WO2019145497A1 - Gestion de processus avec identification d'emplacement - Google Patents

Gestion de processus avec identification d'emplacement Download PDF

Info

Publication number
WO2019145497A1
WO2019145497A1 PCT/EP2019/051890 EP2019051890W WO2019145497A1 WO 2019145497 A1 WO2019145497 A1 WO 2019145497A1 EP 2019051890 W EP2019051890 W EP 2019051890W WO 2019145497 A1 WO2019145497 A1 WO 2019145497A1
Authority
WO
WIPO (PCT)
Prior art keywords
location
mobile device
checklist
data
task
Prior art date
Application number
PCT/EP2019/051890
Other languages
English (en)
Inventor
Joseph Charles HANDSAKER
Original Assignee
Elements Technology Platforms Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GB1801306.0A external-priority patent/GB2570479A/en
Priority claimed from GB201809924A external-priority patent/GB2574810A/en
Application filed by Elements Technology Platforms Limited filed Critical Elements Technology Platforms Limited
Priority to GB2011311.4A priority Critical patent/GB2583678A/en
Publication of WO2019145497A1 publication Critical patent/WO2019145497A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/33Services specially adapted for particular environments, situations or purposes for indoor environments, e.g. buildings
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/35Services specially adapted for particular environments, situations or purposes for the management of goods or merchandise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Definitions

