with a group of smoke detectors with the first wireless communication module 208. This may be done by forming a wireless communication channel with the individual second wireless communication modules 112 of the individual smoke detectors 100.
  • a self-test request 122 of the group of smoke detectors 100 is requested via the wireless communication channel in response to requesting the self-test.
  • the first wireless communication module 208 receives the self-test data 124 via the wireless communication channel in response to requesting the self-test 122.
  • the processor 204 controls the personal mobile computing device 200 to connect to a computer via a wireless internet connection.
  • the wireless internet connection may for example be formed using the transmitter 210.
  • wireless internet connection it is implied that a portion of the internet connection is formed via a wireless transmitter and receiver.
  • An example is the use of the transmitter 210.
  • the first wireless communication module 208 and the transmitter 210 may be the same component.
  • the processor 204 controls the transmitter 210 to send the self-test data 124 to the computer via the wireless internet connection.
  • Fig. 4 illustrates an example of a smoke detector system 400.
  • the smoke detector system 400 comprises a group of smoke detectors 402. It also comprises the personal mobile computing device 200 and a computer 404.
  • the computer 404 comprises a processor 406 which is connected to a network interface 408 and a memory 410.
  • the group of smoke detectors 402 forms a wireless communication channel 412 with the personal mobile computing device 200.
  • the network interface 408 and the transmitter 210 are used to form at least a portion of a wireless internet connection 414.
  • the memory 410 is shown as containing machine-executable instructions 420 that enable the processor 406 to control and operate the computer system 404.
  • the memory 410 is further shown as containing self-test data 124 that is received via the network interface 408.
  • the memory 410 is further shown as containing a report generation module 422.
  • the report generation module 422 takes the self-test data 124 as input and then exports a test summary report 424.
  • the test summary report 424 may for example contain a report which summarizes the function and status of the group of smoke detectors 402.
  • the processor 406 constructs or generates a task completion signal 426 which is then sent to the mobile computing device 200 via the wireless internet connection 414. This for example may cause a message on the display 202 informing the user that the group of smoke detectors 402 has been tested.
  • the memory 410 is shown as containing an optional configuration data database 428.
  • the optional configuration data database 428 contains configuration data 218 for different groups of smoke detectors 402.
  • the computer 404 may be used to connect to a variety or a number of different groups 402 of smoke detectors.
  • One of the smoke detectors 100 may send a unique identifier 128 to the personal mobile computing device 200 which then transmits it to the computer 404 via the wireless internet connection 414.
  • the processor 406 searches the configuration data database for the unique identifier 128. This is used to reference and then retrieve the configuration data 218.
  • the configuration data 218 can for example be forwarded to the personal mobile computing device 200 via the wireless internet connection 414. This may enable the personal mobile computing device 200 to reuse a previous pairing with the group of smoke detectors 402.
  • Fig. 5 shows a further view of the smoke detector system 400.
  • an initial mobile computing device 500 which has established the wireless communication channel 412 with the individual smoke detectors 100 of the group of smoke detectors 402. This for example was performed by performing a pairing operation between the initial mobile computing device 500 and the smoke detectors 100. This for example may be time consuming and involve data entry on the part of the operator of the initial mobile computing device 500.
  • the initial mobile computing device 500 then sends the configuration data 218 to the processor 406 of the computer 404 via the mobile internet connection 414.
  • the processor 406 then appends or enters the configuration data 218 into the configuration data database 428.
  • a unique identifier 128 of one of the smoke detectors 100 can be used to retrieve the configuration data 218 and then later configure the personal mobile computing device 200 to form the wireless communication channel 412.
  • Fig. 6 illustrates a further example of a smoke detector system 600.
  • the smoke detector system 600 is similar to the smoke detector system 400 illustrated in Fig. 5 except there are additionally a larger number of groups of smoke detectors 402, 402', 402" that are connected to the computer 404 via individual personal mobile communication devices 200, 200', 200".
  • Each of the personal mobile computing devices 200, 202', 202" send self-test data 124, 124', 124" from their groups of smoke detectors 402, 402', 402".
  • the self-test data 124 is provided by group of smoke detectors 402.
  • the self-test data 124' is provided by the group of smoke detectors 402'.
  • the self-test data 124" is provided by the group of smoke detectors 402".
  • the processor 402 then copies or appends the self-test data 124, 124', 124" into a self-test database 602. At least a portion of the self-test database 602 is input into a control system module 604. This for example may be an expert system, a rule-based system, and/or a machine learning-based system which then outputs a maintenance schedule 606 for one or more of the group of smoke detectors 402, 402', 402".
  • the processor 406 is able to generate a shipping order 608 and send this to either a logistics center or order it online and have it shipped to a location or the person who is responsible for the particular group of smoke detectors 402, 402', 402".
  • a delivery receipt 610 may be provided to the processor 406 via the internet.
  • this causes the processor 406 to send maintenance instructions 612 to the personal mobile computing device 200 of the recipient of the spare parts. This may then be used to provide the maintenance instructions 612 on the display 202 to ensure that the replacement parts are properly installed.
  • the computer 404 may then request to verify additional self-test data 124, 124', 124" to ensure that the group of smoke detectors 402, 402', 402" were properly repaired.
  • Fig. 7 illustrates an example of a building.
  • the building comprises a rental unit 700, 702' and 702".
  • Rental unit 702 comprises a group of smoke detectors 402.
  • Rental unit 702' comprises group of smoke detectors 402'.
  • Rental unit 702" comprises group of smoke detectors 402".
  • Each of these smoke detectors 100 is placed in its individual room 704.
  • the building 700 in Fig. 7 could for example be an apartment building and the different rental units 702, 702', 702" are rented by different occupants.
  • an additional environmental sensor 706 that is able to communicate with one of the smoke detectors 100 of the group of smoke detectors 402".
  • 706 may be a dampness or moisture sensor or for example a radon sensor such as a radiation detector. This may then send data to the smoke detector 100 and this may be stored in the internal memory until the self-test is performed and then this may be additionally provided to the computer system 404 via the personal mobile computing device 200".
  • the building 700 is additionally shown as comprising an elevator 710.
  • the elevator has a shaft 712 with an overhead 714.
  • Within the overhead 714 of the elevator shaft 712 is an elevator smoke detector 100'.
  • the elevator smoke detector 100' may be equivalent to one of the smoke detectors 100.
  • the elevator smoke detector 100' may be connected separately to a different personal mobile computing device or in some cases it may be assigned to one of the personal mobile computing devices 200, 200' or 200".
  • Fig. 8 shows a further view of a smoke detector 100.
  • an optical identifier 800 On a surface of the smoke detector 100 is an optical identifier 800 that is visible.
  • the optical identifier 800 may for example be a machine readable optical identifier such as a QR code or barcode. This for example may be imaged by a camera of the personal mobile computing device.

