WO2008131704A1 - Method and safety device for monitoring dangerous areas of automated systems - Google Patents

Method and safety device for monitoring dangerous areas of automated systems

Info

Publication number
WO2008131704A1
WO2008131704A1 PCT/DE2007/000746 DE2007000746W WO2008131704A1 WO 2008131704 A1 WO2008131704 A1 WO 2008131704A1 DE 2007000746 W DE2007000746 W DE 2007000746W WO 2008131704 A1 WO2008131704 A1 WO 2008131704A1
Authority
WO
Grant status
Application
Patent type
Prior art keywords
rfid
transponder
system
danger
zone
Prior art date
Application number
PCT/DE2007/000746
Other languages
German (de)
French (fr)
Inventor
Jens Kydles
Joachim Scharnagl
Original Assignee
Siemens Aktiengesellschaft
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F16ENGINEERING ELEMENTS AND UNITS; GENERAL MEASURES FOR PRODUCING AND MAINTAINING EFFECTIVE FUNCTIONING OF MACHINES OR INSTALLATIONS; THERMAL INSULATION IN GENERAL
    • F16PSAFETY DEVICES IN GENERAL; SAFETY DEVICES FOR PRESSES
    • F16P3/00Safety devices acting in conjunction with the control or operation of a machine; Control arrangements requiring the simultaneous use of two or more parts of the body
    • F16P3/12Safety devices acting in conjunction with the control or operation of a machine; Control arrangements requiring the simultaneous use of two or more parts of the body with means, e.g. feelers, which in case of the presence of a body part of a person in or near the danger zone influence the control or operation of the machine
    • F16P3/14Safety devices acting in conjunction with the control or operation of a machine; Control arrangements requiring the simultaneous use of two or more parts of the body with means, e.g. feelers, which in case of the presence of a body part of a person in or near the danger zone influence the control or operation of the machine the means being photocells or other devices sensitive without mechanical contact
    • F16P3/147Safety devices acting in conjunction with the control or operation of a machine; Control arrangements requiring the simultaneous use of two or more parts of the body with means, e.g. feelers, which in case of the presence of a body part of a person in or near the danger zone influence the control or operation of the machine the means being photocells or other devices sensitive without mechanical contact using electro-magnetic technology, e.g. tags or radar
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B9/00Safety arrangements
    • G05B9/02Safety arrangements electric

Abstract

The invention relates to a method and a safety device for monitoring dangerous areas (114, 310) of an automated system (100, 300) having at least one read/write device (112, 306), wherein the first read/write device is provided in a first dangerous area (114) of the system (100) for the detection of RFID transponders (118, 128, 330). According to the method, the device is operated in a first operational mode based on the detection of a first RFID transponder (118) in the first dangerous area (114) by the first read/write device (112), wherein the first operational state provides a first safety stage for the operation of the system. At least the first safety stage is provided for the operation of the system, in case the first RFID transponder is detected in the first dangerous region. Persons carrying at least one RFID transponder can be identified using the RFID transponder.

Description

Be s honor nce

Procedures and security device for safeguarding danger areas of automated equipment

The invention relates to a method and safety apparatus for monitoring danger areas of an automated system in general.

Plant and machinery are provided with appropriate safeguards to life and limb of people who get close to these plants or machines, to protect and to minimize security risks that exist due to the operation of such equipment and machines for people. To avoid that persons entering a potential danger zone of a plant or machinery, the danger area is secured with appropriate barriers or barriers against unauthorized access. Such barriers may consist of solid walls, so that the hazardous area is accessible only through doors.

To increase the safety of persons in such doors may also switch (position switch with separate Actuator tumbler Sσharnierschalter, magnetic switches, etc.) can be arranged, which switch off exploiting Dende zone located in the hazard system or machine when opening the doors. In these

Connection, one speaks performed by safety-related systems of safety functions, and a certain Sicherheistufe (safety integrity) have.

Fences, solid walls are relatively expensive and inflexible. Such massive walls also have the disadvantage that when rebuilding of the system may also be a reconstruction of the walls is vonnδten, which causes additional costs.

The object of the invention is to provide an improved method for monitoring the danger zones of plants. The object of the invention is also to provide an improved safety device for monitoring the danger zones of the plants indicated.

The objects underlying the invention are solved by the features of the independent claims. Preferred embodiments and developments of the invention are disclosed in the respective Unteransprüσhen.

Erfindungsgetnäß a method for monitoring of hazard is renbereichen an automated system indicated. In this case, a first read / write device for the Detekti- on RPID of transponders is used at least in a first danger zone of the plant. According to the method carried out, the detection of a first RFID transponder in the first danger zone by the first read / write device. Further, the plant is operated according to the detection of the first RFID transponder in the first danger zone in a first operating mode. The first operating mode ensures a first safe state for the operation of the plant. The first safe state is brought about by a first security feature and therefore corresponds to a first security level, wherein at least the first level of security for the operation of the plant is provided, if the first RFID tag is detected in the first danger zone.

