Dataset Preview
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed
Error code: DatasetGenerationError Exception: CastError Message: Couldn't cast application_number: string claim_number: int64 context: struct<abstract: string, claims: list<element: string>, title: string> child 0, abstract: string child 1, claims: list<element: string> child 0, element: string child 2, title: string options: struct<A: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string>, B: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string>, C: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string>, D: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string>, E: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string>, F: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string>, G: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string>, H: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string>> child 0, A: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string> child 0, abstract: string child 1, claims: list<element: string> child 0, element: string child 2, patent_id: string child 3, title: string child 1, B: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string> child 0, abstract: string child 1, claims: list<element: string> child 0, el ... child 0, element: string child 2, patent_id: string child 3, title: string child 4, E: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string> child 0, abstract: string child 1, claims: list<element: string> child 0, element: string child 2, patent_id: string child 3, title: string child 5, F: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string> child 0, abstract: string child 1, claims: list<element: string> child 0, element: string child 2, patent_id: string child 3, title: string child 6, G: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string> child 0, abstract: string child 1, claims: list<element: string> child 0, element: string child 2, patent_id: string child 3, title: string child 7, H: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string> child 0, abstract: string child 1, claims: list<element: string> child 0, element: string child 2, patent_id: string child 3, title: string gold_answers: list<element: string> child 0, element: string silver_answers: list<element: string> child 0, element: string negative_answers: list<element: string> child 0, element: string -- schema metadata -- pandas: '{"index_columns": [], "column_indexes": [], "columns": [{"name":' + 960 to {'application_number': Value(dtype='string', id=None), 'claim_number': Value(dtype='int64', id=None), 'context': Value(dtype='string', id=None), 'prior_art_specifications': Value(dtype='string', id=None), 'answer': Value(dtype='string', id=None)} because column names don't match Traceback: Traceback (most recent call last): File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1385, in compute_config_parquet_and_info_response fill_builder_info(builder, hf_endpoint=hf_endpoint, hf_token=hf_token, validate=validate) File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 576, in fill_builder_info ) = retry_validate_get_features_num_examples_size_and_compression_ratio( File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 495, in retry_validate_get_features_num_examples_size_and_compression_ratio validate(pf) File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 533, in validate raise TooBigRowGroupsError( worker.job_runners.config.parquet_and_info.TooBigRowGroupsError: Parquet file has too big row groups. First row group has 5421354633 which exceeds the limit of 300000000 During handling of the above exception, another exception occurred: Traceback (most recent call last): File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1855, in _prepare_split_single for _, table in generator: File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 690, in wrapped for item in generator(*args, **kwargs): File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/packaged_modules/parquet/parquet.py", line 106, in _generate_tables yield f"{file_idx}_{batch_idx}", self._cast_table(pa_table) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/packaged_modules/parquet/parquet.py", line 73, in _cast_table pa_table = table_cast(pa_table, self.info.features.arrow_schema) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2293, in table_cast return cast_table_to_schema(table, schema) File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2241, in cast_table_to_schema raise CastError( datasets.table.CastError: Couldn't cast application_number: string claim_number: int64 context: struct<abstract: string, claims: list<element: string>, title: string> child 0, abstract: string child 1, claims: list<element: string> child 0, element: string child 2, title: string options: struct<A: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string>, B: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string>, C: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string>, D: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string>, E: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string>, F: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string>, G: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string>, H: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string>> child 0, A: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string> child 0, abstract: string child 1, claims: list<element: string> child 0, element: string child 2, patent_id: string child 3, title: string child 1, B: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string> child 0, abstract: string child 1, claims: list<element: string> child 0, el ... child 0, element: string child 2, patent_id: string child 3, title: string child 4, E: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string> child 0, abstract: string child 1, claims: list<element: string> child 0, element: string child 2, patent_id: string child 3, title: string child 5, F: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string> child 0, abstract: string child 1, claims: list<element: string> child 0, element: string child 2, patent_id: string child 3, title: string child 6, G: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string> child 0, abstract: string child 1, claims: list<element: string> child 0, element: string child 2, patent_id: string child 3, title: string child 7, H: struct<abstract: string, claims: list<element: string>, patent_id: string, title: string> child 0, abstract: string child 1, claims: list<element: string> child 0, element: string child 2, patent_id: string child 3, title: string gold_answers: list<element: string> child 0, element: string silver_answers: list<element: string> child 0, element: string negative_answers: list<element: string> child 0, element: string -- schema metadata -- pandas: '{"index_columns": [], "column_indexes": [], "columns": [{"name":' + 960 to {'application_number': Value(dtype='string', id=None), 'claim_number': Value(dtype='int64', id=None), 'context': Value(dtype='string', id=None), 'prior_art_specifications': Value(dtype='string', id=None), 'answer': Value(dtype='string', id=None)} because column names don't match The above exception was the direct cause of the following exception: Traceback (most recent call last): File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1408, in compute_config_parquet_and_info_response parquet_operations, partial, estimated_dataset_info = stream_convert_to_parquet( File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 992, in stream_convert_to_parquet builder._prepare_split( File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1742, in _prepare_split for job_id, done, content in self._prepare_split_single( File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1898, in _prepare_split_single raise DatasetGenerationError("An error occurred while generating the dataset") from e datasets.exceptions.DatasetGenerationError: An error occurred while generating the dataset
Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
application_number
string | claim_number
int64 | context
string | prior_art_specifications
string | answer
string |
---|---|---|---|---|
13857544 | 1 | {"title": "SAFETY SYSTEMS AND METHODS FOR PRODUCTION ENVIRONMENTS", "abstract": "ABSTRACT Safety systems and methods for production environments are disclosed. Safety systems include at least one sensing device configured to detect presence of an unauthorized human and/or an authorized human at least partially within a defined safety zone, and a controller configured to 5 automatically alter at least one aspect of the production environment responsive to the presence of the unauthorized human and/or the authorized human. Safety methods include detecting presence of an unauthorized human and/or an authorized human at least partially within a defined safety zone, and automatically altering at least one aspect of the production environment responsive to the detecting. 54", "claims": ["1. A safety system for a production environment, the safety system comprising: at least one sensing device configured to detect presence of an unauthorized human at least partially within a defined safety zone; and a controller configured to automatically alter at least one aspect of the production environment responsive to the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone; wherein the safety system is configured to distinguish between humans and surrounding environment based at least in part on data detected by the at least one sensing device.", "2. The safety system of claim 1, wherein the at least one sensing device is further configured to detect presence of the unauthorized human fully within the defined safety zone; and wherein the controller is further configured to (i) automatically alter a first aspect of the production environment responsive to the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone, and (ii) automatically alter a second aspect of the production environment responsive to the at least one sensing device detecting presence of the unauthorized human fully within the defined safety zone, wherein the second aspect is configured to have a greater hazard deterring effect than the first aspect.", "3. The safety system of claim 2, wherein the at least one sensing device is further configured to detect imminent entry of the unauthorized human into the defined safety zone; and wherein the controller is further configured to (iii) automatically alter a third aspect of the production environment responsive to the at least one sensing device detecting imminent entry of the unauthorized human into the defined safety zone, wherein the first aspect is configured to have a greater hazard deterring effect than the third aspect.", "4. The safety system of claim 1, wherein the at least one sensing device is further configured to detect presence of the unauthorized human at least partially within a sub-zone of the defined safety zone, wherein the sub- zone is spaced inwardly from a perimeter of the defined safety zone; and wherein the controller is further configured to (i) automatically alter a first aspect of the production environment responsive to the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone, and (ii) automatically alter a second aspect of the production environment responsive to the at least one sensing device detecting presence of the unauthorized human at least partially within the sub-zone, wherein the second aspect is different than the first aspect.", "5. The safety system of claim 1, wherein the at least one aspect includes one or more of movement of a machine tool, movement of a work piece, and movement of an assembly line.", "6. The safety system of claim 1, wherein the controller is configured to automatically slow movement of a machine tool, to automatically slow movement of a work piece, and/or to automatically slow movement of an assembly line responsive to the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone.", "7. The safety system of claim 1, wherein the controller is configured to automatically stop movement of a machine tool, to automatically stop movement of a work piece, and/or to automatically stop movement of an assembly line responsive to the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone.", "8. The safety system of claim 1, wherein