Description

    Field of the invention
  • The invention relates to smoke detection systems.
  • Background and related art
  • Smoke detectors can provide a warning when a fire has started inside of a building. To ensure that smoke detectors are functioning properly they should be tested at regular intervals.
  • International patent application publication WO2019079862A1 discloses methods of determining a likely end of life of a detector of a fire protection system, such as a smoke detector, comprise acquiring a plurality of measurements of an obscuration value of the detector from a fire indicator panel (FIP) and calculating a rate of contamination of the detector based on the plurality of measurements of the obscuration value. The methods comprise determining a likely end of life of the detector based on the calculated rate of contamination of the detector and a nominal end of life (EOL) value for the detector set by a manufacturer of the detector. An apparatus and system for capturing the data for performing the methods is also disclosed.
  • United States patent application US 2018/0114431 A1 describes a method of sensor communication testing. One example includes a sensor comprising a wireless transmitter configured to generate a radio-frequency (RF) signal, an RF attenuator configured to direct the RF signal in a pre-determined direction, and a controller configured to receive a self-test command to execute a communication test, send a communication test signal to a sensor panel in response to the self-test command, and receive a communication test response signal from the sensor panel in response to the communication test signal, where the communication test response signal indicates whether the sensor has passed or failed the communication test.
  • United States patent application US 2019/088109 A1 describes a service management system that validates service on building management systems. Devices of the building management systems include wireless transmitters (for example, radiofrequency identification (RFID) tags) for transmitting wireless signals containing identification information. During service, a technician reads the identification information using a mobile computing device (for example, an RFID reader) while also recording the signal strength of the wireless signals. The mobile computing device sends the identification information and signal strength information to a connected services system along with information about the service, and a validation module confirms that the identification information and signal strength information indicates that the technician was actually in the vicinity of the devices that were serviced.
  • Summary
  • The invention provides for a smoke detector system, a computer program product, and a method of operating a smoke detector system in the independent claims. Embodiments are given in the dependent claims.
  • Embodiments may provide for an improved smoke detector system. In embodiments a group of smoke detector establishes a wireless communication channel with a personal mobile computing device. This eliminates the need for a central control panel. The personal mobile computing device requests a self-test from the group of smoke detectors and receives self-test data in response. The personal mobile computing device then sends the self-test data to a computer via a wireless internet connection. This may have several advantages. The smoke detectors are firstly not connected directly to the internet. This may reduce the risk that hackers access the smoke detectors. It also enables lower energy protocols to be used for forming the wireless communication channel.
  • In one aspect the invention provides for a smoke detector system, as described in claim 1, that comprises a computer. The smoke detector system further comprises a personal mobile computing device. The personal mobile computing device is configured to connect to the computer via a wireless internet connection. The personal mobile computing device comprises a first wireless communication module.
  • The smoke detector system further comprises a group of smoke detectors that comprise a second wireless communication module. Each of smoke detectors comprises their own second wireless communication module. The group of smoke detectors are configured for performing a self-test. The smoke detectors are configured for testing the condition of a battery supplying power to each of the smoke detectors. The smoke detectors may also be configured for performing a self-test of a smoke detecting element or sensor. The group of smoke detectors are configured for acquiring self-test data measured during the self-test. The self-test data provides such data as a battery voltage or level. The self-test data may also include data measured with one or more sensors during the self-test. This may include such things as measurements which may be used for determining the condition of a smoke sensor.
  • The personal mobile computing device is configured for directly forming the wireless communication channel with the group of smoke detectors. As used herein, directly forming the communication channel means that the wireless communication channel is formed between the personal mobile computing device and the group of smoke detectors without any intermediate computer or other system forming a part of the wireless communication channel.
  • The personal mobile computing device forms the wireless communication channel with each of the group of smoke detectors individually. Instead of connecting through a remote server or other device the personal mobile computing device is able to communicate with the smoke detectors of the group of smoke detectors via the wireless communication channel. The personal mobile computing device is configured for requesting the self-test from the group of smoke detectors via the wireless communication channel. The personal mobile computing device forms the wireless communication channel with each of the group of smoke detectors and then request the self-test from each of the group of smoke detectors. The personal mobile computing device is configured for receiving the self-test data from the group of smoke detectors via the wireless communication channel in response to requesting the self-test. The personal mobile computing device is configured for sending the self-test data to the computer via the wireless internet connection.
  • In this embodiment the personal mobile computing device functions as an intermediary between the group of smoke detectors and the computer. This may have the advantage of enabling the computer to receive the self-test data without the need of an internet connection between the computer and the group of smoke detectors. This may for example have advantages in the longevity of battery life of the group of smoke detectors. The personal mobile computing device may form a low energy wireless communication channel in some examples. If for example the group of smoke detectors were connected to the computer via a Wi-Fi connection the maintenance of this Wi-Fi connection may drain the batteries of the group of smoke detectors rapidly. Using the personal mobile computing device may therefore provide for a reduced consumption of energy by the group of smoke detectors. Connecting the group of smoke detectors through the personal mobile computing device may also provide for additional security of the group of smoke detectors. The group of smoke detectors are not able to be contacted directly via the internet. The security of the personal mobile computing device may then be used to protect the group of smoke detectors. Additionally the user of the personal mobile computing device does not need to enable communication with the group of smoke detectors constantly.
  • A personal mobile computing device as used herein may encompass a battery powered computing device that may be carried by a single person. This may for example be a so called smartphone or a tablet or a laptop or netbook computer.
  • The wireless internet connection could be provided via different ways. For example this may be provided via a Wi-Fi system or even a data connection over a cellular network. In some examples the first communication module may also be used for forming the wireless internet connection but in some examples it may be different. For example the first wireless communication module may use for example Bluetooth to communicate with the group of smoke detectors.
  • In an unclaimed example the self-test data comprises a time stamp and/or a cryptographic signature. The time stamp may be useful for identifying when the test of the group of smoke detector took place. The cryptographic signature may be useful to verify that the self-test data is authentic. In some examples the time stamp and/or cryptographic signature may be added by the group of smoke detectors. In other examples the time stamp and/or cryptographic signature may be appended to the self-test data by the personal mobile computing device.
  • In another embodiment the computer is configured for generating a test summary report for the group of smoke detectors by inputting the self-test data into a report generation module. The report generation module may for example comprise machine-executable code that receives the self-test data and then calculates or generates the test summary. This for example may include such things as receiving raw sensor data and then analyzing this raw sensor data to determine if the sensor is functioning properly. The report generation module may also receive other data which is descriptive of the operation of a smoke detector and use this to establish if the smoke detector and its sensors are functioning properly.
  • The test summary report may, for example be a summary of the operational status and function of the smoke detectors at the time the self-test data was acquired. The test summary report may also be formatted to conform with regulatory requirements. The test summary report may also be digitally signed by the computer to validate its origin and/or authenticity.
  • Another advantage may be is that the test summary report is not just the result of the self-test, the self-test data is evaluated by the computer to generate the test summary report, not the smartphone. This may reduce the amount of complicated software on the personal mobile computing device and the group of smoke detectors. This may also enables a big data approach on the server: data from multiple groups of smoke detectors may be analyzed.