Entering the first danger zone by a first person wearing the first RFID transponder which now can be detected by the first read / write device, so that the plant, for example, a standard mode, which is provided in normal operation for the plant, is driven into the first operation mode. The plant can be operated as a whole in the first mode of operation or only the part of the plant which is monitored as the danger zone according to the operation mode. The first operating mode ensures here the first secure state, which can be matched to the powers and the formation of the first person. Through the first safe state a level of security for the system or the part of the system is specific fied, which is the powers and knowledge of the first person and adapted to the outgoing through the plant hazard. Is it in the first person, for example, an untrained person, the first secure supply may demand was that the system is completely switched off, whereas the plant for example is operated at reduced speed when the person is trained. The identification of the first person is via the first RFID transponder that one in this case the first person is clearly allocated. Here, the first person a plurality of substantially identical wear RFID transponder with it. By detection of at least one of the transponders, the corresponding, above-described security measures are taken. The use of multiple transponders has the advantage that the penetration of the first person in the first danger zone can be detected even when a transponder is defective. Accordingly, several read / write devices to monitor the individual risk areas can be used.

The inventive method has the advantage that no structural measures, such as the construction of barriers or barriers are necessary in order to detect an approach of a person is provided with an RFID transponder to the system. This reduces the costs for the plant and for operation of the plant can be reduced. In addition, the method offers the possibility to realize a flexible and graduated security concept. The term system covers also parts of the plant, such as a single a machine or a composite of several machines.

For detection of RFID tags, the read / write device transmits radio signals in the radio frequency range to detect RFID transponders. RFID stands for Radio Frequency Identification. RFID transponders modulate

Radio signal and scatter it back, so that the backscattered and modulated signal from the read / write device can be received again, and thus a RFID transponder can be detected. About the modulation data can be modulated by an RFID transponder on the radio signal. By de- modulation of the radio signal, the read / write device can filter out the data from the radio signal, which is for example the I dentification possible the RFID-transponder, if the data contains for example an identifier of the RFID transponder.

According to one embodiment of the invention the Detekti- on a second RFID transponder of a second person in the first danger zone is performed. Furthermore, the plant in the presence circuit is operated on the detection of the second RFID transponder in a second operating mode when a second security function requires a higher security level than the first safety function, wherein the second operating mode, the second safe state for the operation of the system or of the abutment member, which is monitored via the first danger zone, ensures and wherein at least the second secure state is provided for the operation of the system if the second RFID tag is detected in the first danger zone.

The second RFID transponder may be worn, for example by a second person and thereby move in the first driving range overall. In the above-mentioned first person wearing the first RFID transponder with it, it may, for example, by operating staff for the plant, while with the second person, carrying the second RFID transponder with them to an untrained person Han your can, must be guaranteed for a higher security when this person approaches the plant and get to the first danger zone of the plant. a security level for the plant or the corresponding part of the plant is cherheitsfunktion by the second Si specified, which is adapted to the powers and knowledge of the second person. This higher security level corresponding to this embodiment, the second safe state, so that the system upon entering the first danger zone by the second person in the second operating mode, starting driven by the first operation mode.

Therefore, the method according to the invention has the advantage that the system is operated depending on the person that are detected across various RFID tags and are located in the danger zone, in accordance with various different levels of security and safety features the advantage. As mentioned above, security features to ensure the appropriate security levels so that the system or the monitored part of the facility in accordance with the powers and knowledge of the person inside the danger zone is operated persons.

According to one embodiment of the invention, the detection is carried out further, that the first RFID transponder no longer in the first danger zone. Moreover, operating the system in the second operating mode occurs if the system was operated at de- tektiertem RFID transponder in the first danger zone in the first operating mode. Upon detecting that the second RFID transponder is no longer in the first danger zone, the system is in default mode, which is provided for the normal operation of the plant is operated. The first read / write unit detected continuously or at regular or irregular intervals RFID transponders, which are in the first danger zone. Is thus operated the system in the first operating mode due to the presence of the first RFID transponder in the first exposure, it is detected that the first RFID transponder has left the first danger zone, then the system continues to be operated in the second operating mode if still the second

RFID transponder in the first danger zone is located. Otherwise, the system is operated from the second operating mode to the standard mode. The process has the advantage of being reasonable on the one hand the operating mode of the system will fit without the people themselves have to carry out any action on the system of the people who are the plant in the first danger zone. After, an embodiment of the invention, the on Detekti- made as to whether the second RFID transponder is no longer in the first danger zone. Subsequently, the system is operated in the first mode of operation if the system was operated at de- tektiertem second RFID tag in the first danger zone in the second operating mode.