the controller is configured to automatically actuate an alarm responsive to the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone.", "9. The safety system of claim 1, wherein the defined safety zone is associated with the production environment, and wherein the production environment is associated with production of aircraft.", "10. The safety system of claim 1, wherein the defined safety zone defines a discrete volume of space.", "11. The safety system of claim 1, wherein the at least one sensing device includes a multispectral camera.", "12. The safety system claim 1, wherein the safety system is configured to distinguish between human thermal signatures and non-human thermal signatures based at least in part on data detected by the at least one sensing device.", "13. The safety system of claim 1, further comprising: one or more tags, wherein the one or more tags are configured to be operatively coupled to a human; wherein the at least one sensing device is configured to detect presence of the one or more tags within the defined safety zone.", "14. The safety system of claim 13, wherein the safety system is configured to distinguish between a first human associated with a tag of the one or more tags and a second human not associated with a tag of the one or more tags.", "15. The safety system of claim 14, wherein the controller is configured to automatically alter the at least one aspect responsive to the at least one sensing device detecting presence of the first human at least partially within the defined safety zone.", "16. The safety system of claim 14, wherein the controller is configured to automatically alter the at least one aspect responsive to the at least one sensing device detecting presence of the second human at least partially within the defined safety zone.", "17. The safety system of claim 13, wherein the one or more tags each include a predefined detectable configuration, and wherein the at least one sensing device is configured to detect presence of the predefined detectable configuration within the defined safety zone; wherein the predefined detectable configuration includes one or more of a specifically configured surface, a retro-reflective surface, a surface having predefined distinguishing indicia, a predefined thermal signature, a fluorescence signature, and/or a radiative signature.", "18. The safety system of claim 1, wherein the safety system is configured to interface with an inventory control system associated with the production environment; and wherein the controller is configured to automatically alter the at least one aspect of the production environment responsive to (i) the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone and (ii) a predefined configuration associated with the inventory control system.", "19. The safety system of claim 18, wherein the predefined configuration associated with the inventory control system includes one or more of presence of a predetermined part within the defined safety zone, presence of a predetermined part on a work piece, presence of a predetermined part within a predetermined locale, movement of a predetermined part within the safety zone, movement of a predetermined part relative to a work piece, and/or movement of a predetermined part within a predetermined locale.", "20. The safety system of claim 1, further comprising: an orientation device configured to detect an orientation of the at least one sensing device; wherein the controller is configured to automatically alter the at least one aspect of the production environment responsive to (i) the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone and (ii) the orientation of the at least one sensing device.", "21. The safety system of claim 1, further comprising: a movement detection device configured to detect movement of a work piece; wherein the controller is configured to automatically alter the at least one aspect of the production environment responsive to (i) the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone and (ii) the movement of the work piece.", "22. The safety system of claim 1, wherein the at least one sensing device is further configured to detect a predetermined orientation of a work piece within the defined safety zone; and wherein the controller is configured to automatically alter the at least one aspect of the production environment responsive to (i) the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone and (ii) the at least one sensing device detecting the predetermined orientation of the work piece.", "23. The safety system of claim 1, wherein the at least one sensing device includes a plurality of sensing devices; and wherein at least one sensing device of the plurality of sensing devices is configured to detect presence of one or more additional sensing devices of the plurality of sensing devices within a predetermined locale to establish the defined safety zone based at least in part on the presence of the one or more additional sensing devices within the predetermined locale.", "24. The safety system of claim 1, wherein the at least one sensing device includes a plurality of sensing devices; and wherein the safety system is configured to establish the defined safety zone based at least in part on overlapping sensing zones of two or more of the plurality of sensing devices.", "25. The safety system of claim 1, wherein the defined safety zone is established by the at least one sensing device; and wherein the defined safety zone corresponds to a field of view of the at least one sensing device.", "26. The safety system of claim 1, wherein the safety system has at least a default state and an alert state; wherein in the default state, the at least one aspect of the product environment is not altered; and wherein in the alert state, the at least one aspect of the production environment is altered.", "27. The safety system of claim 26, wherein in the default state, no unauthorized human is positioned within the defined safety zone; and wherein in the alert state, at least a portion of an unauthorized human is positioned within the defined safety zone.", "28. A safety system for a production environment, the safety system comprising: at least one sensing device configured to detect presence of an unauthorized human at least partially within a defined safety zone that defines a discrete volume of space; and a controller; wherein the safety system is configured to distinguish between human thermal signatures and non-human thermal signatures based at least in part on data detected by the at least one sensing device; wherein the safety system is configured to interface with an inventory control system associated with the production environment; and wherein the controller is configured to automatically alter at least one aspect of the production environment responsive to (i) the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone and (ii) a predefined configuration associated with the inventory control system; and wherein the predefined configuration associated with the inventory control system includes one or more of presence of a predetermined part within the defined safety zone, presence of a predetermined part on a work piece, presence of a predetermined part within a predetermined locale, movement of a predetermined part within the safety zone, movement of a predetermined part relative to a work piece, and/or movement of a predetermined part within a predetermined locale.", "29. A safety system for a production environment, the safety system comprising: at least one sensing device configured to detect presence of an authorized human at least partially within a defined safety zone; and a controller configured to automatically alter at least one aspect of the production environment responsive to the at least one sensing device detecting presence of the authorized human at least partially within the defined safety zone; wherein the safety system is configured to distinguish between humans and surrounding environment based at least in part on data detected by the at least one sensing device.", "30. A safety method implemented in a production environment, the safety method comprising: detecting presence of an unauthorized human at least partially within a defined safety zone, wherein the detecting includes distinguishing between human movement and non-human movement in the defined safety zone; and automatically altering at least one aspect of the production environment responsive to the detecting."]} | [{"patent_id": "US 20110298579", "title": "DYNAMICALLY ADAPTABLE SAFETY ZONES", "abstract": "Systems and methods are provided for defining a safety zone in an industrial automation environment. The method includes monitoring an object that approaches an operating zone where equipment is controlled within the operating zone. This includes determining the speed or direction that the object approaches the operating zone. The method includes dynamically adjusting a safety region in view of the determined speed or direction of the object and enabling or disabling the equipment within the operating zone based in part on the object entering the safety region.", "claims": ["1. A method for defining a safety zone in an industrial automation environment, comprising:\nmonitoring an object and operating zone where equipment is controlled within the operating zone;\ndetermining a speed between the object and the equipment;\ndetermining a direction that the object approaches the operating zone;\ndetermining a speed or direction that a moving part associated with the equipment approaches the object;\ndynamically adjusting a safety region in view of the determined speed or direction of the object; and\nenabling or disabling the equipment within the operating zone based in part on the object entering the safety region.", "2. The method of claim 1, employing at least one time of flight sensor to determine the speed or direction that the object approaches the safety region.", "3. The method of claim 2, employing multiple time of flight sensors to monitor multiple dimensions for the operating zone, where the dimensions include movements toward the operating zone, movements away from the operating zone, movements from above or below the operating zone, or movements to the sides or circumference of the operating zone.", "4. The method of claim 1, further comprising monitoring motion of a portion of the equipment.", "5. The method of claim 4, further comprising adjusting safety regions within the operating zone based on speed or direction of the portion of the equipment.", "6. The method of claim 4, further comprising monitoring moving equipment and dynamically adjusting a safety region as the moving equipment approaches other objects.", "7. The method of claim 1, further comprising dynamically adjusting the safety region based on an operating mode of a machine.", "8. The method of claim 7, the operating mode includes production mode, standby mode, disabled mode, maintenance mode, and reduced speed mode.", "9. The method of claim 1, further comprising employing an industrial controller to determine the speed or direction.", "10. The method of claim 9, employing the industrial controller for enabling or disabling the equipment within the operating zone.", "11. The method of claim 1, utilizing a component of a machine as a center of reference for defining a dynamically adjustable safety region.", "12. An industrial control system that is employed to monitor and control a safety zone, comprising:\na controller that monitors objects that approach an operating zone where equipment is controlled within the operating zone;\na time of flight sensor that determines the speed or direction that the objects approach the operating zone; and\na logic component associated with the controller to automatically adjust a safety region in view of the determined speed or direction of the objects.", "13. The industrial control system of claim 12, the controller enables or disables the equipment within the operating zone based in part on the object entering the safety region.", "14. The industrial control system of claim 12, the controller interacts with multiple time of flight sensors to monitor multiple dimensions for the operating zone, where the dimensions include movements toward the operating zone, movements away from the operating zone, movements from above or below the operating zone, or movements to the sides or circumference of the operating zone.", "15. The industrial control system of claim 12, the controller monitors motion of a portion of the equipment.", "16. The industrial control system of claim 15, the controller dynamically adjusts safety regions within the operating zone based on speed or direction of the portion of the equipment.", "17. The industrial control system of claim 12, the controller monitors moving equipment and dynamically adjusts a safety zone as the moving equipment approaches other objects.", "18. The industrial control system of claim 12, the controller dynamically adjusts the safety region based on an operating mode of a machine.", "19. An industrial control system that is employed to monitor and control a safety zone, comprising:\nmeans for monitoring objects that approach an operating zone where equipment is controlled within the operating zone;\nmeans for determining the speed or direction that the objects approach the operating zone; and\nmeans for adjusting a safety region in view of the determined speed or direction of the objects.", "20. The industrial control system of claim 12, further comprising a component to alter operation of the equipment within the operating zone based in part on the object entering the safety region.", "21. The system of claim 19, further comprising at least one TOF sensor that is mounted on moving portions of the equipment."], "paragraphs": [{"key": 1, "content": "The claimed subject matter relates generally to industrial control systems and more particularly to systems and methods that employ time of flight sensing to automatically adjust safety zone regions for industrial environments.