  • The computer is further configured for generating a task completion signal after generating the test summary report. After the test summary report has been generated the smoke detector system may then generate the task completion signal. The computer is then further configured for sending the task completion signal to the personal mobile computing device via the wireless communication channel. This for example may be useful in forming a closed control loop that enables the user of the personal mobile computing device to understand when the test summary report has been completed. For example the personal mobile computing device can be connected intermittently or only when selected to communicate with the group of smoke detectors via the wireless communication channel. When the personal mobile computing device receives the task completion signal then the personal mobile computing device can for example disconnect or deactivate the wireless communication channel.
  • In another embodiment the smoke detector system comprises multiple of the group of smoke detectors. The computer stores a self-test database that comprises self-test data from the multiple of the group of smoke detectors. For example, within a building or across different buildings there may be different and independent groups of smoke detectors. Each of these may connect to the computer via the personal mobile computing device or different personal mobile computing devices. For example there could be a personal mobile computing device that is able to pair or connect with each group of smoke detectors. This embodiment may be beneficial because the data from the self-test for each of the multiple of the group of smoke detectors may be located on the single computer. This may be useful for centrally generating the test report summary for each group. It may also be useful because the self-test data is collected and stored in a single location. This may facilitate analyzing the self-test data and recognizing patterns which may help improve the maintenance or maintaining of the various groups of smoke detectors.
  • In another embodiment the computer is configured for generating a maintenance schedule for the group of smoke detectors by inputting at least a portion of the self-test database into a control system module. The control system module may contain computer-executable instructions that are used to cause a processor of the computer to check various conditions of the smoke detectors using a predetermined set of criterion or examine the self-test database for patterns. For example the control system module may in some examples comprise a neural network, a machine learning module, an expert system, and/or predetermined logic. This embodiment may be beneficial because the collection of the self-test database may be useful in maintaining the multiple groups of smoke detectors.
  • In another embodiment the computer is configured for generating a shipping order to ship repair parts to a location of the group of smoke detectors at a chosen time determined by the maintenance schedule. For example the computer may send the shipping order to a logistic center or order it online. The computer is further configured for detecting a delivery of the repair parts to the location. Often times when a logistics or delivery company delivers a package a message may be sent to an account that ordered the shipping of the repair parts. The computer may for example be configured for receiving this message directly or for checking the account to see if the repair parts have been delivered.
  • The computer is further configured for displaying maintenance instructions on the user interface of the mobile computing device via the wireless communication channel after detecting the delivery of the repair parts. For example, once the computer detects that the repair parts have been delivered to the location a message or messages may be sent to the personal mobile computing device which either comprise instructions or trigger the instructions to be displayed by the personal mobile computing device. This may for example be beneficial in a situation where the group of smoke detectors is installed in an apartment and the personal mobile computing device is for example a smartphone of a tenant.
  • In an unclaimed example the computer is further configured for detecting when the repair parts have been installed in the group of smoke detectors. This may be used for forming a control loop to ensure that the operator of the personal mobile computing device does in fact repair the group of smoke detectors.
  • In another embodiment the group of smoke detectors comprises an elevator smoke detector mounted in an elevator shaft of an elevator. This embodiment may be beneficial because it may be difficult or inconvenient to perform a self-test of a smoke detector which is located in an elevator shaft.
  • In another embodiment, the elevator smoke detector is located in the overhead of the elevator shaft. As used herein, an overhead of an elevator shaft is the space at the top or upper most portion of the elevator shaft. This contains a space into which the elevator does not travel and may be useful for mounting equipment. Also, if there is a fire at some location within the elevator shaft, the hot air and smoke from the fire will naturally rise to the top part of the elevator shaft or the overhead. Placing a smoke detector there ensures that a fire within then elevator shaft will be rapidly detected.
  • Mounting the elevator smoke detector in the overhead may also have the advantage that is facilitates forming the wireless communication channel between the personal mobile computing device and the elevator smoke detector. When the door of the elevator is open, there is a gap between the space above the elevator and the open elevator. This provides an unshielded region between the personal mobile communication device and the elevator smoke detector.
  • In an unclaimed example the elevator comprises a door. The mobile computing device is configured for detecting when the door is at least partially open. This detection may be performed in a variety of ways. The door of the elevator may be of metal and may partially shield or entirely block the wireless communication channel. In some examples the mobile computing device may detect that the door is at least partially open because the signal strength of the wireless communication channel increases. In other examples such things as a sensor may be installed in the door which communicates with the mobile computing device or the mobile computing device may have a camera which may be used in detecting optically when the door is at least partially open.
  • The personal mobile computing device is further configured for establishing the mobile communication channel with the elevator smoke detector when the door of the elevator is at least partially open. This embodiment may be beneficial because it may enable the convenient acquisition of the self-test data from the smoke detector in the overhead of the elevator shaft.
  • In another embodiment each of the group of smoke detectors comprises a unique identifier code. The computer is configured for storing a configuration database that comprises configuration data. The personal mobile computing device configured for establishing the wireless communication channel with the group of smoke detectors by configuring the first wireless communication module with the configuration data. The personal mobile computing device is configured for receiving the unique identifier code of a selected smoke detector selected from any of the group of smoke detectors.
  • The personal mobile computing device is configured for sending a configuration request to the computer via the wireless internet connection where in the configuration request comprises the unique identifier code of the selected smoke detector. The computer is configured for selecting the configuration data from a configuration data database by searching the configuration data database for the unique identifier code. The computer is configured for sending the configuration data to the personal mobile computing device via the wireless internet connection in response to receiving the configuration request with the unique identifier code of the selected smoke detector.
  • The personal mobile computing device is configured for configuring the first wireless communication module with the configuration data. In this embodiment the configuration data which is stored on the computer is used for configuring the personal mobile computing device so that it is able to form the wireless communication channel with the group of smoke detectors. It does this by acquiring and receiving one unique identifier code from the group of smoke detectors. This may be beneficial because it enables the operator of the personal mobile computing device to more easily acquire the self-test data because the operator does not need to establish a pairing with each of the group of smoke detectors individually.
  • In another embodiment the initial mobile computing device comprises a third wireless communication module. The initial mobile computing device is configured to connect to the computer via the wireless internet connection. The initial mobile computing device is configured for generating pairing data during a wireless pairing with the group of smoke detectors via the second wireless communication module and the third wireless communication module. The initial mobile computing device is configured for receiving the unique identifier code during the wireless pairing. The initial mobile computing device is configured for receiving location data descriptive of a location of the group of smoke detectors via a user interface. This may for example include the location of different smoke detectors of the group of smoke detectors and their position in different rooms.
  • The initial mobile computing device is configured for constructing the configuration data from the unique identifier and the pairing data. The initial mobile computing device is configured for transferring the configuration data to the computer via the wireless internet connection.
  • The computer is configured for appending the configuration data to the configuration data database. In this claim an initial mobile computing device is used to establish the pairing between the initial mobile computing device and the different smoke detectors of the group of smoke detectors. This is then used to construct the configuration data which is then stored in the computer. This enables the personal mobile computing device to then later retrieve this configuration data and with a single unique identifier code from the group of smoke detectors to form the wireless communication channel. This for example may include the ability to form a Bluetooth connection with each of the group of smoke detectors.