According to one embodiment of the invention, a second read / write device for the detection of RFID transponders is used in a second hazard area of ​​the plant. According to the method carried out, the detection of a third RFID transponder in the second danger zone by the second read / write device. Further, the system is operated in a third operating mode if a third security level is higher than the levels of security that are provided for the operation of the plant, when the first and / or the second RFID transponders are positioned in the first danger zone, said third mode of operation, ensures a third safe state for the operation of the plant and wherein at least the third safe state is provided for the operation of the system, if the third RFID tag is detected in the second danger zone.

Through the use of multiple read / write devices can be even more hazardous areas, as here, the first and second danger zone, define for the system. The system is always operated according to the highest security level, which is due to the detection of an RFID transponder in the first or second danger zone to ensure. This ensures that even lower levels of security that must be ensured for other people in the danger zones, are met.

According to one embodiment of the invention, a Zugangser- is replaced for the registration of RFID transponders used in the access to a work area of ​​the automated system, wherein a third read / write device for the detection of RFID transponders is provided in the work area. According to the method carried out, the detection of the first RFID transponder in the work area by the third read / write device. Further, if the first RFID transponder has been -registered by the access detection is determined. The system is then operated in a fourth mode of operation, if the first RFID transponder is detected by the third read / write device and has not been registered by the access detection. The fourth operating mode, while a fourth security level for the operation of the plant safety-rather.

According to one embodiment of the invention, the detection is made that the first RFID transponder is no longer in the work area. Further, if the first RFID transponder has been logged out of the access detection is determined. If the RFID tag is no longer detected by the third read / write device and has not logged off detection in the access, the system is operated in a fifth operating mode. The fifth operating mode, DA safe with a fifth safe state for the operation of the plant.

According to this embodiment of the invention, a balance between the detected via the access detecting RFID transponders and the RFID transponders which are detected in the work area from the third read / write device is performed. If it is determined that a registered RFID tag can not be detected in the work area from the third read / write device, the system is operated in the fourth mode of operation. The fourth mode of operation may for example correspond to a shutdown of the plant as well as the fifth operating mode. This ensures that the installation is stopped at a discrepancy between the third read / write device detected RFID tags and detected via the access detecting RFID transponders is ensured to a possible risk potential for the person carrying the corresponding RFID transponder with it to exclude. According to one embodiment of the invention, the first danger zone and the second danger zone overlap at least partially. Therefore, with the first and second read / write device danger overlapping areas of the plant can be monitored. Here is the use of writing

/ Read apparatus for the detection of RFID transponders particularly advantageous since, for example, in comparison with conventional fences, for example, the first danger zone and the second danger zone can be substantially any defi ned in response to the detection range of the associated with the corresponding danger zone read / write device and also an overlap of different risk areas is made possible in a simple manner.

According to one embodiment of the invention, the first danger area and the working area overlap at least partially.

According to one embodiment of the invention, the second danger zone and the working area overlap at least teilwei- se.

According to one embodiment of the invention, a reader / writer reads out data from the RPID transponder, wherein the loading triebstnodi for the installation on the basis of the data which are read from the ERS th, second or third RFID transponder can be determined.

As mentioned earlier, an RFID tag from a person who has an access authorization to the appropriate facility, to be worn. When approaching the person to the danger zone, a read / write device from your person associated RFID transponder reads data stored on the read / write device receives information about the person, in particular about the security powers of the person. In the data sheet may for example be specific, the mode that is for which the danger area with respect to the corresponding person who transmits the data on the RFID transponder is provided. For example, the first person may be a trained person who is allowed to enter the first danger zone, without the system is completely switched off. but the same person can be untrained for work in the second danger zone and thus trigger their correspondingly assigned safety function during a stay in the second danger zone. the first read / write device can then determine which first mode of operation of this person is assigned on the basis of data from the first RFID transponder. One mode of operation may for example specify that the system or components of the system are driven at a reduced speed, or that they are completely shut down.

According to one embodiment of the invention, in the data read from an RFID transponder, to an identifier of the RFID transponder. According to this embodiment, a unique identifier (for example, an identification number) stored on each RFID transponder. This identifier is assigned to the user of the corresponding RFID transponder, whereby it can be detected.

According to one embodiment of the invention, with the RFID tags are passive or active RFID tags. Passive RFID tags do not have their own sources of energy Ie, and therefore have the energy it to send their

Information or data need to pull from the received radio signals of the reader. In contrast, active RFID tags have their own power supply.

According to one embodiment of the invention is any person who has access to the system is granted, associated with at least one RFID transponder, said person wearing its associated RFID transponder or its associated RFID transponder during an approach to the system with them, and wherein the first, second, third, fourth and / or fifth security level is adapted to the powers of each person. According to one embodiment of the invention, one or more RFID transponders in the work clothes of the RFID transponders associated with the person are mounted.

According to one embodiment of the invention, an RFID transponder may be implanted beneath the skin of the associated with the RFID transponder person.

In another aspect, the invention relates to a computer program product having computer-executable instructions, wherein the instructions are provided for carrying out the inventive method.