  • This application relates to a process management system using an identification protocol bases on short-range wireless communications protocol, such as NFC; and a wireless communications protocol such as Bluetooth Low Energy.
  • short-range wireless communications protocol such as NFC
  • wireless communications protocol such as Bluetooth Low Energy
  • a process describes a series of sub-divisions such as actions, steps or operations that are performed sequentially to produce an output.
  • the manufacturing industry relies on the strict and repeatable performance of processes to create products for their customers. Yet, processes can vary wildly in time to complete, complexity, number of steps, and number of inputs amongst a host of other factors. This means that the success of a process can also vary based on the individual and combined performance of tasks. Because of this, it is preferential to record details relating to a process and the constituent steps of the process. Furthermore, in manufacturing processes that create products to ISO standards it is vital to document the manufacturing process, to provide evidence that certain procedures and tests have been performed to the required ISO standard.
  • Processes can be recorded in a number of ways, from the most basic recording of a process through handwritten dockets; through to fully instrumented manufacturing lines that automatically digitise and record every aspect of a process. Though a fully instrumented manufacturing line may appear to be the gold standard for recording a process, the cost and disruption required to install such instruments makes it a prohibitive option for smaller manufacturers.
  • One method of recording a process is by creating a list of tasks to be performed (a checklist), prescribing the constituent features required to perform each part of a process. Such features may include the required tools and equipment, required components and materials, required training, and target output.
  • Nixon (US20140282257A1 ) describes a method whereby such a system is implemented in a process control environment, with said checklist displayed on a user interface device such as a mobile phone and tasks are checked off, or completed, manually by the operator.
  • An alternative to this process is to automate the‘checking off procedure by using an identification medium such as Radio Frequency Identification (RFID), bar codes, and matrix bar codes (such as QR codes) to trigger an item within a checklist.
  • RFID Radio Frequency Identification
  • bar codes such as bar codes
  • matrix bar codes such as QR codes
  • Bar codes provide a basic method of asset tracking, whereby users scan a printed bar code with a bar code scanner, identifying a unique identification code corresponding to a record for said asset in a database. Information about the interaction is then logged, and in some cases, information relating to the asset is provided to the user (US20130240621 A1 ; US7258266B1 ; US20130032634A1 ). This allows users to ‘check’ items to record their location or timestamp in a process such as a supply chain.
  • RFID has provided an improved method of asset tracking, by providing a further automated system whereby RFID tags can be identified by RFID scanners at a proximity of up to 12m, allowing assets to be tracked across a facility and across a supply chain (US7504949B1 ; US746623B2).
  • RFID and bar codes (including matrix bar codes) provide a cheap method of identifying who last contacted the asset, and in some cases where the asset was last contacted; all three options require a separate printer to write the identification medium, to the technology required to read the technology.
  • NFC Near Field Communication
  • NFC can be performed between two active devices, or between an active device and a passive device; whereby an active device is described as a device that has the ability to create an electromagnetic signal, and a passive device has the ability to be connected to by an active device and looping an external electromagnetic signal, but is incapable of creating a signal itself.
  • NFC One of the main uses of NFC is to transmit data from a passive device to an active device; a process best exampled through contactless payments, whereby an active device such as a payment terminal interacts with a credit or debit card through an electromagnetic signal being created by the payment terminal, which is then looped via the credit or debit card, thus providing information to the payment terminal.
  • This process can also be utilised in other industries and use cases, whereby objects can be identified and information relating to them retrieved, by an active device such as a fixed terminal or a portable smart device like a mobile phone.
  • NFC has been used as an alternative medium for asset tracking (US20130190897A1 ; GB2550326A; CN105225044A; CN20331 1224U), providing a more secure and less corruptible method of accessing data from an item to a reader device.
  • Data relating to an item can be identified through the interaction between a user device and an NFC tag integrated within a given item (US9258033B2). Said interaction can provide an identification code, and a timestamp for the interaction between the tag and smart device, that could be added to a process history or timeline.
  • NFC tags can be used to add events to the history of an item (WO2012100009A1 ; US7259675B2; US20030023408A1 ), thus providing a detailed description of a process.
  • This method requires specific tags to carry information relating to a specific event that may or may not have a specific geo-location (W02012100009A1 ), or may require additional input from a reader/writer device to create an event (US7259675B2; US20030023408A1 ).
  • NFC and other identification protocols may be to attach information to an item in a list.
  • an identification protocol communicates with a mobile device, causing an item on a checklist to be completed, whilst simultaneously downloading data from the identification protocol to be attached to said item being completed.
  • This may be used to attach a user, as identified by ID card; a tool or piece of equipment; or location; to the performance of a task.