  • In another embodiment the group of smoke detectors comprises a test activation element. The selected smoke detector is configured for transmitting the unique identifier code with the second wireless communication module in response to an activation of the test activation element. For example the test activation element may be a button or switch on a smoke detector which may be operated. When this test activation element is operated then the unique identifier code of that smoke detector is transmitted. The personal mobile computing device may receive this unique identifier code and then contact the computer via the internet and retrieve the proper configuration data using the unique identifier code to reference the correct configuration data.
  • In another embodiment the group of smoke detectors comprises an optical identifier that uniquely identifies the unique identifier code. For example a barcode or QR code could be printed on the face of each of the smoke detectors. The optical identifier is visible when the group of smoke detectors are in an operational position. This may mean that when each are in operational position. The personal mobile computing device comprises a camera. The personal mobile computing device is configured for determining the unique identifier code from the optical identifier imaging the optical identifier with the camera. For example, if there is a barcode or QR code or other writing or markings on the individual smoke detectors the operator may control the personal mobile computing device to image the smoke detector. The personal mobile computing device may then use this optical image to generate or determine the unique identifier code.
  • In another embodiment the personal mobile computing device is configured for forming the wireless communication channel with the group of smoke detectors in response to receiving a test request. This embodiment may be beneficial because the personal mobile computing device does not form the wireless communication channel unless it is desired to perform a self-test. This may provide for reduced energy consumption as well as better security for the group of smoke detectors.
  • In another embodiment the personal mobile computing device is configured to generate the test request in response to a user input. For example there may be a dialogue box or user interface on the personal mobile computing device where the operator can manually cause the test request to be initiated.
  • In another embodiment the computer is configured for sending a test request to the personal mobile computing device via the wireless internet connection. For example the computer may centrally schedule when the group of smoke detectors should be tested using the self-test. This for example may be useful in forming an automatic control loop for testing and/or repairing the group of smoke detectors.
  • In another embodiment the personal mobile computing device is configured for automatically generating the test request according to a predetermined schedule. For example there may be calendar data or other data which is included on an application or program of the personal mobile computing device which causes the test request to be initiated according to the predetermined schedule.
  • In an unclaimed example the personal mobile computing device is configured for displaying a test request pop-up in response to receiving the test request. In an unclaimed example, the test request pop-up comprises a delay selector configured for delay information of the wireless communication channel with the group of smoke detectors. For example, the personal mobile computing device may be away from the group of smoke detectors and the operator may delay until it is possible to perform the self-test. Also for other reasons the operator may wish to perform the self-test at a different time.
  • In an unclaimed example the test request pop-up comprises a device selector configured for selecting one smoke detector of the group of smoke detectors to initiate forming the wireless communication channel. For example the personal mobile computing device may connect in some examples to each of the set of smoke detectors individually. The use of the device selector may enable the personal mobile computing device to query or test the group of smoke detectors individually and in a predetermined or sequential order.
  • In an unclaimed example the wireless communication channel is a Bluetooth wireless communication channel.
  • In an unclaimed example the wireless communication channel is a Bluetooth LE or low energy wireless communication channel.
  • In an unclaimed example the wireless communication channel is a wireless communication channel with a maximum power of 100 mW.
  • In an unclaimed example the wireless communication channel is a wireless communication channel with a maximum power of 2.5 mW.
  • In an unclaimed example the wireless communication channel is a wireless communication channel with a maximum power of 1 mW.
  • In another aspect the invention provides for a computer program product, as described in claim 11, comprising machine-executable instructions for execution by a processor controlling a mobile computing device. The personal mobile computing device comprises a first wireless communication module. Execution of the machine-executable instructions causes the processor to form the wireless communication channel with a group of smoke detectors with the first wireless communication module. This may be with the group of smoke detectors as a whole or it may include individual pairings with each of the group of smoke detectors. Execution of the machine-executable instructions further causes the processor to request a self-test of the group of smoke detectors via the wireless communication channel. Again this may be a request which is sent to all the group or it may be with each of the group of smoke detectors sequentially.
  • Execution of the machine-executable instructions further causes the processor to receive self-test data from the group of smoke detectors via the wireless communication channel in response to requesting the self-test. Execution of the machine-executable instructions further causes the processor to connect to a computer via a wireless internet connection. Execution of the machine-executable instructions further causes the processor to send the self-test data to the computer via the wireless internet connection. This computer program product may for example be beneficial because it may provide for a means of providing the self-test data from a group of smoke detectors that are not connected directly with the computer.
  • In another aspect, the invention provides for a method of operating a smoke detector system as described in claim 12.
  • It is understood that one or more of the aforementioned embodiments of the invention may be combined as long as the combined embodiments are not mutually exclusive.
  • As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as an apparatus, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a "circuit," "module" or "system." Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer executable code embodied thereon.
  • Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A 'computer-readable storage medium' as used herein encompasses any tangible storage medium which may store instructions which are executable by a processor of a computing device. The computer-readable storage medium may be referred to as a computer-readable non-transitory storage medium. The computer-readable storage medium may also be referred to as a tangible computer readable medium. In some embodiments, a computer-readable storage medium may also be able to store data which is able to be accessed by the processor of the computing device. Examples of computer-readable storage media include, but are not limited to: a floppy disk, a magnetic hard disk drive, a solid state hard disk, flash memory, a USB thumb drive, Random Access Memory (RAM), Read Only Memory (ROM), an optical disk, a magnetooptical disk, and the register file of the processor. Examples of optical disks include Compact Disks (CD) and Digital Versatile Disks (DVD), for example CD-ROM, CD-RW, CD-R, DVD-ROM, DVD-RW, or DVD-R disks. The term computer readable-storage medium also refers to various types of recording media capable of being accessed by the computer device via a network or communication link. For example a data may be retrieved over a modem, over the internet, or over a local area network. Computer executable code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wire line, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
  • A computer readable signal medium may include a propagated data signal with computer executable code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
  • 'Computer memory' or 'memory' is an example of a computer-readable storage medium. Computer memory is any memory which is directly accessible to a processor.
  • A 'processor' as used herein encompasses an electronic component which is able to execute a program or machine executable instruction or computer executable code. References to the computing device comprising "a processor" should be interpreted as possibly containing more than one processor or processing core. The processor may for instance be a multi-core processor. A processor may also refer to a collection of processors within a single computer system or distributed amongst multiple computer systems. The term computing device should also be interpreted to possibly refer to a collection or network of computing devices each comprising a processor or processors. The computer executable code may be executed by multiple processors that may be within the same computing device or which may even be distributed across multiple computing devices.
  • Computer executable code may comprise machine executable instructions or a program which causes a processor to perform an aspect of the present invention.
  • Computer executable code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages and compiled into machine executable instructions. In some instances the computer executable code may be in the form of a high level language or in a pre-compiled form and be used in conjunction with an interpreter which generates the machine executable instructions on the fly.
  • The computer executable code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • Aspects of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It is understood that each block or a portion of the blocks of the flowchart, illustrations, and/or block diagrams, can be implemented by computer program instructions in form of computer executable code when applicable. It is further under stood that, when not mutually exclusive, combinations of blocks in different flowcharts, illustrations, and/or block diagrams may be combined. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