In another aspect, the invention relates to a safety device for monitoring hazardous areas of an automated system comprising at least a first read / write device. The first read / write device for the Detekti- on at least one first RFID transponder provided in a first danger zone of the plant. The safety device also has means for operating the system in a first operating mode, said first operation mode ensures a first level of security for the operation of the plant, and wherein at least the first level of security for the operation of the plant is provided, if the first RFID transponder is detected in the first danger zone.

In another aspect, the invention relates to an automated system with an inventive security device.

In addition, preferred embodiments of the invention with reference to the drawings will be explained in more detail. Show it:

1 shows a block diagram of an automated system,

2 shows a flowchart of the steps of the invention

Method represents, FIG 3 is a block diagram of a part of an automated system and a safety device for monitoring hazardous areas of the abutment member.

1 shows a block diagram of an automated system 100. The automated system 100 includes a controller 102 and a memory 104. The controller 102 is used for example for controlling and regulating process sequences of the automated system 100 via the controller 102. Therefore, for example, can be individual components which are not shown here, the automated control system 100 and control. In the controller 102 may be a PLC control system, for example.

The controller 102 includes a microprocessor 106 which executes a computer program product 108th The computer program product 108 is permanently stored on the storage 104 and loaded for execution into the microprocessor 106th In the memory 104 a data base 110 are also stored.

The system 100 includes a first danger zone 114, must be complied with within which certain security standards (eg by law), if there are people in the first danger zone loading. In order to monitor the danger area, a safety device is used, whereby the computer program product 108 can be regarded as a component of the safety device. Another component of the safety device is a first read / write device 112, WEL ches is attached to the automated system 100th

The first read / write device 112 is used for the detection of RFID transponders within a detection range of the first reader / writer 112th For detection of RFID transponders, the first reader / writer 112 sends in regular or irregular intervals from an RF signal which is modulated by the RFID transponders and scattered back to the first read / write device 112th Since the range of the RF signal is substantially of the transmission power of the first reader / writer 112 and the local conditions (e.g., the range is by walls which are arranged around the automated system 100 decreased) depends only RFID transponders can within a certain range, called the detection area are detected by the first read / write device 112th To use the first read / write device 112 for monitoring the first danger zone 114, the detection range of the first reader / writer 112 is therefore set to, for example, by a corresponding adjustment of the transmission power of the RF signal that the detection region is substantially overlap with the first danger zone 114th Characterized can detect RFID transponder 112 within the first danger zone 114, the first read / write device. The first read / write device 112 is also connected via a communication link 116 with the control 102nd

Is a first RFID tag 118, which is supported by a first person, detected by the first read / write device 112, it is possible after the detection, a first identifier 120, which is stored on the first RFID transponder 118 from the first - read / write device 112 are read out. In the first identifier 120 is beispielswei- se a unique identifier on the first RFID transponder 118 and the first one is identifiable. The first identifier 120 is then transferred from the read / write device 112 via the communication link 116 to the controller 102nd

On the basis of the first identifier 120, the computer program product 108 may determine the intended staying in the first danger zone 114 for the first RFID tag 118 and for the first person first safety function with their defined security level from the database 110th The first identifier 120 can thereby be stored in the database 110 and the first safety function associated with it. The first safety function (the first safe state) corresponds to DA at a security level required for the operation of the system is appropriate for stays of the first person in the first danger zone 114th For example, it may be the first person to trained personnel who may enter 114 the first overall driving range without the automated system 100 is turned off completely. The first safety function can then, for example, specify that the moving components which are accessible to persons in the first danger zone 114, can be reduced in the speed of movement, for example by half.

Alternatively to the use of a database provided for the first safety function on the data transmitted by the transponder can be indicated to the computer program product 108 such that the computer program product 108 receives all relevant data by reading the transponder.

In the computer program routines 108 for controlling and regulating the system 100, stored in a first mode of operation 124, which ensures the first level of security. Further routines for controlling and regulating the system are implemented in a standard mode 122 in the computer program 108 100th The default mode corresponds to the mode of operation of the system when no RFID transponders or no person in the first danger zone 114 is locatable. Following the determination of the provided for the first RFID transponder 118 first level of security, the system is therefore 100 driven by the standard mode 122 in the first operating mode 124, thereby ensuring that the identified via the first RFID transponder 118 first person with no danger in first danger zone must perform 114 operations.

Now, a second RFID transponder 128 located by the first read / write device 112 in the first danger zone, then the first read / write device 112 determines a second identifier 130, which is stored on the second RFID tag 128 and transmits the second identifier 130 to the controller 102 via the communication link 116. Based on the second identifier 130, the computer program product 108 may be made of the database 110 when moving in the first danger zone 114 for the second RFID tag 128 and the time allotted for the second person second safety function ER- auxiliaries. In the second person, it may be untrained personnel, so that the second safety function corresponds to a higher security level than the first safety function. In the computer program product 108 routines for controlling and regulation of the plant are also stored 100 in a second mode of operation 126, which ensure the operation of the system according to the second security level. Corresponds to the second safety function, as mentioned above a higher security level than the first safety function, the system 100 is moved from the first operating mode 124 in the second operation mode 126th This ensures that the intended stay in the second person in the first danger zone 114 second level of security is maintained. As for the first person, a lower level of security must be maintained as in the second security level for the second person, the security requirements that are to be provided at the stay of the first person in the first danger zone 114, also met.