  • the process can be prescribed as a series of sequential items to be performed. Furthermore, said items make up a checklist. This allows an automation of the logging of a process and it’s constituent events, by the utilisation of an identification protocol interaction such as an NFC interaction, to trigger the checking off events on a prescribed checklist.
  • an identification protocol interaction such as an NFC interaction
  • the start of said step may be triggered by the interaction between an identification protocol such as an NFC tag placed on an ID badge, and a read device such as an NFC capable mobile phone; subsequently, the end of said step may similarly be triggered by the interaction between an identification medium, and a read device.
  • an identification protocol such as an NFC tag placed on an ID badge
  • a read device such as an NFC capable mobile phone
  • GPS Global Positioning Signal
  • a similar wireless signal with geo-positional properties GPS is relatively inaccurate and it’s signal can be blocked within large industrial facilities that utilise large amounts of metal and other signal-blocking materials in their construction.
  • signals provide units with relation to global co-ordinates rather than the local co-ordinates of a building or indoor environment. Therefore, another method for calculating the geographical location of a device and it’s user in indoor conditions would provide a more suitable and usable picture of location.
  • Wireless signal strength reduces predictably according to distance from the origin of the signal.
  • wireless signal strength can be used to estimate the distance between two transceivers.
  • This method known as Received Strength Signal Indicator (RSSI)
  • RSSI Received Strength Signal Indicator
  • the calculated distances can be triangulated to identify the location of the device with respect to a local co-ordinate system.
  • Kerai (WO2016075359) describes a method by which a device receives messages from a minimum of three Bluetooth Low Energy devices, and calculates the position of the device based upon the triangulation of the radio signal strength of each BLE device and the known positions of the BLE devices, and transmitting it’s location via BLE to an external device.
  • this invention does not describe how this process could be used as the proxy location for the performance of a task or activity.
  • Tysowski (US8750793 and US20120094597) describes a method whereby the location of an NFC tag is inferred from the known location of a portable mobile device when it is in proximity of the tag, and the ID and location sent to a database by the active device.
  • the method describes the use of GPS as the primary means of geo- positioning, which whilst GPS and similar geo-locating technologies are suitable in most use cases and environments, in some indoor environments such as industrial facilities and factories, external equipment and buildings themselves can distort the signal properties, and thus affect the accuracy of the calculated geographical positioning.
  • this method may also be able to provide information relating to the geographical location of NFC tags. It does not describe a method by which to identify geographical location, such as through the triangulation of BLE signals. A simple description of geographical location without context to the environment, such as proximity to known points, limits the information that can be provided to the system, and thus prevents further information being derived from the output, such as the proximity of the device to individual BLE beacons, which itself may be useful.
  • a digital checklist system By combining the use of an identification protocol with the calculation of location upon data transfer, there is provided a digital checklist system, with automated data collection and storage of detailed information.
  • a method for determining and recording process data in a process checklist where the process occurs in a specified area and process data includes information relating to one or more of a plurality of objects used in the process, or the location of a process task and the calculated location of said objects, wherein each object or task location is provided with an ID tag for transmitting object information over a first communication protocol, said method comprising the following steps: generating a process checklist comprising a plurality of sequential process steps; said checklist includes details of at least one of a task or object for each step of the checklist, selecting a step of said process checklist; and identifying the task and/or object for said step; communicating object information about said task or object for a said step, between a mobile communication device and said ID tag for said task or object, using said first protocol, when said mobile device is within range of said ID tag to communicate over said first protocol;
  • the steps of said method are repeated until all the steps in said checklist are complete.
  • the first communication protocol is an NFC or RFID communication protocol.
  • said second communication protocol is a Bluetooth or Bluetooth Low Energy (BLE) communication protocol.
  • said partial location data for said mobile device is information from at least one Bluetooth or Bluetooth Low Energy Beacon.
  • said partial location data is used to identify proximity of the mobile device to the Bluetooth or Bluetooth Low Energy Beacon.
  • said partial location data for said mobile device is information from at least three Bluetooth or Bluetooth Low Energy beacons located within said specified area.
  • the location of said beacons within said specified area is known.
  • said location of said object is stored in a database within said computer program.
  • the computer program is one or more of application software, system software or a cloud-based application.
  • the objects are passive objects.
  • the passive objects are identification cards or tools.
  • the specified area is an enclosed area, further preferably it is factory, shop floor or a workshop.
  • the ID tag for said object is permanently secured to said object.