  • The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • A `user interface' as used herein is an interface which allows a user or operator to interact with a computer or computer system. A 'user interface' may also be referred to as a 'human interface device.' A user interface may provide information or data to the operator and/or receive information or data from the operator. A user interface may enable input from an operator to be received by the computer and may provide output to the user from the computer. In other words, the user interface may allow an operator to control or manipulate a computer and the interface may allow the computer indicate the effects of the operator's control or manipulation. The display of data or information on a display or a graphical user interface is an example of providing information to an operator. The receiving of data through a keyboard, mouse, trackball, touchpad, pointing stick, graphics tablet, joystick, gamepad, webcam, headset, pedals, wired glove, remote control, and accelerometer are all examples of user interface components which enable the receiving of information or data from an operator.
  • A 'hardware interface' as used herein encompasses an interface which enables the processor of a computer system to interact with and/or control an external computing device and/or apparatus. A hardware interface may allow a processor to send control signals or instructions to an external computing device and/or apparatus. A hardware interface may also enable a processor to exchange data with an external computing device and/or apparatus. Examples of a hardware interface include, but are not limited to: a universal serial bus, IEEE 1394 port, parallel port, IEEE 1284 port, serial port, RS-232 port, IEEE-488 port, Bluetooth connection, Wireless local area network connection, TCP/IP connection, Ethernet connection, control voltage interface, MIDI interface, analog input interface, and digital input interface.
  • A 'display' or `display device' as used herein encompasses an output device or a user interface adapted for displaying images or data. A display may output visual, audio, and or tactile data. Examples of a display include, but are not limited to: a computer monitor, a television screen, a touch screen, tactile electronic display, Braille screen, Cathode ray tube (CRT), Storage tube, Bi-stable display, Electronic paper, Vector display, Flat panel display, Vacuum fluorescent display (VF), Light-emitting diode (LED) displays, Electroluminescent display (ELD), Plasma display panels (PDP), Liquid crystal display (LCD), Organic light-emitting diode displays (OLED), a projector, and Head-mounted display.
  • Brief description of the drawings
  • The following examples/aspects/embodiments shown in Fig. 1, 2, 4, 7 , and 8 and described in the Detailed Description are not according to the invention and are present for illustration purposes only in order to assist in explaining the smoke detector system, the computer program product, and the method as described in the claims. In the following embodiments of the invention are explained in greater detail, by way of example only, making reference to the drawings in which:
  • Fig. 1
    illustrates an example of a smoke detector;
    Fig. 2
    illustrates an example of a personal mobile computing device;
    Fig. 3
    shows a flow chart which illustrates a method of operating the personal mobile computing device of Fig. 2.
    Fig. 4
    illustrates an example of a smoke detector system;
    Fig. 5
    illustrates a further example of a smoke detector system;
    Fig. 6
    illustrates a further example of a smoke detector system;
    Fig. 7
    illustrates an example of a building; and
    Fig. 8
    illustrates a further example of a smoke detector.
    Detailed Description
  • Like numbered elements in these figures are either equivalent elements or perform the same function. Elements which have been discussed previously will not necessarily be discussed in later figures if the function is equivalent.
  • Fig. 1 illustrates a functional diagram of a smoke detector 100. The smoke detector 100 comprises a processor 102. The smoke detector 100 is powered by a battery 104. The smoke detector 100 also comprises an internal memory 106, a smoke detector component 108, a self-test component 110, and a second wireless communication module 112 that are each connected to the processor 102. The smoke detector 100 is further shown as containing an optional environmental sensor 114 which is also connected to the processor 102. The smoke detector component 108 may be used for detecting smoke and/or heat for detecting a fire. The self-test component 110 contains components for testing the smoke detector component 108.
  • The second wireless communication module 112 may for example be useful for establishing a wireless communication channel with a personal mobile computing device. The optional environmental sensor 114 may be used to optionally gather data descriptive of the environment around the smoke detector 100. The self-test component 110 may also contain components which may be used to verify the correct placement and operation of the smoke detector 100. For example, the self-test component 110 may also contain a proximity sensor to determine if the smoke detector 100 is placed too close to a wall or other structure. The self-test component 110 may also contain components for measuring the voltage or capacity of the battery 104.
  • The internal memory 106 is shown as containing machine-executable instructions 120. These machine-executable instructions 120 enable the processor 102 to perform various operational tasks in running the smoke detector 100 and also for performing various methods of controlling the smoke detector 100. For example the machine-executable instructions 120 may implement a routine to self-test the smoke detector 100. The memory 106 is further shown as containing a self-test request 122 that the smoke detector 100 has received via the second wireless communication module 112. The reception of the self-test request 122 may cause the machine-executable instructions 120 to execute a self-test routine.
  • The machine-executable instructions 120 then control the other components such as the self-test component 110 to acquire self-test data 124. The self-test data 124 can for example be used to provide the self-test data 124 over the second wireless communication module 112. The smoke detector 100 is further shown as containing environmental sensor data 126 that has been acquired by the environmental sensor 114. The environmental sensor data 126 may also be acquired by external environmental sensors that communicate with the smoke detector 100 via the second wireless communication module 112. The memory 106 is further shown as containing a unique identifier code 128. The smoke detector 100 is further shown as containing an optional test activation element 118. For example the test activation element 118 may be a button on an external surface of the smoke detector 100 which causes the smoke detector to test itself.
  • When the optional test activation element 118 is activated the processor 102 can be programmed to transmit the unique identifier code 128 via the second wireless communication module 112. This for example may be useful in pairing the smoke detector 100 with other devices.
  • Fig. 2 illustrates an example of a personal mobile computing device 200. The personal mobile computing device 200 may for example be a smartphone or a tablet in some examples. The personal mobile computing device 200 comprises a display and/or user interface 202. The personal mobile computing device 200 further comprises a processor 204. The personal mobile computing device 200 is powered by a battery 206. The personal mobile computing device 200 is shown as comprising a first wireless communication module 208 and an optional transmitter 210.
  • The first wireless communication module 208 may for example be useful for communicating with the second wireless communication module 112 of the smoke detector 100. The transmitter 210 may in some instances be a cellular communication transmitter used for communicating with a cellular network such as used for telephones. In some examples the transmitter 210 may provide access to a mobile data network and the internet. In some other examples the transmitter 210 may comprise a transmitter which is adapted for connecting to a Wi-Fi system. The transmitter 210 in this case may also provide access to the internet. The personal mobile computing device 200 is further shown as containing a memory 212. The display and/or user interface 202, the first wireless communication module 208, the transmitter 210, and the memory 212 are connected to the processor 204.
  • The memory 212 is shown as containing machine-executable instructions 214 which enable the processor 204 to control the operation and function of the personal mobile computing device 200. The memory 212 is further shown as containing a test request 216. The test request 216 may for example have been generated by the personal mobile computing device 200 or it may for example have been received via the transmitter 210. The personal mobile computing device 200 then generates a self-test request 122 and sends it to the smoke detector 100 via a wireless communication channel formed by the first wireless communication module 208 and the second wireless communication module 112. The memory 212 is further shown as containing pairing data and/or configuration data 218 which enables configuration of the first wireless communication module 208 so it is able to communicate with the second wireless communication module 212.
  • Fig. 3 shows a flowchart which illustrates a method of operating the mobile computing device 200. First in step 300 a wireless communication channel is formed with a group of smoke detectors with the first wireless communication module 208. This may be done by forming a wireless communication channel with the individual second wireless communication modules 112 of the individual smoke detectors 100. Next in step 302 a self-test request 122 of the group of smoke detectors 100 is requested via the wireless communication channel in response to requesting the self-test. Next in step 304, the first wireless communication module 208 receives the self-test data 124 via the wireless communication channel in response to requesting the self-test 122.