Removed now the second person with the second RFID transponder 128 from the first danger zone 114, so only the first RFID transponder 118 is detected in the first danger zone from the read / write device 112th Thereafter, the operation mode of the system 100 is changed from the second operating mode 126 to the first operating mode 124, so that the intended stay at the first person in the first danger zone 114 first level of security is maintained. Leaves the first person with the first RFID transponder 118, the plant, the plant is switched from the first operating mode 124 to the standard mode 122nd

FIG 2 is a flowchart showing steps of the method for monitoring hazardous areas of an automated system comprising at least a first read / write device is provided for the detection of RFID tags in a first danger zone of the plant. According to the method, the detection of an RFID transponder in the first danger zone by the first read / write device in step 200th In step 202, the system is operated in a first operating mode, said first operation mode ensures a first safe state for the operation of the plant, wherein at least the first level of security for the operation of the plant is provided, if the first RFID tag is detected in the first danger zone becomes.

3 shows sσhematisch a block diagram of a part of an automated system 300 and a safety device for monitoring hazardous areas of the abutment member. The system part 300 includes a PLC controller 302, which is provided for controlling and regulating processes and operations of the part of the automated system 300th Further, a first read / write device 304 and a second read / write device 306 are mounted on the installation part 300th The detection range of the first reader / writer 304 is adjusted so that this RFID transponder detected within a first danger zone 308, the portion of the automated system 300th The detection range of the second reader / writer 306 is also set so that this substantially corresponds to a second danger zone 310 of the abutment member 300th Is possible Further, a working area is confined to the automated system 300 by a barrier 312 such that access to the bearing member 300 only by a door 314 to which an access detection is attached 316th The detection range of a third read / write device 318 which is disposed within the work area 312 is set so that this enables detection of RFID transponders within the working range 312th

The first reader / writer 304, the second read / write device 306 or the third read / write device 318 are each connected via a communications link to a controller 320 which is in turn connected to a communication link with the PLC 302 , Further, the access detection 316 is connected to the controller 320 via a communication link. The communication links are shown in FIG 3 as dashed lines. The access detection 316, the first read / write device 304, the second read / write device 306 and the third read / write device 318 and the controller 320 are components of the security system, which is used to monitor the first and second hazard areas as well as the work area ,

The controller 320 includes a microprocessor 322 and a memory 324th In memory 324, a database is laid off 326th

Below is initially assumed that the access detection 316 and the third read / write device is disabled 318th The work area 312 is therefore initially ignored.

Further, that a first RFID transponder 330 is supported by a first person and that a second RFID transponder 332 is supported by a second person is assumed. At the first person it should be a trained person, while the other person is untrained.

For the first person, a first level of security must be maintained if it is the first danger zone 308th This first level of security calls for example., That the contact part 300 is driven with a reduced speed by 50%. For the second person calls a second safety function with a second security level that moving parts of the system part to be stopped when the person is in the first danger zone 308 or in the second danger zone 310th In the database 326 and this must be reflected. It is thus noted that the first person is identified by means of the first RPID transponder 330, and that the second person is identified by means of the second RFID transponder 332nd Further, it is noted that the first security level to the first person in the first danger zone and the second security level for the second person in the first and second danger zone must be observed.

Each security level is assigned to an operating mode which ensures that the system part 300 is driven according to the corresponding safety function with its corresponding security level. A first operating mode 338 ensures that the abutment portion 300 is driven according to the first safety function, whereas a second mode of operation 336 ensures that the abutment portion 300 is operated according to the second safety function.

The microprocessor 322 executes a computer program product 328, which is permanently stored on the storage 324 and loaded by the microprocessor 322 for execution by the memory 324th The operation modes 334 and 336 are implemented according to this example in the computer program product 328, the computer program product 328 302 correspondingly instructs the PLC control to one of the operating modes to operate the system accordingly.

now enters the first person with the first RFID transponder 330 the working area 312 and runs from position A to position B, the first RFID transponder on entering the second danger zone from the second reader / writer 306 is detected. The second reader / writer 306 can read an identifier from the first RFID transponder 330, and transmit to the controller 320th About the database 326, the computer program product 328 can then determine from the identifier that it is the transponder 330 for the carrier of the first RFID to the first one is for the security function (as needed) specified for the second danger zone 310th The system 300 will therefore continue to operate normally.