\n\nBACKGROUND"}, {"key": 10, "content": "Generally, since the protective field position monitored by the TOF sensor(s) is dependent on the speed and direction of object movement, the distance to the hazardous area can be very short if the movement is not toward the respective zone. It is similar if the speed is very slow. For example, at a press with manual changing, this is a consideration since the operator does not need to move long distances. Thus, the machine can be started as soon as the operator leaves the hazardous area and as long as he does not move towards the machine. By sensing additional dimensions such as speed and direction, various economic benefits can be realized as shorter safety distances can be realized to facilitate lower space requirements, lower building costs, shorter distances for the operator to move, faster machine cycles, and lower part costs."}, {"key": 25, "content": "Referring initially to FIG. 1, a system 100 illustrates a dynamically adjustable safety zone 110 for an industrial control environment. The system 100 includes a controller 120 that monitors an operating zone via one or more time of flight (TOF) sensors 140. It is noted that the controller 120 can also be included in the TOF sensor itself, whereas the controller does not have to be a stand alone controller. Equipment 150 within the operating zone 130 is also operated by the controller 120 although it is to be appreciated that a separate controller could be employed for the equipment 150 and another controller employed for dynamically adjusting safety regions within the zone 130. As shown, the safety zone 110 includes a dynamically adjustable dimension, region, or area that can be adjusted according to multiple dimensions or directions as will be described in more detail below. As objects (or people) 160 approach the operating zone 130, the TOF sensors 140 detect the speed or direction of the objects that is computed and determined by the controller 120."}, {"key": 27, "content": "In general, the system 100 provides dynamically adjustable safety zones to facilitate protection of people and machinery in an industrial environment. In one aspect, safety zones 110 are monitored via one or more time-of-flight (TOF) sensors 140 in order to detect movement toward the zones. On fast approaching objects 160 that include people or machines, the area or other dimension of the safety zone 110 can be increased in order that equipment operation can be altered or disabled in view of such detected movement. On detecting slower objects 160 approaching the respective zone 110 or 130, the area or other dimension (e.g., distance) can be decreased as logic detection would have more time to consider whether or not a safety shut-down event or other safety operation should occur."}, {"key": 28, "content": "Generally, since the protective field position monitored by the TOF sensor(s) 140 is dependent on the speed and direction of object 160 movement, the distance to the hazardous area can be very short if the movement is not toward the respective zone. It is similar if the speed is very slow. For example, at a press with manual changing, this is a consideration since the operator does not need to move long distances. Thus, the machine can be started as soon as the operator leaves the hazardous area and as long as he does not move towards the machine. By sensing additional dimensions such as speed and direction, various economic benefits can be realized as shorter safety distances can be realized to facilitate lower space requirements, lower building costs, shorter distances for the operator to move, faster machine cycles, and lower part costs."}, {"key": 59, "content": "Optical time-of-flight sensors consist of two light beams projected into the medium (e.g., fluid or air) whose detection is either interrupted or instigated by the passage of small particles (which are assumed to be following the flow). This is not dissimilar from the optical beams used as safety devices in motorized garage doors or as triggers in alarm systems. The speed of the particles is calculated by knowing the spacing between the two beams. If there is only one detector, then the time difference can be measured via autocorrelation. If there are two detectors, one for each beam, then direction can also be known. Since the location of the beams is relatively easy to determine, the precision of the measurement depends primarily on how small the setup can be made. If the beams are too far apart, the flow could change substantially between them, thus the measurement becomes an average over that space. Moreover, multiple particles could reside between them at any given time, and this would corrupt the signal since the particles are indistinguishable. For such a sensor to provide valid data, it must be small relative to the scale of the flow and the seeding density. Optical time of flight sensors can be constructed as a 3D camera with a time of flight camera chip."}]}, {"patent_id": "US 20050002530", "title": "Method and a system for control of unauthorized persons", "abstract": "A security method and system for the detection and/or control of unauthorized persons among a large number of freely moving authorized persons within a controlled restricted zone, incorporating an infrastructure of control points, electronic means borne by the authorized persons, communication between said electronic means and said control points, and cryptographic protection against forgery, allowing the interception of unauthorized persons by security authorities.", "claims": ["1. A security method for the detection and/or control of unauthorized humans (10a, 10b, . . . ) among a large number of authorized humans (12a, 12b, . . . ) within a controlled restricted zone (2), characterized in that all authorized humans are equipped with active permits (60a, 60b, . . . ) planned to perform a cryptographic action involving a secret cryptographic key (64), and the controlled restricted zone is equipped with automatic control points (20a, 20b, . . . ), and optionally with manual control points (40a, 40b, . . . ), each automatic control point detecting all humans entering or moving through a specific section (in its vicinity, and each manual control point selecting humans by the action of an operator, the humans detected by the automatic control points and the humans selected by the manual control points being hereafter referred to as designated humans, both types of control points being planned to acquire the results of said cryptographic actions performed by the active permits of said designated humans, a cryptographic authentication algorithm involving a validation key (being further performed upon each acquired said result, both types of control points being further planned to associate said acquired results to said designated humans, the designation of the humans, the acquiring of said results, the association of said acquired results to said designated humans and the performing of said cryptographic authentication algorithm upon said acquired results not requiring a substantial change in the motion conditions and/or the behavior of the humans, classifying as unauthorized at least humans which have been designated but whose said results either have not been acquired or have not been cryptographically authenticated, an alert message being transmitted to security authorities for each human which has been classified as unauthorized, allowing in such a way for an immediate intervention and a possible interception of the unauthorized humans, at least some of the control points, hereafter referred to as particular control points, being moreover planned to acquire physical characteristics of said designated humans, allowing their direct recognition, said alert message including in this case said physical characteristics.", "2. A method as described in claim 1, in which at least some of said active permits, hereafter referred to as particular active permits, additionally have distinct identities (62a, 62b, . . . ), each distinct identity belonging to a group of one or more of said particular active permits, and distinct identity determination being further performed for all designated humans bearing said particular active permits, upon each said acquired result.", "3. A method as described in claim 2, in which said controlled restricted zone contains one or more sub-zones, each human further being authorized or unauthorized for each of the sub-zones, each sub-zone being further equipped with automatic control points and optionally with manual control points, a database (of authorization data regarding said particular active permit distinct identities being associated with each sub-zone, each determined distinct identity of a human designated by a control point being further checked against said authorization data in the databases associated with the sub-zones containing that control point, said databases being automatically and/or manually modifiable by the security authorities, additionally classifying as unauthorized humans which have been designated but whose said distinct identities are indicated as unauthorized by the authorization data in at least one of the databases associated with the sub-zones containing that control point.", "4. A method as described in claim 2, in which data regarding said designated humans (such as said particular active permit distinct identities, control points location, times of designation of humans, etc) is additionally recorded, this data being searched for inconsistencies with regard to time and/or humans location, the results of this search assisting security authorities in finding potential impersonations of said particular active permits.", "5. A method as described in claim 2, in which said secret cryptographic keys of at least some of said particular active permits are distinct, each distinct key corresponding to a group of one or more said particular active permit distinct identities, this, according to the level of protection required for those said particular active permits, correspondence between said distinct secret cryptographic keys and said distinct identities being additionally required in order to cryptographically authenticate said results, so that a perpetrator in possession of a particular active permit, is prevented from impersonating a particular active permit with a different distinct secret cryptographic key.", "6. A method as described in claim 1, in which said alert messages are prioritized, according to the control point characteristics, such as its location, alert message