  • Next in step 306, the processor 204 controls the personal mobile computing device 200 to connect to a computer via a wireless internet connection. The wireless internet connection may for example be formed using the transmitter 210. By the term wireless internet connection, it is implied that a portion of the internet connection is formed via a wireless transmitter and receiver. An example is the use of the transmitter 210. In some instances the first wireless communication module 208 and the transmitter 210 may be the same component. Finally, in step 208, the processor 204 controls the transmitter 210 to send the self-test data 124 to the computer via the wireless internet connection.
  • Fig. 4 illustrates an example of a smoke detector system 400. The smoke detector system 400 comprises a group of smoke detectors 402. It also comprises the personal mobile computing device 200 and a computer 404. The computer 404 comprises a processor 406 which is connected to a network interface 408 and a memory 410. The group of smoke detectors 402 forms a wireless communication channel 412 with the personal mobile computing device 200. The network interface 408 and the transmitter 210 are used to form at least a portion of a wireless internet connection 414.
  • The memory 410 is shown as containing machine-executable instructions 420 that enable the processor 406 to control and operate the computer system 404. The memory 410 is further shown as containing self-test data 124 that is received via the network interface 408. The memory 410 is further shown as containing a report generation module 422. The report generation module 422 takes the self-test data 124 as input and then exports a test summary report 424. The test summary report 424 may for example contain a report which summarizes the function and status of the group of smoke detectors 402. After the test summary report 424 is generated the processor 406 then constructs or generates a task completion signal 426 which is then sent to the mobile computing device 200 via the wireless internet connection 414. This for example may cause a message on the display 202 informing the user that the group of smoke detectors 402 has been tested.
  • The memory 410 is shown as containing an optional configuration data database 428. The optional configuration data database 428 contains configuration data 218 for different groups of smoke detectors 402. For example the computer 404 may be used to connect to a variety or a number of different groups 402 of smoke detectors.
  • One of the smoke detectors 100 may send a unique identifier 128 to the personal mobile computing device 200 which then transmits it to the computer 404 via the wireless internet connection 414. The processor 406 then searches the configuration data database for the unique identifier 128. This is used to reference and then retrieve the configuration data 218. The configuration data 218 can for example be forwarded to the personal mobile computing device 200 via the wireless internet connection 414. This may enable the personal mobile computing device 200 to reuse a previous pairing with the group of smoke detectors 402.
  • Fig. 5 shows a further view of the smoke detector system 400. In this example there is an initial mobile computing device 500 which has established the wireless communication channel 412 with the individual smoke detectors 100 of the group of smoke detectors 402. This for example was performed by performing a pairing operation between the initial mobile computing device 500 and the smoke detectors 100. This for example may be time consuming and involve data entry on the part of the operator of the initial mobile computing device 500. To save time in the future the initial mobile computing device 500 then sends the configuration data 218 to the processor 406 of the computer 404 via the mobile internet connection 414. The processor 406 then appends or enters the configuration data 218 into the configuration data database 428. In the future a unique identifier 128 of one of the smoke detectors 100 can be used to retrieve the configuration data 218 and then later configure the personal mobile computing device 200 to form the wireless communication channel 412.
  • Fig. 6 illustrates a further example of a smoke detector system 600. The smoke detector system 600 is similar to the smoke detector system 400 illustrated in Fig. 5 except there are additionally a larger number of groups of smoke detectors 402, 402', 402" that are connected to the computer 404 via individual personal mobile communication devices 200, 200', 200". Each of the personal mobile computing devices 200, 202', 202" send self- test data 124, 124', 124" from their groups of smoke detectors 402, 402', 402". The self-test data 124 is provided by group of smoke detectors 402. The self-test data 124' is provided by the group of smoke detectors 402'. The self-test data 124" is provided by the group of smoke detectors 402".
  • The processor 402 then copies or appends the self- test data 124, 124', 124" into a self-test database 602. At least a portion of the self-test database 602 is input into a control system module 604. This for example may be an expert system, a rule-based system, and/or a machine learning-based system which then outputs a maintenance schedule 606 for one or more of the group of smoke detectors 402, 402', 402". If replacement parts are required such as a replacement sensor, a new battery, or even an entire smoke detector 100 then the processor 406 is able to generate a shipping order 608 and send this to either a logistics center or order it online and have it shipped to a location or the person who is responsible for the particular group of smoke detectors 402, 402', 402".
  • When the replacement parts or repair parts are received a delivery receipt 610 may be provided to the processor 406 via the internet. When the delivery receipt 610 is received this causes the processor 406 to send maintenance instructions 612 to the personal mobile computing device 200 of the recipient of the spare parts. This may then be used to provide the maintenance instructions 612 on the display 202 to ensure that the replacement parts are properly installed. In some further examples the computer 404 may then request to verify additional self- test data 124, 124', 124" to ensure that the group of smoke detectors 402, 402', 402" were properly repaired.
  • Fig. 7 illustrates an example of a building. The building comprises a rental unit 700, 702' and 702". Rental unit 702 comprises a group of smoke detectors 402. Rental unit 702' comprises group of smoke detectors 402'. Rental unit 702" comprises group of smoke detectors 402". Each of these smoke detectors 100 is placed in its individual room 704. The building 700 in Fig. 7 could for example be an apartment building and the different rental units 702, 702', 702" are rented by different occupants.
  • In rental unit 702" there may be an additional environmental sensor 706 that is able to communicate with one of the smoke detectors 100 of the group of smoke detectors 402". For example 706 may be a dampness or moisture sensor or for example a radon sensor such as a radiation detector. This may then send data to the smoke detector 100 and this may be stored in the internal memory until the self-test is performed and then this may be additionally provided to the computer system 404 via the personal mobile computing device 200".
  • The building 700 is additionally shown as comprising an elevator 710. The elevator has a shaft 712 with an overhead 714. Within the overhead 714 of the elevator shaft 712 is an elevator smoke detector 100'. The elevator smoke detector 100' may be equivalent to one of the smoke detectors 100. In some examples the elevator smoke detector 100' may be connected separately to a different personal mobile computing device or in some cases it may be assigned to one of the personal mobile computing devices 200, 200' or 200".
  • Fig. 8 shows a further view of a smoke detector 100. On a surface of the smoke detector 100 is an optical identifier 800 that is visible. The optical identifier 800 may for example be a machine readable optical identifier such as a QR code or barcode. This for example may be imaged by a camera of the personal mobile computing device.
  • List of reference numerals
  • 100
    smoke detector
    100'
    elevator smoke detector
    102
    processor
    104
    battery
    106
    internal memory
    108
    smoke detector component
    110
    self-test component
    112
    second wireless communication module
    114
    environmental sensor
    118
    test activation element
    120
    machine executable instructions
    122
    self-test request
    124
    self-test data
    124'
    self-test data
    124"
    self-test data
    126
    environmental sensor data
    128
    unique identifier code
    200
    personal mobile computing device
    200'
    personal mobile computing device
    200''
    personal mobile computing device
    202
    display and/or user interface
    204
    processor
    206
    optional battery
    208
    first wireless communication module
    210
    transmitter
    212
    memory
    214
    machine executable instructions
    216
    test-request
    218
    configuration data
    300
    form the wireless communication channel with a group of smoke detectors with the first wireless communication module
    302
    request a self-test of the group of smoke detectors via the wireless communication channel
    304
    receive self-test data from the group of smoke detectors via the wireless communication channel in response to requesting the self-test
    306
    connect to a computer via a wireless internet connection
    308
    send the self-test data to the computer via the wireless internet connection
    400
    smoke detector system
    402
    group of smoke detectors
    402'
    group of smoke detectors
    402''
    group of smoke detectors
    404
    computer
    406
    processor
    408
    network interface
    410
    memory
    412
    wireless communication channel
    412'
    wireless communication channel
    412''
    wireless communication channel
    414
    wireless internet connection
    414'
    wireless internet connection
    414''
    wireless internet connection
    420
    machine executable instructions
    422
    report generation module
    424
    test summary report
    426
    task completion signal
    428
    configuration data database
    500
    initial mobile computing device
    600
    smoke detector system
    602
    self-test database
    604
    control system module
    606
    maintenance schedule
    608
    shipping orders
    610
    delivery receipt
    612
    maintenance instructions
    700
    building
    702
    rental unit
    702'
    rental unit
    702''
    rental unit
    706
    environmental sensor
    710
    elevator
    714
    elevator shaft
    716
    overhead of elevator shaft
    800
    optical indicator