Enters the first person now the first danger zone 308, the first reader / writer 304 detects the first RFID transponder 330 and reports the detection to the controller 320. The computer program product 328 then determines from the database 326, that for the first person, the first security level is observed and the Computerprogrammpro- domestic product 328 instructs the PLC controller 302 to operate the system part according to the first mode of operation 334th Thus, the rate at which the plant part is moved, is reduced to 50% of the normal speed. now enters the second person with the second RFID tag 332 of the second danger zone 310, the RFID tag is detected 332 from the second reader / writer 306 and the identifier of the second read / write device 306 is transmitted to the controller 320 , The computer program product 328 can determine on the basis of this identifier that is provided for the second person, the second operating mode 336 for the part of the system and the PLC controller is instructed thereafter, to stop the installation part 300th

In the following, it is now assumed that the access detection 316 and the third read / write device are enabled. A

Person entering the work area 312 must register via its associated RFID transponder in the access detection 316th Registered for example. The first one by means of the first RFID transponder 330 in the access detection 316, the identifier of the first RFID transponder 330 is saved in the database 324, until the person logs out at the access detection 316. The cancellation can go automatically vonstatten, for example if the person through the door 314 the working range leaves 312th

After the first person has entered the work area 312, then the first RFID transponder 330 from the reader / writer (regularly) is detected. If the first RFID transponder 330, however, so, it can be determined by comparing with the database 326 that the first person in the work area of ​​the first RFID transponder but 330 no longer works. The installation part 300 may then, for example, in the second operating mode 336 (stopping the installation part 300) are driven.