  • the ID tag can be removed from said object.
  • the object is one or more of a component used in the process, an Identification card relating to a worker working on the process, or a machine used in the process
  • the process data further comprises temporal information on when the process step started and when the process step ended.
  • the location information includes details of the location of the item during the process step, and any location changes that may occur during the step.
  • the process is one or more of a manufacturing process, a scientific process or a testing process.
  • the identification protocol ID is an NFC tag, card or sticker.
  • the process checklist is stored in a server that is external to the monitoring device.
  • the process checklist is stored in said mobile device.
  • each object has a different identification protocol ID.
  • the mobile device can obtain the time, location and identification protocol information when the mobile device is within 5 metres of the monitored item.
  • Fig.1 is a schematic block diagram of the database and communication units
  • Fig.2 is a flow chart showing the steps of the preferred method
  • Fig.3 is a schematic illustration of three transceivers and a mobile device
  • Fig. 4 is a schematic illustration of four transceivers and a mobile device
  • Figure 1 shows the interactions made between a database 100, mobile device 1 10, short range wireless signal (SRWS) modules 120 and long range wireless signal (LRWS) devices 130, in the capture of object and location data.
  • SRWS short range wireless signal
  • LRWS long range wireless signal
  • a database 100 contains one or more checklists 160 which are made up of two or more items 162, 163, whereby an item may be an action to be completed.
  • the checklist will be used as a checklist for all of the steps in a process, and will include various different sorts of information. Preferably, this may include one or more of details of the objects, tasks, and locations for each step in the process.
  • the database 100 may refer to a software program enabling the collection, modification and calculation of data contained within it; or it may be within a software program enabling the collection, modification and calculation of data contained within it.
  • the database 100 may be held on a computer, a server, or similar hardware enabling the storage and transmission of data (not shown). Items 162, 163 within the checklist 160 preferably contain pre-written data 164.
  • Prewritten item data 164 relates to at least the name of the item.
  • Item data may also include an item code, or an item number.
  • Item data may include a description of the item. Items within a list may relate to actions to be performed by a user. Items within a list may relate to objects to be used during an action, and may include location and temporal information.
  • the items 162, 163 may also include SRWS data 125, LRWS data 135 and processed data 170.
  • a mobile communication device 1 10 such as a mobile phone, tablet or similarly enabled smart communication device, for use by a subject who is performing tasks making up the process checklist 160.
  • the communication device 1 10 typically comprises at least one transceiver 1 12, but in some cases it may be provide with multiple transceivers-for example the figure shows three, enabling the mobile device 1 10 to wirelessly communicate with the database 100; obtain short range wireless signal (SRWS) data 125 via a first communication protocol; and obtain long range wireless signal (LRWS) data 135 via a second communication protocol.
  • SRWS short range wireless signal
  • LRWS long range wireless signal
  • the database 100 and mobile device 1 10 may communicate by a communication protocol using wireless signals such as WiFi; a mobile internet signal such as 2G, 3G, 4G, 5G or a future iteration; Bluetooth or another wireless data transmission signal.
  • the mobile device 1 10 may obtain SRWS and communicate with a Radio Frequency Identification based system, which may be either an active or passive system, or an ultra-close proximity RFID system such as Near Field Communication (NFC) by the same transceiver or a separate transceiver.
  • a Radio Frequency Identification based system which may be either an active or passive system, or an ultra-close proximity RFID system such as Near Field Communication (NFC) by the same transceiver or a separate transceiver.
  • NFC Near Field Communication
  • LRWS data may be obtained by the same transceiver or a separate transceiver, and may capture signals from Bluetooth, including Bluetooth Low Energy; WiFi; a mobile internet signal such as 2G, 3G, 4G, 5G or a future iteration; or another wireless data transmission signal.
  • Bluetooth including Bluetooth Low Energy; WiFi; a mobile internet signal such as 2G, 3G, 4G, 5G or a future iteration; or another wireless data transmission signal.
  • the specified environment for the process preferably contains a plurality of objects or devices that are provided with a SRWS module 120.
  • the objects may be passive (such as tools) or active.
  • the SRWS module 120 may be an NFC sensor, which is either integrated within the objects themselves, so is not removable from the object, or is attached to the object as a detachable ID tag, by adhesive or other means (hook and loop fixing for example) so that the ID tag can be easily removed and positioned on another object if required.
  • Each SRWS module 120 includes data such as but not limited to a code or name for the object, that may be described directly, or said code may refer to a record within the database, or an additional external database.
  • the objects may be ID cards relating to members of staff, or passive objects such as tools in a workshop, or items in a factory such as products being manufactured or modified in some way.
  • a plurality of LRWS transceivers 130 such as Bluetooth Low Energy (BLE) beacons capable of producing wireless data signals such as BLE signals, are positioned in various locations across the environment; generally, the location of each beacon is well known and recorded as information about the environment.