Claims (13)

  1. A smoke detector system (400, 600) comprising:
    - a computer (404);
    - a personal mobile computing device (200, 200', 200"), wherein the personal mobile computing device is configured to connect to the computer via a wireless internet connection (414, 414', 414"), wherein the personal mobile computing device comprises a first wireless communication module (208); and
    - a group of smoke detectors (402, 402', 402") that each comprise a second wireless communication module (112), wherein the group of smoke detectors are configured for performing a self-test, wherein the group of smoke detectors are configured for acquiring self-test data (124, 124', 124") measured during the self-test, wherein each of the group of smoke detectors is battery powered, wherein the self-test data comprises battery level data;
    wherein the personal mobile computing device is configured for directly forming a wireless communication channel (412, 412', 412") with each of the group of smoke detectors individually;
    wherein the personal mobile computing device is configured for requesting the self-test (122) from the group of smoke detectors via the wireless communication channel;
    wherein the personal mobile computing device is configured for receiving the self-test data from the group of smoke detectors via the wireless communication channel in response to requesting the self-test; and
    wherein the personal mobile computing device is configured for sending the self-test data to the computer via the wireless internet connection.
  2. The smoke detector system of any one of the preceding claims, wherein the computer is configured for:
    - generating a test summary report for the group of smoke detectors by inputting the self-test data into a report generation module (422);
    - generating a task completion signal (426) after generating the test summary report; and
    - sending the task completion signal to the personal mobile computing device via the wireless communication channel.
  3. the smoke detector system of claim 2, wherein the smoke detector system comprises multiple of the group of smoke detectors, wherein the computer stores a self-test database (602) that comprises self-test data from the multiple of the group of smoke detectors.
  4. The smoke detector system of claim 3, wherein the computer is configured for generating a maintenance schedule (606) for the group of smoke detectors by inputting at least a portion of the self-test database into a control system module (604).
  5. The smoke detector system of claim 4, wherein the computer is configured for generating a shipping order (608) to ship repair parts to a location of the group of smoke detectors at a chosen time determined by the maintenance schedule, wherein the computer is configured for detecting a delivery of the repair parts to the location, wherein the computer is configured for displaying maintenance instructions (612) on the user interface of the mobile computing device via the wireless communication channel after detecting the delivery of the repair parts.
  6. The smoke detector system of any one of the preceding claims, wherein the group of smoke detectors comprise an elevator smoke detector (100') mounted in an elevator shaft of an elevator, preferably in an overhead of the elevator shaft.
  7. The smoke detector system of any one of the preceding claims, wherein each of the group of smoke detectors comprise a unique identifier code (128), wherein the computer is configured for storing a configuration database (428) that comprises configuration data (218), wherein the personal mobile computing device is configured for establishing the wireless communication channel with the group of smoke detectors by configuring the first wireless communication module with the configuration data;
    wherein the personal mobile computing device is configured for receiving the unique identifier code of a selected smoke detector selected from any of the group of smoke detectors;
    wherein the personal mobile computing device is configured for sending a configuration request to the computer via the wireless internet connection, wherein the configuration request comprises the unique identifier code of the selected smoke detector;
    wherein the computer is configured for selecting the configuration data from the configuration data database by searching the configuration data database for the unique identifier code;
    wherein the computer is configured for sending the configuration data to the personal mobile computing device via the wireless internet connection in response to receiving the configuration request with the unique identifier code of the selected smoke detector;
    wherein the personal mobile computing device is configured configuring the first wireless communication module with the configuration data.
  8. The smoke detector system of any one of the preceding claims,
    wherein the initial mobile computing device (500) comprises a third wireless communication module, wherein the initial mobile computing device is configured to connect to the computer via the wireless internet connection,
    wherein the initial mobile computing device is configured for generating pairing data during a wireless pairing with the group of smoke detectors via the second wireless communication module and the third wireless communication module,
    wherein the initial mobile computing device is configured for receiving the unique identifier code during the wireless pairing;
    wherein the initial mobile computing device is configured for receiving location data descriptive of a location of the group of smoke detectors via a user interface; wherein the initial mobile computing device is configured for constructing the configuration data from the unique identifier and the paring data;
    wherein the initial mobile computing device is configured for transferring the configuration data to the computer via the wireless internet connection; and wherein the computer is configured for appending the configuration data to the configuration data database.
  9. The smoke detector system of claim 7 or 8, wherein any one of the following:
    - the group of smoke detectors comprise a test activation element (118), wherein the selected smoke detector is configured for transmitting the unique identifier code with the second wireless communication module in response to an activation of the test activation element; and
    - the group of smoke detectors comprise an optical identifier (800) that encodes the unique identifier code, wherein the optical identifier is visible when the group of smoke detectors are in an operational position, wherein the personal mobile computing device comprise a camera, wherein the personal mobile computing device is configured for determining the unique identifier code from the optical identifier by imaging the optical identifier with the camera.
  10. The smoke detector system of any one of the following, wherein the personal mobile computing device is configured for forming the wireless communication channel with the group of smoke detectors in response to receiving a test request, wherein any one of the following:
    - the personal mobile computing device is configured to generate the test request in response to a user input;
    - the computer is configured for sending a test request to the personal mobile computing device via the wireless internet connection; and
    - the personal mobile computing device is configured for automatically generating the test request according to a predetermined schedule.
  11. A computer program product comprising machine executable instructions (214) for execution by a processor controlling a personal mobile computing device (200, 200', 200"), wherein the personal mobile computing device comprises a first wireless communication module (208), wherein execution of the machine executable instructions causes the processor to:
    - form (300) a wireless communication channel individually with each of a group of smoke detectors (402. 402', 402") with the first wireless communication module;
    - request (302) a self-test (122) of the group of smoke detectors via the wireless communication channel;
    - receive (304) self-test data (124, 124', 124") from the group of smoke detectors via the wireless communication channel in response to requesting the self-test, wherein the self-test data comprises battery level data;
    - connect (306) to a computer (404) via a wireless internet connection (414, 414', 414"); and
    - send (308) the self-test data to the computer via the wireless internet connection.
  12. A method of operating a smoke detector system (400, 600), wherein the smoke detector system comprises:
    - a computer (404);
    - a personal mobile computing device (200, 200', 200"), wherein the personal mobile computing device is configured to connect to the computer via a wireless internet connection (414, 414', 414"), wherein the personal mobile computing device comprises a first wireless communication module (208); and
    - a group of smoke detectors (402, 402', 402") that each comprise a second wireless communication module (112), wherein the group of smoke detectors are configured for performing a self-test, wherein the group of smoke detectors are configured for acquiring self-test data (124, 124', 124") measured during the self-test, wherein each of the group of smoke detectors is battery powered, wherein the self-test data comprises battery level data;
    wherein the personal mobile computing device is configured for directly forming a wireless communication channel (412, 412', 412") with each of the group of smoke detectors individually;
    wherein the personal mobile computing device is configured for requesting the self-test (122) from the group of smoke detectors via the wireless communication channel;
    wherein the personal mobile computing device is configured for receiving the self-test data from the group of smoke detectors via the wireless communication channel in response to requesting the self-test; and
    wherein the personal mobile computing device is configured for sending the self-test data to the computer via the wireless internet connection, wherein the method comprises:
    - forming (300) the wireless communication channel individually between each of a group of smoke detectors (402. 402', 402") with the first wireless communication module and the personal mobile computing device;
    - requesting (302) the self-test (122) of the group of smoke detectors by the personal mobile communicating device via the wireless communication channel;
    - receiving (304) the self-test data (124, 124', 124") from the group of smoke detectors via the wireless communication channel by the personal mobile communicating device in response to requesting the self-test, wherein the self-test data comprises battery level data;
    - connecting (306) the personal mobile communicating device to a computer (404) via a wireless internet connection (414, 414', 414"); and
    - sending (308) the self-test data from the personal mobile communicating device to the computer via the wireless internet connection.
  13. The method of claim 12, wherein the method further comprises:
    - generating a test summary report for the group of smoke detectors by the computer by inputting the self-test data into a report generation module (422);
    - generating a task completion signal (426) after generating the test summary report by the computer; and
    - sending the task completion signal from the computer to the personal mobile computing device via the wireless communication channel.
EP19210470.1A 2019-11-20 2019-11-20 Smoke detection system Active EP3825972B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP19210470.1A EP3825972B1 (en) 2019-11-20 2019-11-20 Smoke detection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP19210470.1A EP3825972B1 (en) 2019-11-20 2019-11-20 Smoke detection system