Claims

claims
1. A method for monitoring hazardous areas (114) of an automated installation (100), wherein at least a ERS tes read / write device (112) for the detection of RFID
Transponders (118, 128) in a first danger zone (114) of the plant is provided, the method comprising the steps of:
Detection of a first RFID transponder (118) in the first danger zone by the first read / write device;
Operating the system in a first operating mode (124), wherein said first operation mode ensures a first level of security for the operation of the plant, wherein at least the first level of security for the operation of the system is seen upstream, if the first RFID transponder in the first danger zone detected becomes.
2. The method of claim 1, further comprising the steps of: detecting a second RFID transponder (128) in the first danger zone;
Operating the system in a second operating mode (126) if a second security level is higher than the first security level, wherein the second operating mode, the second level of security for the operation of the plant safety, wherein at least the second level of security for the operation of the system is provided if the second RFID tag is detected in the first danger zone.
3. The method of claim 1 or 2, further comprising the steps of:
Detecting that the first RFID transponder no longer in the first danger zone;
Operating the system in the second mode of operation if the system was operated at detected is first RFID transponder in the first danger zone in the first operating mode; Detecting that the second RFID transponder is no longer in the first danger zone; - Operating the system in a standard mode (122), the default mode is provided for the normal operation of the plant.
4. The method of claim 1 or 2, further comprising the steps of:
Detecting that the second RFID transponder is no longer in the first danger zone; Operating the system in the first mode of operation if the system was operated at the second RFID transponder detected is in the first danger zone in the second operating mode.
5. The method according to any one of the preceding claims, wherein a second read / write device (306) for the detection of RFID tags in a second hazard area (310) is provided to the system, further comprising the steps of:
Detecting a third RFID transponder in the second danger zone by the second read / write device; Operating the system in a third operating mode if a third security level is higher than the levels of security that are provided for the operation of the plant, when the first and / or the second RFID transponders are in the first danger zone, said third mode of operation, a third security level for the operation of the check would ensure at least the third security level for the operation of airborne system is provided, if the third RFID tag in the second danger zone is detek- advantage.
6. The method according to any one of the preceding claims, wherein an access detection (316) for registering of RFID transponders in access to a workspace (312) is provided to the automated system, wherein a third read / write device (318) for the detection of RFID transponders is provided in the working area, further comprising the steps of:
- detection of the first RFID transponder (330) in the work area (312) by the third read / write device; If the first RFID transponder has been registered by the access detection determination;
Operating the system in a fourth operating mode if the first RFID transponder from the third read / write device is detected and has not been registered by the access detection, said fourth mode of operation ensures a fourth security level for the operation of the plant, wherein at least the fourth security level is provided for the operation of airborne system, if the first RFID tag is detected in the second danger zone.
7. The method of claim 6, further comprising the steps: that the first RFID tag is not part detection in the working area;
If the first RFID transponder has been logged out of the access detection determination;
Operating the system in a fifth operating mode, if the first RFID transponder from the third read / write device is no longer detected and has not logged in the access detection, said fifth mode of operation ensures a fifth security level for the operation of the plant, wherein in this case at least the fifth level of security for the operation of airborne system is provided.
8. The method according to any one of the preceding claims, wherein the first danger zone (308) and the second danger zone (310) overlap at least partially, and / or wherein the first danger area and the work area (312) at least partially overlap, and / or wherein the second danger zone and the working area at least partially overlap.
9. The method according to any one of the preceding claims, wherein a read / write device data (120, 130) from the RFID
Transponders reads, wherein the modes of operation for the system based on the data that are read from the first, second or third RFID transponder can be determined.
10. The method of claim 9, wherein, in the data is read out from an RFID transponder at least an identifier of the RFID transponder.
11. The method according to any one of the preceding claims, wherein there are passive or active RFID tags when the RFID transponders.
12. The method according to any one of the preceding claims, wherein each person of a plurality of persons to whom access to the system is granted at least is associated with an RFID transponder, the person its associated RFID transponder or its associated RFID transponder at a approxi- mation transmits to the system in itself, wherein the first, second, third, fourth and / or fifth operating mode is adapted to the powers of each person.
13. The method of claim 12, wherein one or more RFID transponders in the work clothes of the RFID tag or the RFID transponders associated person are arranged.
14. The method of claim 12, wherein one or more RFID transponders implanted under the skin of the associated with the RFID transponder / to RFID transponders person.
15. A computer program product (108) having computer-executable instructions for performing a method according to any one of the preceding claims.
16. A safety device for monitoring hazardous areas of an automated system comprising: at least a first read / write device (112), said first read / write device for the detection of at least one first RFID transponder (118) in a first danger zone (114) the plant is provided; Means for operating the system in a first operating mode (124), wherein said first operation mode ensures a first level of security for the operation of the plant, wherein at least the first level of security for the operation of the plant is provided, if the first RFID
Transponder is detected in the first danger zone.
17. Safety device according to claim 16, further comprising: means for operating the system in a second operating mode (126) if a second security level is higher than the first security level, said second operating mode ensuring the second level of security for the operation of the plant, wherein at least the second level of security is provided for the operation of the system, if a second RFID transponder from the first reader / writer in the first danger zone is detected.
18. Safety device according to claim 16 or 17, further comprising: - means for detecting that the first RFID
Transponder no longer in the first danger zone / means for operating the system in the second mode of operation if the system operated in the first RFID transponder detected is in the first danger zone in the first operating mode was ben;
Means for detecting that the second RFID transponder is no longer in the first danger zone; Means for operating the system in a standard mode, the default mode is provided for the normal operation of the plant.
19. Safety device according to claim 17 or 18, further comprising:
Means for detecting that the second RFID transponder is no longer in the first danger zone; Means for operating the system in the first mode of operation if the system was operated at the second RFID transponder detected is in the first danger zone in the second operating mode.
20. Safety device according to one of the preceding arrival sayings 16 to 19, with a second read / write device, said second read / write device for the detection of RFID transponders is provided in a second hazard area of ​​the plant:
Operating the system in a third operating mode if a third security level is higher than the levels of security that are provided for the operation of the system when the first and / or the second RFID transponders are in the first danger zone, said third mode of operation, a third security level for the operation of the check would ensure at least the third security level for the operation of airborne system is provided, if a third RFID tag in the second danger zone from the second reader / writer is detected.
21. Safety device according to one of the preceding claims 16 to 20, further comprising: an access detecting (316), said access detection for the registration of RFID transponders in the access to a work area (312) of the automated system is seen forth; a third read / write device, wherein the third read / write device for the detection of RFID transponders is provided in the work area; for determining whether the first RFID transponder has been registered by the access detection means;
Means for operating the system in a fourth operating mode if the first RFID transponder from the third read / write device is detected and has not been registered by the access detection. - is detected means for granting access to the working area only when at least one of a person associated RFID transponder, or only when all of the person associated with RFID transponders are detected.
22. Safety device according to claim 21, further comprising: means for detecting that the first RFID transponder no longer in the work area; - to determine whether the first RFID transponder has been logged out of the access detection means; Means for operating the system in a fifth operating mode, if the first RFID transponder from the third read / write device is no longer detected and has not logged in the access detection.
23. Automated system (100) with a safety device according to any one of claims 16 to 22nd
PCT/DE2007/000746 2007-04-26 2007-04-26 Method and safety device for monitoring dangerous areas of automated systems WO2008131704A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/DE2007/000746 WO2008131704A1 (en) 2007-04-26 2007-04-26 Method and safety device for monitoring dangerous areas of automated systems

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE200711003584 DE112007003584A5 (en) 2007-04-26 2007-04-26 Procedures and security device for safeguarding danger areas of automated equipment
PCT/DE2007/000746 WO2008131704A1 (en) 2007-04-26 2007-04-26 Method and safety device for monitoring dangerous areas of automated systems

Publications (1)

Publication Number Publication Date
WO2008131704A1 true true WO2008131704A1 (en) 2008-11-06

Family

ID=38922976

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/DE2007/000746 WO2008131704A1 (en) 2007-04-26 2007-04-26 Method and safety device for monitoring dangerous areas of automated systems

Country Status (2)

Country Link
DE (1) DE112007003584A5 (en)
WO (1) WO2008131704A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2282106A1 (en) * 2009-08-07 2011-02-09 Sick Ag Securing an area which can only be accessed through one secure access sluice
US8456792B2 (en) 2010-02-05 2013-06-04 Honeywell International Inc. Secure non-contact switch
US8699200B2 (en) 2010-02-05 2014-04-15 Honeywell International Inc. Secure non-contact switch