  • BLE Bluetooth Low Energy
  • the beacons will be located at known points in the environment.
  • the beacons may be randomly positioned, for example in areas of the environment where it is easy to position the beacon, or positioned at regular intervals in the environment.
  • the specified area is typically an enclosed area, such as a factory, shop floor or a workshop.
  • the area may be a medical facility, such as a hospital, a museum or a visitor centre that displays a variety of moveable objects.
  • the environment may be one in which one or more users interact with one or more objects, and it is of interest for users and/or managers of the environment to understand where and when an object has been interacted with, and who by.
  • the mobile device 100 is passed within a proximity of 100mm or less of the object, typically the distance between the mobile device and the object will be 20mm or less.
  • the SRWS module 120 and the mobile device 1 10 are within this range, communication across a specified short-range protocol between the object and the mobile device 1 10 is possible.
  • the SRWS transceiver 1 12 within the device 1 10 establishes a communication with the SRWS module 120 of the object thus facilitating a data exchange between the SRWS module 120 of the object and the mobile device 1 10.
  • the information from the object, in the form of SRWS data 125, is captured by the mobile device 1 10 during this communication.
  • SRWS data may be data about the Object such as direct information relating to the object such as a name or description, which may be provided directly, or as a code corresponding to a data entry in a database 100.
  • LRWS data 135 is captured by the LRWS transceiver 1 12 from two or more external LRWS devices 130 placed about the environment.
  • the SRWS data 125 and LRWS data 135 captured by the mobile device 1 10 is transmitted across a wireless network, to the database 100 and attached to the open item 163 in the checklist 160.
  • the third step of the method is performed within the database 100.
  • this is remote from an operational area 180.
  • operational area 180 may be a particular floor in a factory environment, and the computer program may be provided in computers on a different floor or other region of the factory. This means that smaller data packets can be sent to the computer program from the mobile device 1 10, and that data remains in the original form it was provided in, this then allows the data to be used in additional processes after capture, and not limited merely to use for location calculations.
  • the database may be within the operational area 180.
  • Two steps of data processing are performed on the LRWS data to create usable proximity and location data from the raw signal data.
  • the individual signals are processed, to identify/estimate the distance between the mobile device and individual transceivers.
  • One such process may be through the calculation of Radio Signal Strength Inference (RSSI) whereby the signal strength is known to reduce according to distance from the origin of the signal, and thus can be used to estimate distance between two transceivers.
  • RSSI Radio Signal Strength Inference
  • the second process subsequently calculates the geo-position of the primary device, displayed as local co- ordinates, or similar geo-positioning measure, based upon the combination of the known proximity distances from individual LRWS devices and their known location within an area.
  • One such method is to perform a method of triangulation, from the individual distances between the LRWS transceivers and the mobile device, and using the known positions of the LRWS transceivers.
  • the local co-ordinates of the object are then inferred from the known co-ordinates of the mobile device, at the point of SRS data transfer.
  • a final step of data storage is performed within the computer program, whereby the processed location data is attached to the open item, including but not limited to: location data including the proximities between the device and individual wireless devices; the local co-ordinates of the mobile device upon NFC data transfer, and the local co-ordinates of the object upon NFC data transfer with respect to the local co- ordinate system; as well as further contextual data such as a timestamp.
  • Fig 2 is a flow chart 200 showing the steps involved in a preferred embodiment of the process of the invention.
  • 202 is an interaction between mobile device 1 10 and SRWS Module 120. This is followed by 204 SRWS data transferred to mobile device.
  • the method then proceeds to 206 are wireless data signals detected. If true, pass to step 208, wireless data captured by the mobile device 1 10. If false, proceed to step 210, captured data sent from mobile device 1 10 to database 100, also step 208 proceeds to step 210.
  • Next pass to 212 Captured data stored to open item 162 in list 164.
  • LRWS data is captured. If 214 is true, then 216 where LRWS data processed to create location data, followed by 218, location data saved to open item 162 in list 160.
  • step 220 also If false at step 214 pass to 220, open item identified as completed and closed.
  • the final step is 222.
  • Checklist 160 opens next sequential item 162 in the list 160. Preferably, these steps will repeat until the entire process has been completed. However, in some instances of the invention, the process may only complete a selection of the steps of the entire process.
  • ID cards contain an NFC module 120, containing object information which relates to the holder of the ID card, such as their name or other suitable identifying information.
  • the user Upon performance of the open step 163 with the checklist 160, the user places the ID card within proximity of the mobile device 1 10, causing the SRWS data held on the ID card to be transferred to the mobile device 1 10; simultaneously causing the capture of LRWS data; and both the SRWS data 125 and LRWS data 135 are communicated to the database 100 where they are attached to the open item 163 of checklist 160.
  • the LRWS data 135 is subsequently processed using RSSI methods to calculate individual proximities to LRWS devices, and co-ordinates with respect to the local co- ordinate system.