history, etc, and/or the time of designation of the human, and/or said acquired physical characteristics if available, and/or current operational intelligence if available, improving the effectiveness of the intervention of the security authorities.", "7. A method as described in claim 1, in which at least some of the humans are equipped with a human communication unit (containing their active permit, these humans when classified as unauthorized, being selectively notified immediately upon their classification by means (of sending a notification in the control points and/or means (of notification in the human communication units.", "8. A method as described in claim 1, in which at least some of the humans are equipped with a human communication unit containing their active permit, the secret cryptographic keys of at least some of said active permits being contained within supports, which can be detached from said human communication units.", "9. A method as described in claim 1, in which the secret cryptographic keys of at least some of said active permits are contained within supports, these supports planned to prevent a perpetrator from finding out, through physical penetration and/or deduction, the secret cryptographic keys they contain.", "10. A method as described in claim 1, in which the secret cryptographic keys of at least some of said active permits are contained within supports, all the information produced during said cryptographic action leading to a possible disclosure of said secret cryptographic keys being exclusively contained in said supports.", "11. A method as described in claim 1, in which at least some of said active permits are additionally associated to PINs (Personal Identification Numbers), said PINs supplied to said active permits by authorized humans, 'said PINs being additionally required by said active permits in order to generate said results of said cryptographic action, and/or being further required in order to cryptographically authenticate said results.", "12. A method as described in claim 1, in which digital elements of a first type are used in performing the cryptographic actions of at least some of said active permits, said digital elements of the first type being additionally required in order to cryptographically authenticate said acquired results, said digital elements of the first type being furthermore different at different times, preventing in this way the authentication of forgery attempts by recording and replaying of said results.", "13. A method as described in claim 12, in which said digital elements of the first type are based on the outputs of time clocks.", "14. A method as described in claim 12, in which said digital elements of the first type are acquired by the control points and transmitted to the human communication units of said designated humans.", "15. A method as described in claim 12, in which said digital elements of the first type are the elements of predefined series associated with distinct identities.", "16. A method as described in claim 2, in which digital elements of a second type are generated by at least some of said active permits, are used in performing the cryptographic actions of these particular active permits, and are required to be different at different times in order to cryptographically authenticate said results of these particular active permits, preventing in this way the authentication of forgery attempts by recording and replaying of said results.", "17. A method as described in claim 1, in which said control points are moreover planned to acquire a credential from the active permit of each said designated human, said validation key being securely extracted from each acquired credential by performing a cryptographic extraction algorithm involving an extraction key.", "18. A method as described in claim 2, in which said validation key is selected from a list of validation keys, according to said determined distinct identity.", "19. A method as described in claim 1, in which the cryptographic process consisting of said cryptographic actions in said active permits and said cryptographic authentications of said acquired results, is of a symmetric type, an asymmetric type, or a combination of both.", "20. A method as described in claim 1, in which at least some of said control points are further planned to associate each said acquired result to a particular designated human.", "21. A method as described in claim 1, in which the memory contents of said active permits can be altered as a consequence of instructions and/or data transmitted from the control points.", "22. A method as described in claim 1 in which said required change in the motion conditions of the humans is in the range of 0.5.times.V-1.5.times.V, V being the average velocity of the humans before reaching the specific section (in the vicinity of said control points.", "23. A security system for the detection and/or control of unauthorized humans (10a, 10b, . . . ) among a large number of authorized humans (12a, 12b, . . . ) within a controlled restricted zone (2), to implement the method of claim 1, comprising:\nhuman communication units (50a, 50b, . . . ), borne by all authorized humans, comprising means (of activating the transmission of an identification message by the human communication unit, an active permit (containing a distinct identity (62), and a transmitter (54), means of issuing (170), and of revoking (of active permits (60a, 60b, . . . ), at least one database (containing authorization data regarding humans, automatic control points (20a, 20b, . . . ), and optionally manual control points (40a, 40b, . . . ), both distributed in the controlled restricted zone (2), each automatic control point comprising means (of detection and counting of all humans entering or moving through a specific section (in its vicinity, and each manual control point comprising means of selection (of humans by the action of an operator, the humans detected by the automatic control points and the humans selected by the manual control points being hereafter referred to as designated humans, both types of control points additionally comprising means (of activating requests for identification to the human communication units of the designated humans, means (of reception capable of receiving identification messages transmitted by human communication units, hereafter referred to as human communication unit responses (90a, 90b, . . . ), and a controller (capable of associating human communication unit responses to designated humans, means (of retrieving prior data from the database (180), means (of classification of designated humans, at least one security center (160), additional means (in the manual control points of notifying the manual control point operator, a communication network (between at least some of the control points, the database (180), the means of issuing (and revoking (of active permits, the means of retrieving prior data (130), the means of classification (and the security centers, characterized in that:\nI) The active permit (contains in addition a secret cryptographic key (associated to the distinct identity (of the active permit (60), and is planned to perform a cryptographic confirmation algorithm (involving at least the distinct identity (and the secret cryptographic key (64), II) The human communication unit response (comprises the result of the cryptographic confirmation algorithm (66), III) Means (of cryptographic authentication are planned to check for each human communication unit response (whether or not the secret cryptographic key (corresponding to the distinct identity (contained in the human communication unit response (was the one used in the calculation of this response (90), this action involving a validation key (corresponding to the same distinct identity (62), and a cryptographic validation algorithm (76), IV) For every newly authorized human, the means (of issuing allocate a distinct identity (62), initialize a new active permit (to bear the allocated distinct identity (and a corresponding secret cryptographic key (64), and update the database (with information regarding the newly authorized human (12), V) The means (of revoking are planned to automatically (for example time dependent expiration) and/or manually modify elements in the database (180), VI) The means of retrieving prior data (utilize the distinct identity (contained in the human communication unit response (90), in order to retrieve from the database (180), authorization data regarding this human, VII) The means (of classification utilize the data produced by the means (of detection and counting, and/or the means (of reception, and/or the controller (28), and/or the means (of authentication, and/or the means (of retrieving prior data, to determine whether a designated human is authorized or not, VIII) Means (of alert convey to at least one security center (and/or to the means (of notifying the manual control point operator, an alert message containing the data provided by the means (of reception, and/or the controller (28), and/or the means (of authentication, and/or the means (of retrieving prior data, for at least some of the humans classified as unauthorized, IX) At least some of the control points comprise in addition means (of acquiring physical characteristics of designated humans, such as photographic information, height, weight, features, etc . . . , the means of alert (additionally include said acquired physical characteristics in at least some of the alert messages.", "24. A system according to claim 23, in which the means (of authentication are additionally planned to determine the validation key (74), by utilizing the distinct identity (contained in the human communication unit response (90), to select from-a validation key list (containing for each distinct identity (a corresponding validation key (74), and the means (of issuing are also additionally planned to update for every newly authorized human (the validation key list (with the allocated distinct identity (and the corresponding validation key (74).", "25. A system according to claim 23, in which the human communication unit response (additionally comprises a credential (174), the means (of authentication being additionally planned to determine the validation key (74), by utilizing a cryptographic extraction algorithm (involving an extraction key (78), in order to securely extract the validation key (from the credential (contained in the human communication unit response (90), and the means (of issuing being also additionally planned to initialize for every newly authorized human (12), the active permit (with a credential (containing the result of a cryptographic binding algorithm (involving the validation key (and a binding key (which corresponds to the extraction key (78).", "26. A system according to claim 23, in which the means (of activating requests for identification transmit to every designated human an interrogation message.", "27. A system according to claim 23, in which the means (of activating requests for identification comprise a trigger element in the vicinity of the control point, that is planned to be detectable by means (in the human communication units.", "28. A system as described in claim 23, which is utilized to perform additional functions such as Admittance Fee Collection, Access Control, in particular on the perimeter of the controlled restricted zone and/or any of its sub-zones, Messaging, Crew Management, statistical survey, a crime investigation tool, etc.", "29. A system as described in claim 23, in which the human communication unit (is powered by an internal power source (58), and/or by a coil (converting the energy of an RF wave generated by means (in the control points."], "paragraphs": [{"key": 17, "content": "One such field of application is alarm systems, in which various methods and systems have been developed in order to alert security authorities upon the entrance of a person into a restricted zone. In a typical system of such type, the restricted zone, whether an apartment, a house or a larger area, is equipped with sensors, for instance infra-red, thermal or a video camera, that are activated by the last authorized person leaving the zone, transmitting an alarm signal to security authorities and possibly also to law enforcement authorities upon sensing a person entering the restricted zone. An authorized person can typically de-activate the sensors for instance by a key, PIN code, etc. Such systems are commonly used in buildings and areas of varying sizes. One such a system is described in U.S. Pat. No. 5,530,429."