Publications (2)

Publication Number Publication Date
EP3825972A1 EP3825972A1 (en) 2021-05-26
EP3825972B1 true EP3825972B1 (en) 2023-03-08

Family

ID=68766476

Family Applications (1)

Application Number Title Priority Date Filing Date
EP19210470.1A Active EP3825972B1 (en) 2019-11-20 2019-11-20 Smoke detection system

Country Status (1)

Country Link
EP (1) EP3825972B1 (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107067633A (en) * 2017-06-15 2017-08-18 深圳市海曼科技有限公司 A kind of smoke alarm

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9049567B2 (en) * 2013-10-07 2015-06-02 Google Inc. Hazard detection unit facilitating user-friendly setup experience
US10049562B2 (en) * 2016-10-25 2018-08-14 Honeywell International Inc. Sensor communication testing
US10755555B2 (en) * 2017-09-18 2020-08-25 Johnson Controls Fire Protection LP Method and apparatus for verifying service of installed devices using RFID
AU2018354716A1 (en) 2017-10-27 2020-06-11 Diligent Fire & Safety Pty Ltd Fire detection system, automatic data capture, remote testing, analysis, apparatus and methods

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107067633A (en) * 2017-06-15 2017-08-18 深圳市海曼科技有限公司 A kind of smoke alarm

Also Published As

Publication number Publication date
EP3825972A1 (en) 2021-05-26

Similar Documents

Publication Publication Date Title
US10895871B2 (en) Method and system for automatically generating interactive wiring diagram in an industrial automation environment
CA2968502C (en) Systems and methods for addressably programming a notification safety device
CN107636702A (en) Integrated form Asset Integrity Management System
US10152878B2 (en) Hazard detector, test device for hazard detector, hazard monitoring system and method for testing a hazard detector
CN105378810A (en) Remote sharing of measurement data
CN108875857B (en) Inspection method, device and system
CN106375134A (en) Computer room IT device operation and maintenance method and system
WO2017187499A1 (en) Elevator remote maintenance assistance system and elevator remote maintenance assistance method
US11755007B2 (en) System and method for determining a health condition and an anomaly of an equipment using one or more sensors
JP2010213770A (en) Individual game machine-monitoring method
US10347055B2 (en) Method and apparatus for connecting to a heavy duty vehicle and performing a vehicle roadworthiness check
EP3825972B1 (en) Smoke detection system
JP2016108089A (en) Fault diagnosis device, system and method
US11520793B2 (en) Servicing, diagnosing, logging, and surveying building equipment assets
KR102455903B1 (en) Real-time remote operation management of nuclear power plant hangar using server and client
CN104599097B (en) A kind of method and device of fortune paper money bag electronic sealing monitoring
JP2006338093A (en) Patrol security support system and patrol route management device used therefor
JP2019106568A (en) Remote monitoring device, monitoring center server, and initial setting method for monitoring target facility
JP2019209426A (en) Robot state monitoring system and robot state monitoring method
KR102480411B1 (en) Method for Processing Correlationship Edge Computing
EP2244231B1 (en) System for monitoring structures
KR20200089039A (en) Medical Device Management System and Management Method
KR20150080052A (en) System and Method for Managing Equipment of Ship Using Mobile Device in Zigbee Network Environments
CN108152611A (en) The test method and test server of electric terminal
CN109300112A (en) Instrument maintaining method and device based on AR

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20200716

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20221026

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

Ref country code: AT

Ref legal event code: REF

Ref document number: 1553119

Country of ref document: AT

Kind code of ref document: T

Effective date: 20230315

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602019026101

Country of ref document: DE

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG9D

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20230308

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230308

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230608

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230308

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230308

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230308

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230308

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 1553119

Country of ref document: AT

Kind code of ref document: T

Effective date: 20230308

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230308

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230308

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230609

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230308

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230308

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230308

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230710

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230308

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230308

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230308

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230308

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230308

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230708

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602019026101

Country of ref document: DE

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230308

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20230308

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20231121

Year of fee payment: 5

26N No opposition filed

Effective date: 20231211