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US2913581A (en) * 1953-09-25 1959-11-17 Bernard R Katshen Method and apparatus for controlling production machines
EP1233231A2 (en) * 2001-02-15 2002-08-21 Progressive Tool & Industries Company Factory personnel monitors
DE20208788U1 (en) * 2002-05-29 2002-08-22 Bautrans Umweltservice Gmbh Personal protection equipment
US20040148039A1 (en) * 2003-01-24 2004-07-29 Farchmin David W Position based machine control in an industrial automation environment
US20050063133A1 (en) * 1998-12-02 2005-03-24 Mather Corey Alexander Material processing machine
DE102005003827A1 (en) * 2005-01-26 2006-07-27 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Interactive device for cooperation between a person and a robot unit at a work station with a robot unit has sensor units to detect how close the person is
WO2007010795A1 (en) * 2005-07-19 2007-01-25 Omron Corporation Safety management system for worker
EP1820611A1 (en) * 2006-02-17 2007-08-22 Abb Research Ltd. An industrial robot system
US20070205861A1 (en) * 2006-02-23 2007-09-06 Rockwell Automation Technologies, Inc. RFID/biometric area protection

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US2913581A (en) * 1953-09-25 1959-11-17 Bernard R Katshen Method and apparatus for controlling production machines
US20050063133A1 (en) * 1998-12-02 2005-03-24 Mather Corey Alexander Material processing machine
EP1233231A2 (en) * 2001-02-15 2002-08-21 Progressive Tool & Industries Company Factory personnel monitors
DE20208788U1 (en) * 2002-05-29 2002-08-22 Bautrans Umweltservice Gmbh Personal protection equipment
US20040148039A1 (en) * 2003-01-24 2004-07-29 Farchmin David W Position based machine control in an industrial automation environment
DE102005003827A1 (en) * 2005-01-26 2006-07-27 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Interactive device for cooperation between a person and a robot unit at a work station with a robot unit has sensor units to detect how close the person is
WO2007010795A1 (en) * 2005-07-19 2007-01-25 Omron Corporation Safety management system for worker
EP1820611A1 (en) * 2006-02-17 2007-08-22 Abb Research Ltd. An industrial robot system
US20070205861A1 (en) * 2006-02-23 2007-09-06 Rockwell Automation Technologies, Inc. RFID/biometric area protection

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2282106A1 (en) * 2009-08-07 2011-02-09 Sick Ag Securing an area which can only be accessed through one secure access sluice
US8456792B2 (en) 2010-02-05 2013-06-04 Honeywell International Inc. Secure non-contact switch
US8699200B2 (en) 2010-02-05 2014-04-15 Honeywell International Inc. Secure non-contact switch

Also Published As

Publication number Publication date Type
DE112007003584A5 (en) 2010-04-15 grant

Similar Documents

Publication Publication Date Title
US7530113B2 (en) Security system and method for an industrial automation system
US5664113A (en) Working asset management system and method
US20080136649A1 (en) Access control system and sanitizing station
US5666010A (en) Safety system for machine tools
US20050040232A1 (en) Object control and tracking system with zonal transition detection
US20050082121A1 (en) Safety system for an elevator installation and method of operating an elevator installation with a safety system
US20090237203A1 (en) Identification with rfid asset locator for entry authorization
US5796341A (en) Safety and security system for work area
US20100127821A1 (en) Access Control
US20100045464A1 (en) System and methods for ensuring proper use of personal protective equipment for work site hazards
US6422463B1 (en) Access control system
US5682142A (en) Electronic control system/network
US20070194097A1 (en) Data acquisition and processing system for risk assessment
US20120086550A1 (en) Pedobarographic biometric system
US20080216156A1 (en) Fault tolerant security system, method and apparatus
DE102004038906A1 (en) Movable object detecting method for control device, involves identifying object with superimposed tag by identification device before entering into control area, and transferring object information from tag to evaluating unit
JP2005078222A (en) Passage management system, safety management system and management passage method
US20090072631A1 (en) Worker safety management system
JP2006311111A (en) Position sensing system and method for sensing position
US20060038688A1 (en) Risk evaluation support device, program product and method for controlling safety network risk evaluation support device
US7468594B2 (en) Protection device
US20050203645A1 (en) Safety controller and method for loading a new operating program onto the safety controller
US20080007407A1 (en) Zone supervision system
WO2003024856A1 (en) Safety circuit for elevator doors
US20110278401A1 (en) Track Worker Safety Information System and Method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07722304

Country of ref document: EP

Kind code of ref document: A1

REF Corresponds to

Ref document number: 112007003584

Country of ref document: DE

Date of ref document: 20100415

Kind code of ref document: P

122 Ep: pct application non-entry in european phase

Ref document number: 07722304

Country of ref document: EP

Kind code of ref document: A1