}, {"key": 24, "content": "According to the invention, a security method for the detection and/or control of unauthorized humans (10a, 10b, . . . ) among a large number of authorized humans (12a, 12b, . . . ) within a controlled restricted zone (2), is characterized in that all authorized humans are equipped with active permits (60a, 60b, . . . ) planned to perform a cryptographic action involving a secret cryptographic key (64), and the controlled restricted zone is equipped with automatic control points (20a, 20b, . . . ), and optionally with manual control points (40a, 40b, . . . ), each automatic control point detecting all humans entering or moving through a specific section (21) in its vicinity, and each manual control point selecting humans by the action of an operator, the humans detected by the automatic control points and the humans selected by the manual control points being hereafter referred to as designated humans, both types of control points being planned to acquire the results of said cryptographic actions performed by the active permits of said designated humans, a cryptographic authentication algorithm involving a validation key (74) being further performed upon each acquired said result, both types of control points being further planned to associate said acquired results to said designated humans, the designation of the humans, the acquiring of said results, the association of said acquired results to said designated humans and the performing of said cryptographic authentication algorithm upon said acquired results not requiring a substantial change in the motion conditions and/or the behavior of the humans, classifying as unauthorized at least humans which have been designated but whose said results either have not been acquired or have not been cryptographically authenticated, an alert message being transmitted to security authorities for each human which has been classified as unauthorized, allowing in such a way for an immediate intervention and a possible interception of the unauthorized humans, at least some of the control points, hereafter referred to as particular control points, being moreover planned to acquire physical characteristics of said designated humans, allowing their direct recognition, said alert message including in this case said physical characteristics."}, {"key": 35, "content": "In a method according to the invention, at least some of said active permits are additionally associated to PINs (Personal Identification Numbers), said PINs supplied to said active permits by authorized humans, said PINs being additionally required by said active permits in order to generate said results of said cryptographic action, and/or being further required in order to cryptographically authenticate said results."}, {"key": 90, "content": "The means (22) of detection and counting can be made by any known technique in the field of human detection and counting such as a weighing device, a sensor triggered by the interruption of an electromagnetic beam, infrared heartbeat detection, etc."}, {"key": 110, "content": "In an example of implementation, the geometric parameters of means (42,24,26,30) are designed to ensure that, given proper aiming by the operator, sufficient geometric data is acquired to enable the controller (28) to distinguish the response or the lack of response of the communication unit (50) of the selected human from responses possibly received from the communication units (50) of other humans."}]}, {"patent_id": "US 20090072029", "title": "INVENTORY CONTROL SYSTEM", "abstract": "An inventory control system is disclosed. The system includes a plurality of inventory item storage locations, an access system for controlling access to the inventory items, where the access system includes an input device for entering the identity of a user, a monitoring system for monitoring the removal and replacement of the inventory items from the storage locations, at least one locatable device that is arranged to be carried by a user of the inventory control system and that is locatable by a positioning system, a positioning system, arranged to determine the location of the locatable device, and a data processing system for recording the removal and replacement of inventory items and location data received from the positioning system such that the movement of the or each locatable device can be tracked.", "claims": ["1. An inventory control system, comprising:\na plurality of inventory item storage locations; and\nan access system for controlling access to the inventory items, said access system, comprising:\nan input device for entering the identity of a user;\na monitoring system configured to monitor the removal and replacement of the inventory items from the storage locations;\nat least one locatable device configured to be removed by a user of the inventory control system;\na positioning system configured to locate the locatable device; and\na data processing system configured to record the removal and replacement of inventory items, the identity of the user of the inventory items and location data received from the positioning system such that the movement of the locatable device is tracked.", "2. The inventory control system according to claim 1, wherein the positioning system includes a real time location system having a plurality of transmitter-receiver devices arranged to locate the position of the locatable device.", "3. The inventory control system according to claim 2, wherein the locatable device includes a RFID tag and the positioning system includes a plurality of RFID tag detecting devices.", "4. The inventory control system according to claim 2, wherein the locatable device includes an RuBee tag and the positioning system includes a plurality of RuBee tag detecting devices.", "5. The inventory control system according to claim 1, wherein the positioning system is arranged to locate the locatable device by triangulation or trilateration.", "6. The inventory control system according to claim 1, wherein the monitoring system comprises at least one of a sensor system, a camera system with image recognition, a camera system with optical character recognition, and at least one barcode reading device.", "7. The inventory control system according to claim 6, wherein the sensor system includes a plurality of sensors configured to sense the presence of inventory items in the storage locations, each sensor being associated with a storage location and arranged to generate a signal representing the presence or absence of an inventory item in the associated storage location.", "8. The inventory control system according to claim 6, wherein the data processing system is constructed and arranged to identify the inventory items from the signals received from the monitoring system.", "9. The inventory control system according to claim 1, wherein each inventory item storage location comprises an individually-shaped recess for receiving a specific inventory item, the shape of the recess being matched to the shape of the inventory item.", "10. The inventory control system according to claim 1, further comprising an enclosure having a closure member that can be opened and closed by a user.", "11. The inventory control system according to claim 10, wherein the enclosure comprises a container having a plurality of storage compartments,", "12. The inventory control system according to claim 10, wherein the access control system includes a locking mechanism for controlling access to the inventory items in the enclosure.", "13. The inventory control system according to claim 1, wherein the access control system includes at least one user identification device to enable a user to log in via the input device.", "14. The inventory control system according to claim 13, wherein each user identification comprises at least one of:\na swipe card, a chip and pin card, an RFID tag, a RuBee tag, and a proximity device, and wherein the input device comprises a reading device compatible with the user identification.", "15. The inventory control system according to claim 14, wherein the locatable device and the identification device are integrated into a single unit.", "16. The inventory control system according to claim 1, further comprising storage locations for receiving the locatable device.", "17. The inventory control system according to claim 16, wherein the monitoring system is arranged to monitor the removal and replacement of the locatable device.", "18. The inventory control system according to claim 16, wherein the data processing system is arranged to start tracking the movement of the locatable device in response to receiving signals from the monitoring system that the locatable device has been removed from its storage location.", "19. The inventory control system according to claim 18, wherein the data processing system is arranged to stop tracking the movement of the locatable device in response to receiving signals from the monitoring system indicating that the locatable device has been returned to its storage location.", "20. The inventory control system according to claim 1, wherein the data processing system is arranged to start tracking the movement of the locatable device in response to receiving signals from the access system indicating that the user has logged in.", "21. The inventory control system according to claim 1, wherein the data processing system is arranged to start tracking the movement of the locatable device in response to receiving signals from the monitoring system indicating that the user has removed inventory items from the storage locations.", "22. The inventory control system according to claim 1, wherein the data processing system is arranged to stop tracking the movement of the locatable device in response to receiving signals from the monitoring system indicating that the user has replaced the inventory items in the storage locations.", "23. The inventory control system according to claim 12, further comprising means for determining the operational status of the locking mechanism and means for inhibiting the operation of the monitoring system according to the signals received from the means for determining the operational status of the locking mechanism.", "24. The inventory control system according to claim 12, wherein the locking mechanism is arranged to automatically open when an authorized user has been identified.", "25. The inventory control system according to claim 1, wherein the data processing system is configured to record the time of removal and replacement of inventory items.", "26. The inventory control system according to claim 10, wherein the data processing system is located remotely from the enclosure and is connected to the reading device by a data link.", "27. The inventory control system according to claim 1, wherein the enclosure includes a local indicator device for indicating the presence and/or absence of inventory items in the enclosure.", "28. A method of controlling inventory, the method comprising:\nproviding a plurality of inventory item storage locations;\noperating an access system for controlling access to the inventory items, wherein operating the access system comprises:\nwith an input device, entering the identity of a user;\nwith a monitoring system, monitoring the removal and replacement of the inventory items from the storage locations;\nwith a positioning system, determining the location of at least one locatable device that is arranged to be removed by a user of the inventory control system; and\nwith a data processing system, recording the removal and replacement of inventory items, the identity of the user of the inventory items and location data received from the positioning system such that the movement of the or each locatable device is tracked.", "29. The process according to claim 28, wherein the positioning system includes a plurality of transmitter-receiver devices.", "30. The process according to claim 29, wherein the locatable device includes a RFID tag and the positioning