  • the processed data 170 including individual proximities and co- ordinates, are attached to the open item 163, and the item closed.
  • the sequential item in the checklist 160 is opened, and this repeats until all of the items 162, 163 in checklist 160 have been checked and completed, and the process is complete.
  • LRWS data cannot be captured
  • the user places the ID card within proximity of the mobile device, causing the SRWS data to be transferred to the device.
  • SRWS data cannot be captured
  • only SRWS is communicated to the database where it is attached to the open item.
  • no data is processed to identify locations and thus a recording of no data.
  • no LRWS data 135 or processed location data 170 is recorded to the open item 163, the open item is closed, and the sequential item in the checklist 160 is opened.
  • the first short-range wireless communication protocol used for this method is a protocol such as Radio Frequency Identification (RFID) or Near Field Communication (NFC).
  • RFID Radio Frequency Identification
  • NFC Near Field Communication
  • NFC is a subset within the family of Radio Frequency Identification (RFID) technologies, and is specifically a subdivision of high-frequency RFID, operating at a frequency of 13.56Mhz which restricts the read length of the signal.
  • RFID Radio Frequency Identification
  • NFC information transfer occurs when two sensors, each containing an electromagnetic antenna are passed within a proximity small enough to establish an electromagnetic connection between the two sensors, which is less than 100mm and more typically less than 20mm.
  • NFC sensors can be programmed to cause a smart device to run a series of commands, such as open a web page or app.
  • a series of commands such as open a web page or app.
  • One such use is for NFC sensors to be attached to, or embedded within business cards; with the sensor running a command to open the website or social media page of the individual described on the business card.
  • Another such use is for a NFC sensor to be attached to a given object; when a mobile device is passed within proximity of the sensor on the object, a command is communicated to cause the opening of a record relating to the object within a database.
  • An alternative embodiment may utilise a different form of RFID or short-range wireless communications protocol, which allows data to be transferred from an object or device to a device capable of actively capturing data.
  • Examples of such Long Range Wireless Signals for the second communication protocol include but are not limited to, WiFi, cellular, Bluetooth and Bluetooth Low Energy (BLE).
  • the second communications protocol can be used to identify the position of an object through the processing of signals from wireless communication devices.
  • One such use of the second protocol is for proximity sensing, whereby a mobile device establishes a connection with a wireless transceiver, and a signal between the devices and the transceiver is created and recorded. The proximity of the mobile device to the wireless transceiver is then estimated using the Radio Signal Strength Indication (RSSI) value from the signal.
  • RSSI Radio Signal Strength Indication
  • Wireless signals between wireless transceivers and a mobile device can also be utilised to identify the estimated location of a mobile device within an environment.
  • Two-dimensional triangulation of three wireless signals identifies the location of a device within an environment as being at the point intersected by three circles, whose radii corresponds to the estimated distance between three individual wireless transceivers and said device, as calculated using RSSI.
  • each wireless transceiver 130 produces a signal that is captured by a device 1 10; which can be subsequently analysed to identify an estimated proximity of the device 1 10 to each individual wireless transceiver 130. This distance of proximity is displayed as a radius Rx, from the individual wireless transceiver. The radii of the three wireless transceivers are then triangulated to calculate the position of the device within the known area.
  • Bluetooth Low Energy is a wireless network protocol created by the Bluetooth Special Interest Group. It was created to produce a communications protocol with a similar range to standard Bluetooth, but with significantly reduced power consumption and cost. It uses the same antennae and frequency as the standard Bluetooth protocol, and is therefore increasingly being adopted by modern smart devices including phones and tablets.
  • BLE beacons can produce a BLE signal for months, and even years, on a single battery cell. This allows developers and businesses to use BLE beacons as stationary and powered without the need for an external power-outlet; and therefore, makes them a suitable device for the capture of proximity and location as described above.
  • To calculate the proximity of a mobile device to a BLE beacon a connection is established between a mobile device with a given BLE beacon, and a signal is recorded. The proximity of the mobile device to the BLE beacon is then estimated using the Radio Signal Strength Indication (RSSI) value from the signal.
  • RSSI Radio Signal Strength Indication
  • combined proximity of multiple BLE beacons to a mobile device can be used to identify the location of the mobile device through triangulation of the multiple signals.
  • a plurality of BLE node selection processes can be performed.
  • One option is to select the required number of BLE signals, using the beacons producing the strongest signals, and therefore the nodes most likely to provide a more accurate and reliable signal.
  • each BLE beacon produces a signal that is captured by a device, then analysed to identify an estimated proximity of the device to each individual BLE beacon. This distance of proximity is displayed as a radius from the individual BLE beacon.
  • the three BLE beacons 402, 404, 406 producing the strongest signals are then selected, whilst the fourth BLE beacon 408 is unused.