system includes a plurality of RFID tag detecting devices.", "31. The process according to claim 29, wherein the locatable device includes a RuBee tag and the positioning system includes a plurality of RuBee tag detecting devices.", "32. The process according to claim 28, wherein the positioning system is arranged to locate the locatable device by triangulation or trilateration.", "33. The process according to claim 28, further comprising an enclosure having a closure member that can be opened and closed by a user in order to gain access to the enclosure.", "34. The process according to claim 33, wherein the container includes a plurality of storage compartments,", "35. The process according to claim 32, wherein the access control system includes a locking mechanism for controlling access to the inventory items.", "36. The process according to claim 28a, wherein the access control system includes at least one user identification device to enable users log into the access control system.", "37. The process according to claim 36, wherein each user identification device comprises at least one of a swipe card, a chip and pin card, an RFID tag, a RuBee tag, and a proximity device, and wherein the input device comprises a reading device compatible with the user identification.", "38. The process according to claim 37, wherein the locatable device and the identification device are integrated into a single unit.", "39. The process according to claim 35, further comprising providing storage locations for receiving the locatable device.", "40. The process according to claim 39, wherein the monitoring system is arranged to monitor the removal and replacement of the locatable device from the storage locations.", "41. The process according to claim 38, further comprising starting to track the movement of the locatable device in response to receiving signals from the monitoring system that at least one of the locatable devices has been removed from its storage location.", "42. The process according to claim 41, further comprising stopping the tracking of the movement of the locatable device in response to receiving signals from the monitoring system indicating that the locatable device has been returned to its storage location.", "43. The process according to claim 35, further comprising starting to track the movement of the locatable device in response to receiving signals from the access system indicating that the user has logged in.", "44. The process according to claim 35, further comprising starting to track the movement of the locatable device in response to receiving signals from the monitoring system indicating that the user has removed inventory items from the storage locations.", "45. The process according to claim 44, further comprising stopping the tracking of the movement of the locatable device in response to receiving signals from the monitoring system indicating that the user has replaced the inventory items in the storage locations.", "46. The process according to claim 28, wherein the inventory items are tools.", "47. The process according to claim 28, further comprising reviewing the movement of the user in the event of an inventory item being lost."], "paragraphs": [{"key": 10, "content": "Accordingly, certain embodiments seek to provide an inventory control system and process that mitigates at least some of the aforesaid problems, or to at least provide an alternative to known systems and processes."}, {"key": 11, "content": "According to one aspect, there is provided an inventory control system including a plurality of inventory item storage locations, an access system for controlling access to the inventory items, said access system including an input device for entering the identity of a user, a monitoring system for monitoring the removal and replacement of the inventory items from the storage locations, at least one locatable device that is arranged to be carried by a user of the inventory control system and that is locatable by a positioning system, a positioning system arranged to determine the location of the or each locatable device, and a data processing system for recording the removal and replacement of inventory items, the identity of the user of the inventory items and location data received from the positioning system such that the movement of the or each locatable device can be tracked."}, {"key": 12, "content": "Certain embodiments enable the inventory control system to determine, which inventory items a user has removed from the storage locations and to track the movements of the user while he is in possession of the inventory items such that, if a tool is lost, it is possible to retrace the steps of the user from the tracking information recorded to increase the likelihood of the tool being retrieved. This system has particular application to the aerospace industry where lost tools can cause significant damage to aircraft, for example when tools are left in jet engines during routine maintenance. By tracking the movement of the user of the tool this allows the user to retrace his/her steps in order to improve the chances of the tool being found and significantly reducing the amount of time spent looking for the tool. In some instances it may also prevent aircraft from being grounded, which may happen if it is feared that the tool was lost in a vulnerable part of the aircraft."}, {"key": 18, "content": "The monitoring system monitors which tools have been removed from and replaced in the container, and indicates the presence and/or absence of the tools. This makes it easy to assess whether all the tools taken from the container have been returned after use, thus reducing the risk of any tools being inadvertently left behind. Safety in situations such as aircraft engine maintenance is thus significantly improved. Some embodiments also reduce the risk of tools being lost or stolen, since the fact that a tool has gone missing can be indicated immediately. The system also makes it possible to monitor which tools are being taken for any specified task, thereby helping to ensure best practice in maintenance operations."}, {"key": 55, "content": "The input pad 15 can be used to input other data, such as a part number or to select options on a menu system."}]}, {"patent_id": "US 20070194944", "title": "Systems and methods that evaluate distance to potential hazards utilizing overlapping sensing zones", "abstract": "The claimed subject matter provides industrial automation systems and/or methods that evaluate a proximity to potential hazards. A plurality of sensors can provide redundant detected data. Additionally, a proximity evaluation component can evaluate the detected data, determine a location of at least one of a person and an object, and identify a distance from the location to one or more hazardous zones in a monitored region.", "claims": ["1. An industrial automation system that evaluates proximity to potential hazards, comprising:\na plurality of sensors that provide redundant detected data; and\na proximity evaluation component that evaluates the detected data, determines a location of at least one of a person and an object, and identifies a distance from the location to one or more hazardous zones in a monitored region.", "2. The system of claim 1, the plurality of sensors provide redundancy by utilizing overlapping sensing ranges.", "3. The system of claim 1, the plurality of sensors includes one or more of thermal energy sensors, electromagnetic sensors, mechanical sensors, chemical sensors, optical sensors, radiation sensors, acoustic sensors, and biological sensors.", "4. The system of claim 1, the plurality of sensors continuously monitor the monitored region.", "5. The system of claim 1, the plurality of sensors intermittently evaluate the monitored region utilizing at least one of a predetermined time interval and a varying time interval.", "6. The system of claim 1, the plurality of sensors monitor the monitored region upon an occurrence of an event.", "7. The system of claim 1, the plurality of sensors each obtain a two-dimensional image associated with a corresponding section of the monitored region facing a respective one of the plurality of sensors.", "8. The system of claim 1, the plurality of sensors each being associated with a separate, respective proximity evaluation component.", "9. The system of claim 1, the proximity evaluation component continuously evaluates the location and the distance to the one or more hazardous zones.", "10. The system of claim 1, the proximity evaluation component individually analyzes the detected data provided from each of the plurality of sensors.", "11. The system of claim 1, the proximity evaluation component determines whether the distance from the location to any of the hazardous zones is below a threshold.", "12. The system of claim 1, further comprising a location component that obtains the detected data and identifies at least one of a position, an orientation, and a change in location associated with the at least one of the person and the object.", "13. The system of claim 12, the location component analyzes a two-dimensional image obtained from one of the plurality of sensors and identifies disparate shapes other than shapes associated with potential hazards.", "14. The system of claim 1, further comprising a distance analysis component that evaluates a minimum distance between the location and the one or more hazardous zones.", "15. The system of claim 1, further comprising a hazardous zone recognition component that identifies the one or more hazardous zones within the monitored region.", "16. The system of claim 15, the hazardous zone recognition component identifies hazardous zones associated with at least one of a movement of machinery, a temperature, a pressure, and an amount of emitted radiation.", "17. The system of claim 15, the hazardous zone recognition component further comprises a teaching component that evaluates potentially harmful characteristics associated with the monitored region prior to entry into the monitored region by the at least one of the person and the object.", "18. The system of claim 17, the teaching component identifies the one or more hazardous zones by integrating detected motions associated with machinery into an envelope shape for each of the one or more hazardous zones.", "19. The system of claim 15, the hazardous zone recognition component further comprises a definition component that interactively updates at least one of a shape and a contour of the one or more hazardous zones during operation.", "20. The system of claim 1, further comprising a safety logic component that utilizes the distance from the location to the one or more hazardous zones to yield a corresponding response.", "21. The system of claim 20, the safety logic component modifies operation based at least in part upon the distance.", "22. The system of claim 21, the modification being at least one of halting, slowing, speeding up, and restarting operation.", "23. The system of claim 20, the safety logic component combines distance related information associated with the plurality of sensors.", "24. The system of claim 20, the safety logic component further comprises a weighting component that weights distance related information based upon a likelihood of accurate measurement related to each of the plurality of sensors.", "25. The system of claim 20, the safety logic component further comprises a combination component that aggregates distance related information associated with the plurality of sensors.", "26. The system of claim 20, further comprising an optimization component that generates a voting configuration that the safety logic component employs to generate the corresponding response based upon distance related information from the plurality of sensors.", "27. The system of claim 1, further comprising a control component that causes a machine to modify operating parameters based at least in part upon the distance.", "28. The system of claim 1, further comprising an alarm component that provides an alarm based at least in part upon the distance.", "29. A method that facilitates determining a proximity to a potential hazard in an industrial automation environment, comprising:\nredundantly monitoring an industrial automation environment;\nidentifying one or more hazardous zones existent during operation in the environment;\ndetermining a position of at least one of a person and an object in the environment; and\nevaluating a distance from the position of the at least one of the person and the object to the one or more hazardous zones.", "30. The method of claim 29, further comprising obtaining a redundant sense of the environment by utilizing a plurality of sensors.", "31. The method of claim 29, further comprising monitoring areas in the environment in which the at least one of the person and the object one or more of enters, exits, and traverses.", "32. The method of claim 29, further comprising continuously monitoring the environment, continuously identifying the one or more hazardous zones, continuously determining the position, and continuously evaluating the distance.", "33. The method of claim 29, further comprising:\nmonitoring movement of machinery in the environment prior to entry by the at least one of the person and the object; and\nidentifying the one or more hazardous zones by analyzing the movement of the machinery to determine corresponding shapes and contours of the one or more hazardous zones.", "34. The method of claim 29, further comprising updating at least one of a contour and a shape associated with at least one of the one or more identified hazardous zones during runtime.", "35. The method of claim 29, further comprising:\nobtaining a two-dimensional image associated with a section of the environment facing each of a plurality of sensors;\nlocating a shape other than the one or more hazardous zones; and\ndetermining a distance from the location of the shape to the one or more hazardous zones.", "36. The method of claim 29, further comprising identifying a minimum distance from the position to the one or more hazardous zones.", "37. The method of claim 29, further comprising separately evaluating detected data from a plurality of sensors to determine distance related information corresponding to each of the plurality of sensors.", "38. The method of claim 29, further comprising at least one of modifying operation and providing an alarm based upon the determined distance being below a threshold value.", "39. A system that determines a proximity to a potential hazard in an industrial automation environment, comprising:\nmeans for redundantly monitoring a region;\nmeans for identifying a hazardous zone in the region;\nmeans for determining a location of at least one of a person and an object in the region;\nmeans for evaluating a distance from the location of the at least one of the person and the object to the hazardous zone; and\nmeans for providing a response based at least in part upon the distance."], "paragraphs": [{"key": 26, "content": "Turning now to the drawings, FIG. 1 illustrates a system 100 that enables evaluating distance(s) to potential hazard(s) in an industrial automation environment. The system 100 can include any number of sensors 102-104 (e.g., sensor 1 102, . . . sensor N 104, where N can be any positive integer). It is to be appreciated that the sensors 102-104 can be utilized to monitor and/or detect any type of signal and/or physical condition associated with a machine, a person, a process, a product, an environment, etc. The sensors 102-104 can provide the detected data to a proximity evaluation component 106 that can determine a distance to a potential hazard. Thus, by way of illustration, the proximity evaluation component 106 can utilize the detected data from the sensors 102-104 to identify a location at which a person and/or an object can enter into and/or traverse within and/or exit a monitored region. Additionally or alternatively, the proximity evaluation component 106 can determine and/or obtain information (e.g., location related information, . . . ) associated with dangerous zone(s) during operation of a machine, a process, etc. within the region monitored via the sensors 102-104. Moreover, the proximity evaluation component 106 can calculate a distance (e.g., minimum distance, . . . ) between the person and/or the object and any number of dangerous zones. Further, the system 100 can include a safety logic component 108 that can utilize data associated with distance(s) to potential hazard(s) to effectuate modifying operation associated with a machine, process, etc. It is to be appreciated that the data associated with distance(s) to potential hazard(s) can be provided to a disparate component (not shown) to enable further utilization of such information; however, the claimed subject matter is not so limited."}, {"key": 27, "content": "The multiple sensors 102-104 can be utilized to monitor and/or record a two-dimensional image of an environment facing each of the sensors 102-104, for example. The sensors 102-104 can continuously monitor the environment, intermittently evaluate the environment at predetermined and/or varying intervals of time, monitor the environment upon an occurrence of an event (e.g., starting operation, modifying operation, determining a person and/or object entered the monitored region, . . . ), etc. Additionally, the sensors 102-104 can provide redundancy by way of utilizing overlapping sensing ranges associated with each of the sensors 102-104. Thus, for example, any number of the sensors 102-104 can redundantly detect data related to a particular machine, person, object, process, product, environment, etc. The overlap can create redundancy within a sensor system that can be utilized in connection with a control system such as, for instance, a safety system, an availability system, a system that can customize (e.g., optimize) allocation of redundancy (e.g., dynamically during runtime, at a time of setup, . . . ) to provide for a mixture of safety and availability, etc. Pursuant to an example, a person can be traversing through an industrial automation environment (e.g., region monitored with the sensors 102-104, . . . ) and her location can be continuously monitored by any number of disparate sensors (e.g., two, three, . . . N, where N can be any positive integer). Thus, an overlapping view of the location of the person can be obtained; however, the claimed subject matter is not limited to the aforementioned example."}]}] | {"reason": "Regarding Claim 1, Hardegger teaches a safety system for a production environment, the safety system comprising a controller configured to automatically alter at least one aspect of the production environment responsive to the at least one sensing device. However, Kogan teaches at least one sensing device configured to detect presence of an unauthorized human at least partially within a defined safety zone.", "code": "103"} |
13857544 | 10 | {"title": "SAFETY SYSTEMS AND METHODS FOR PRODUCTION ENVIRONMENTS", "abstract": "ABSTRACT Safety systems and methods for production environments are disclosed. Safety systems include at least one sensing device configured to detect presence of an unauthorized human and/or an authorized human at least partially within a defined safety zone, and a controller configured to 5 automatically alter at least one aspect of the production environment responsive to the presence of the unauthorized human and/or the authorized human. Safety methods include detecting presence of an unauthorized human and/or an authorized human at least partially within a defined safety zone, and automatically altering at least one aspect of the production environment responsive to the detecting. 54", "claims": ["1. A safety system for a production environment, the safety system comprising: at least one sensing device configured to detect presence of an unauthorized human at least partially within a defined safety zone; and a controller configured to automatically alter at least one aspect of the production environment responsive to the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone; wherein the safety system is configured to distinguish between humans and surrounding environment based at least in part on data detected by the at least one sensing device.", "2. The safety system of claim 1, wherein the at least one sensing device is further configured to detect presence of the unauthorized human fully within the defined safety zone; and wherein the controller is further configured to (i) automatically alter a first aspect of the production environment responsive to the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone, and (ii) automatically alter a second aspect of the production environment responsive to the at least one sensing device detecting presence of the unauthorized human fully within the defined safety zone, wherein the second aspect is configured to have a greater hazard deterring effect than the first aspect.", "3. The safety system of claim 2, wherein the at least one sensing device is further configured to detect imminent entry of the unauthorized human into the defined safety zone; and wherein the controller is further configured to (iii) automatically alter a third aspect of the production environment responsive to the at least one sensing device detecting imminent entry of the unauthorized human into the defined safety zone, wherein the first aspect is configured to have a greater hazard deterring effect than the third aspect.", "4. The safety system of claim 1, wherein the at least one sensing device is further configured to detect presence of the unauthorized human at least partially within a sub-zone of the defined safety zone, wherein the sub- zone is spaced inwardly from a perimeter of the defined safety zone; and wherein the controller is further configured to (i) automatically alter a first aspect of the production environment responsive to the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone, and (ii) automatically alter a second aspect of the production environment responsive to the at least one sensing device detecting presence of the unauthorized human at least partially within the sub-zone, wherein the second aspect is different than the first aspect.", "5. The safety system of claim 1, wherein the at least one aspect includes one or more of movement of a machine tool, movement of a work piece, and movement of an assembly line.", "6. The safety system of claim 1, wherein the controller is configured to automatically slow movement of a machine tool, to automatically slow movement of a work piece, and/or to automatically slow movement of an assembly line responsive to the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone.", "7. The safety system of claim 1, wherein the controller is configured to automatically stop movement of a machine tool, to automatically stop movement of a work piece, and/or to automatically stop movement of an assembly line responsive to the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone.", "8. The safety system of claim 1, wherein the controller is configured to automatically actuate an alarm responsive to the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone.", "9. The safety system of claim 1, wherein the defined safety zone is associated with the production environment, and wherein the production environment is associated with production of aircraft.", "10. The safety system of claim 1, wherein the defined safety zone defines a discrete volume of space.", "11. The safety system of claim 1, wherein the at least one sensing device includes a multispectral camera.", "12. The safety system claim 1, wherein the safety system is configured to distinguish between human thermal signatures and non-human thermal signatures based at least in part on data detected by the at least one sensing device.", "13. The safety system of claim 1, further comprising: one or more tags, wherein the one or more tags are configured to be operatively coupled to a human; wherein the at least one sensing device is configured to detect presence of the one or more tags within the defined safety zone.", "14. The safety system of claim 13, wherein the safety system is configured to distinguish between a first human associated with a tag of the one or more tags and a second human not associated with a tag of the one or more tags.", "15. The safety system of claim 14, wherein the controller is configured to automatically alter the at least one aspect responsive to the at least one sensing device detecting presence of the first human at least partially