  • the three selected BLE beacon signals are then triangulated to identify the location of the mobile device 1 10.
  • Another option is to perform multiple triangulations using all possible combinations of beacons, and calculate the mean of the results of the individual triangulations; or the mean of the results falling within a multiple of standard deviations from the mean, to ensure anomalous values are discounted.
  • each BLE beacon 402,404,406,408 produces a signal that is captured by a device 1 10, then analysed to identify an estimated proximity of the device to each individual BLE beacon. This distance of proximity is displayed as a radius from the individual BLE beacon, Combinations of three BLE beacon signals are then triangulated to identify the location of the mobile device.
  • beacons 402, 404, 406, 408 For example, for four beacons 402, 404, 406, 408 the combinations would be: - 402, 404, 406
  • the mean average of the co-ordinates from the individual triangulations are then calculated, and identified as the location of the mobile device within the known environment.
  • Another method of triangulation is in three dimensions using the RSSIs of four individual BLE Beacons.
  • One such method described by Park et al (2016; DOI: 10.1 177/1550147716671720) improves location accuracy by 27.3% on previous methods.
  • Another method of identifying location may be through the performance of the same method described above, using another wireless communications protocol such as WiFi or a cellular network, whereby an RSSI of the individual signals is similarly used to identify a proximity, and thus a triangulation of location from said proximities.
  • another wireless communications protocol such as WiFi or a cellular network
  • any two components herein combined to achieve a particular functionality can be seen as‘associated with’ each other such that the desired functionality is achieved, irrespective of architectures or intermediary components.
  • any two components so associated can also be viewed as being ‘operably connected,’ or ‘operably coupled,’ to each other to achieve the desired functionality.
  • the invention is not limited to physical devices or units implemented in non- programmable hardware but can also be applied in programmable devices or units able to perform the desired method by operating in accordance with suitable program code, such as minicomputers, personal computers, notepads, personal digital assistants, electronic games, cell phones and various other wireless devices, commonly denoted in this application as ‘mobile devices.
  • suitable program code such as minicomputers, personal computers, notepads, personal digital assistants, electronic games, cell phones and various other wireless devices, commonly denoted in this application as ‘mobile devices.
  • suitable program code such as minicomputers, personal computers, notepads, personal digital assistants, electronic games, cell phones and various other wireless devices, commonly denoted in this application as ‘mobile devices.
  • suitable program code such as minicomputers, personal computers, notepads, personal digital assistants, electronic games, cell phones and various other wireless devices, commonly denoted in this application as ‘mobile devices.
  • the specifications and drawings are, accordingly, to be regarded in an illustrative rather than in a restrictive sense
  • any reference signs placed between parentheses shall not be construed as limiting the claim.
  • the word‘comprising’ does not exclude the presence of other elements or steps then those listed in a claim.
  • the terms‘a’ or‘an,’ as used herein, are defined as one, or more than one.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé de détermination et d'enregistrement de données de processus dans une liste de contrôle de processus, le processus se produisant dans une zone spécifiée et les données de processus comprenant des informations relatives à un ou plusieurs objets parmi une pluralité d'objets utilisés dans le processus, ou à l'emplacement d'une tâche de processus, et à l'emplacement calculé desdits objets, chaque emplacement d'objet ou de tâche étant pourvu d'une étiquette d'identification pour transmettre des informations d'objet sur un premier protocole de communication, ledit procédé comprenant les étapes suivantes : génération d'une liste de contrôle de processus comprenant une pluralité d'étapes de processus séquentielles, ladite liste de contrôle comprenant des détails d'une tâche et/ou d'un objet pour chaque étape de la liste de contrôle ; sélection d'une étape de ladite liste de contrôle de processus ; et identification de la tâche et/ou de l'objet pour ladite étape ; communication d'informations d'objet concernant ladite tâche ou ledit objet pour ladite étape, entre un dispositif de communication mobile et ladite étiquette d'identification pour ladite tâche ou ledit objet, à l'aide dudit premier protocole, quand ledit dispositif mobile est à portée de ladite étiquette d'identification pour communiquer sur ledit premier protocole ; obtention de données d'emplacement partielles à utiliser dans le calcul de l'emplacement dudit dispositif mobile à l'aide d'un second protocole de communication, et stockage desdites données d'emplacement de dispositif dans ledit dispositif mobile ; transmission sans fil desdites informations d'objet et desdites données d'emplacement partielles à un programme informatique qui est distant dudit dispositif mobile ; utilisation dudit programme informatique pour calculer l'emplacement dudit dispositif mobile à partir desdites données d'emplacement partielles ; utilisation de l'emplacement calculé dudit dispositif mobile pour déterminer l'emplacement dudit objet ou de ladite tâche pour ladite étape dans ladite liste de contrôle de processus ; enregistrement dudit emplacement calculé dans ladite liste de contrôle ; pointage de l'étape effectuée sur la liste de contrôle lorsque l'étape est achevée.
PCT/EP2019/051890 2018-01-26 2019-01-25 Gestion de processus avec identification d'emplacement WO2019145497A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB2011311.4A GB2583678A (en) 2018-01-26 2019-01-25 Process management with location identification

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
GB1801306.0A GB2570479A (en) 2018-01-26 2018-01-26 Object location using wireless communication protocols
GB1801306.0 2018-01-26
GB1809924.2 2018-06-18
GB201809924A GB2574810A (en) 2018-06-18 2018-06-18 Automated process management system

Publications (1)

Publication Number Publication Date
WO2019145497A1 true WO2019145497A1 (fr) 2019-08-01

Family

ID=65228573

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2019/051890 WO2019145497A1 (fr) 2018-01-26 2019-01-25 Gestion de processus avec identification d'emplacement

Country Status (2)

Country Link
GB (1) GB2583678A (fr)
WO (1) WO2019145497A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023018014A1 (fr) * 2021-08-09 2023-02-16 삼성전자주식회사 Procédé pour suivre la position d'un dispositif cible, et dispositif électronique et serveur de suivi de position pour mettre en œuvre le procédé
CN117098065A (zh) * 2023-08-25 2023-11-21 广东星云开物科技股份有限公司 设备迁移方法及电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140282257A1 (en) * 2013-03-15 2014-09-18 Fisher-Rosemount Systems, Inc. Generating checklists in a process control environment
US20160217411A1 (en) * 2015-01-27 2016-07-28 Ncr Corporation Task management techniques
US9420423B1 (en) * 2005-04-12 2016-08-16 Ehud Mendelson RF beacon deployment and method of use
US20170351921A1 (en) * 2015-09-01 2017-12-07 Kabushiki Kaisha Toshiba System and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9420423B1 (en) * 2005-04-12 2016-08-16 Ehud Mendelson RF beacon deployment and method of use
US20140282257A1 (en) * 2013-03-15 2014-09-18 Fisher-Rosemount Systems, Inc. Generating checklists in a process control environment
US20160217411A1 (en) * 2015-01-27 2016-07-28 Ncr Corporation Task management techniques
US20170351921A1 (en) * 2015-09-01 2017-12-07 Kabushiki Kaisha Toshiba System and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023018014A1 (fr) * 2021-08-09 2023-02-16 삼성전자주식회사 Procédé pour suivre la position d'un dispositif cible, et dispositif électronique et serveur de suivi de position pour mettre en œuvre le procédé
CN117098065A (zh) * 2023-08-25 2023-11-21 广东星云开物科技股份有限公司 设备迁移方法及电子设备

Also Published As

Publication number Publication date
GB202011311D0 (en) 2020-09-02
GB2583678A (en) 2020-11-04

Similar Documents

Publication Publication Date Title
Sardroud Influence of RFID technology on automated management of construction materials and components
Wang Intelligent and integrated RFID (II-RFID) system for improving traceability in manufacturing
US20100173582A1 (en) Apparatus of analizing the construction productivity using rfid based on the wireless communication and thereof
CN103810576A (zh) 一种基于物联网的车间生产管理方法及系统
Evizal et al. Active RFID technology for asset tracking and management system
Zhao et al. Distributed and collaborative proactive tandem location tracking of vehicle products for warehouse operations
CN112270388A (zh) 货物定位管理系统和方法
US9449289B2 (en) Mobile terminal, system, computer program product, and method for updating a work plan
CN104361371A (zh) 基于rfid技术的定位系统和定位方法
Ustundag et al. Digital traceability through production value chain
WO2019145497A1 (fr) Gestion de processus avec identification d'emplacement
Jandl et al. SensiTrack-a privacy by design concept for industrial IoT applications
EP3651092A1 (fr) Dispositifs de suivi utilisant des chaînes de blocs ou une autre technologie de registres répartis
AU2017205686B2 (en) Radio frequency based control system for preventing occupational hazards
JP4913013B2 (ja) 移動体の管理方法及び管理システム
GB2570479A (en) Object location using wireless communication protocols
Zeng et al. Assessing the feasibility of passive and BAP RFID communications on construction site scenarios
US20190065984A1 (en) Method and electronic device for detecting and recognizing autonomous gestures in a monitored location
Semunab et al. Implementation of wireless mobile RFID reader in real world industry environment
US10949629B2 (en) Real-time tracking of passive identification tags
KR20130065824A (ko) Rfid 태그의 위치 정보를 이용한 재고 관리 방법 및 그 장치
de Oliveira et al. Control of collective security equipment by RFID in the construction site
Ahmed et al. Impact of RFID and Xbee Communication Network on Supply Chain Management
Vilkko et al. Mobile fieldwork solution for the construction industry
Yau et al. Utilizing RFID and PDA together for mobile e-maintenance

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19701659

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 202011311

Country of ref document: GB

Kind code of ref document: A

Free format text: PCT FILING DATE = 20190125

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19701659

Country of ref document: EP

Kind code of ref document: A1