within the defined safety zone.", "16. The safety system of claim 14, wherein the controller is configured to automatically alter the at least one aspect responsive to the at least one sensing device detecting presence of the second human at least partially within the defined safety zone.", "17. The safety system of claim 13, wherein the one or more tags each include a predefined detectable configuration, and wherein the at least one sensing device is configured to detect presence of the predefined detectable configuration within the defined safety zone; wherein the predefined detectable configuration includes one or more of a specifically configured surface, a retro-reflective surface, a surface having predefined distinguishing indicia, a predefined thermal signature, a fluorescence signature, and/or a radiative signature.", "18. The safety system of claim 1, wherein the safety system is configured to interface with an inventory control system associated with the production environment; and wherein the controller is configured to automatically alter the at least one aspect of the production environment responsive to (i) the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone and (ii) a predefined configuration associated with the inventory control system.", "19. The safety system of claim 18, wherein the predefined configuration associated with the inventory control system includes one or more of presence of a predetermined part within the defined safety zone, presence of a predetermined part on a work piece, presence of a predetermined part within a predetermined locale, movement of a predetermined part within the safety zone, movement of a predetermined part relative to a work piece, and/or movement of a predetermined part within a predetermined locale.", "20. The safety system of claim 1, further comprising: an orientation device configured to detect an orientation of the at least one sensing device; wherein the controller is configured to automatically alter the at least one aspect of the production environment responsive to (i) the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone and (ii) the orientation of the at least one sensing device.", "21. The safety system of claim 1, further comprising: a movement detection device configured to detect movement of a work piece; wherein the controller is configured to automatically alter the at least one aspect of the production environment responsive to (i) the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone and (ii) the movement of the work piece.", "22. The safety system of claim 1, wherein the at least one sensing device is further configured to detect a predetermined orientation of a work piece within the defined safety zone; and wherein the controller is configured to automatically alter the at least one aspect of the production environment responsive to (i) the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone and (ii) the at least one sensing device detecting the predetermined orientation of the work piece.", "23. The safety system of claim 1, wherein the at least one sensing device includes a plurality of sensing devices; and wherein at least one sensing device of the plurality of sensing devices is configured to detect presence of one or more additional sensing devices of the plurality of sensing devices within a predetermined locale to establish the defined safety zone based at least in part on the presence of the one or more additional sensing devices within the predetermined locale.", "24. The safety system of claim 1, wherein the at least one sensing device includes a plurality of sensing devices; and wherein the safety system is configured to establish the defined safety zone based at least in part on overlapping sensing zones of two or more of the plurality of sensing devices.", "25. The safety system of claim 1, wherein the defined safety zone is established by the at least one sensing device; and wherein the defined safety zone corresponds to a field of view of the at least one sensing device.", "26. The safety system of claim 1, wherein the safety system has at least a default state and an alert state; wherein in the default state, the at least one aspect of the product environment is not altered; and wherein in the alert state, the at least one aspect of the production environment is altered.", "27. The safety system of claim 26, wherein in the default state, no unauthorized human is positioned within the defined safety zone; and wherein in the alert state, at least a portion of an unauthorized human is positioned within the defined safety zone.", "28. A safety system for a production environment, the safety system comprising: at least one sensing device configured to detect presence of an unauthorized human at least partially within a defined safety zone that defines a discrete volume of space; and a controller; wherein the safety system is configured to distinguish between human thermal signatures and non-human thermal signatures based at least in part on data detected by the at least one sensing device; wherein the safety system is configured to interface with an inventory control system associated with the production environment; and wherein the controller is configured to automatically alter at least one aspect of the production environment responsive to (i) the at least one sensing device detecting presence of the unauthorized human at least partially within the defined safety zone and (ii) a predefined configuration associated with the inventory control system; and wherein the predefined configuration associated with the inventory control system includes one or more of presence of a predetermined part within the defined safety zone, presence of a predetermined part on a work piece, presence of a predetermined part within a predetermined locale, movement of a predetermined part within the safety zone, movement of a predetermined part relative to a work piece, and/or movement of a predetermined part within a predetermined locale.", "29. A safety system for a production environment, the safety system comprising: at least one sensing device configured to detect presence of an authorized human at least partially within a defined safety zone; and a controller configured to automatically alter at least one aspect of the production environment responsive to the at least one sensing device detecting presence of the authorized human at least partially within the defined safety zone; wherein the safety system is configured to distinguish between humans and surrounding environment based at least in part on data detected by the at least one sensing device.", "30. A safety method implemented in a production environment, the safety method comprising: detecting presence of an unauthorized human at least partially within a defined safety zone, wherein the detecting includes distinguishing between human movement and non-human movement in the defined safety zone; and automatically altering at least one aspect of the production environment responsive to the detecting."]} | [{"patent_id": "US 20110298579", "title": "DYNAMICALLY ADAPTABLE SAFETY ZONES", "abstract": "Systems and methods are provided for defining a safety zone in an industrial automation environment. The method includes monitoring an object that approaches an operating zone where equipment is controlled within the operating zone. This includes determining the speed or direction that the object approaches the operating zone. The method includes dynamically adjusting a safety region in view of the determined speed or direction of the object and enabling or disabling the equipment within the operating zone based in part on the object entering the safety region.", "claims": ["1. A method for defining a safety zone in an industrial automation environment, comprising:\nmonitoring an object and operating zone where equipment is controlled within the operating zone;\ndetermining a speed between the object and the equipment;\ndetermining a direction that the object approaches the operating zone;\ndetermining a speed or direction that a moving part associated with the equipment approaches the object;\ndynamically adjusting a safety region in view of the determined speed or direction of the object; and\nenabling or disabling the equipment within the operating zone based in part on the object entering the safety region.", "2. The method of claim 1, employing at least one time of flight sensor to determine the speed or direction that the object approaches the safety region.", "3. The method of claim 2, employing multiple time of flight sensors to monitor multiple dimensions for the operating zone, where the dimensions include movements toward the operating zone, movements away from the operating zone, movements from above or below the operating zone, or movements to the sides or circumference of the operating zone.", "4. The method of claim 1, further comprising monitoring motion of a portion of the equipment.", "5. The method of claim 4, further comprising adjusting safety regions within the operating zone based on speed or direction of the portion of the equipment.", "6. The method of claim 4, further comprising monitoring moving equipment and dynamically adjusting a safety region as the moving equipment approaches other objects.", "7. The method of claim 1, further comprising dynamically adjusting the safety region based on an operating mode of a machine.", "8. The method of claim 7, the operating mode includes production mode, standby mode, disabled mode, maintenance mode, and reduced speed mode.", "9. The method of claim 1, further comprising employing an industrial controller to determine the speed or direction.", "10. The method of claim 9, employing the industrial controller for enabling or disabling the equipment within the operating zone.", "11. The method of claim 1, utilizing a component of a machine as a center of reference for defining a dynamically adjustable safety region.", "12. An industrial control system that is employed to monitor and control a safety zone, comprising:\na controller that monitors objects that approach an operating zone where equipment is controlled within the operating zone;\na time of flight sensor that determines the speed or direction that the objects approach the operating zone; and\na logic component associated with the controller to automatically adjust a safety region in view of the determined speed or direction of the objects.", "13. The industrial control system of claim 12, the controller enables or disables the equipment within the operating zone based in part on the object entering the safety region.", "14. The industrial control system of claim 12, the controller interacts with multiple time of flight sensors to monitor multiple dimensions for the operating zone, where the dimensions include movements toward the operating zone, movements away from the operating zone, movements from above or below the operating zone, or movements to the sides or circumference of the operating zone.", "15. The industrial control system of claim 12, the controller monitors motion of a portion of the equipment.", "16. The industrial control system of claim 15, the controller dynamically adjusts safety regions within the operating zone based on speed or direction of the portion of the equipment.", "17. The industrial control system of claim 12, the controller monitors moving equipment and dynamically adjusts a safety zone as the moving equipment approaches other objects.", "18. The industrial control system of claim 12, the controller dynamically adjusts the safety region based on an operating mode of a machine.", "19. An industrial control system that is employed to monitor and control a safety zone, comprising:\nmeans for monitoring objects that approach an operating zone where equipment is controlled within the operating zone;\nmeans for determining the speed or direction that the objects approach the operating zone; and\nmeans for adjusting a safety region in view of the determined speed or direction of the objects.", "20. The industrial control system of claim 12, further comprising a component to alter operation of the equipment within the operating zone based in part on the object entering the safety region.", "21. The system of claim 19, further comprising at least one TOF sensor that is mounted on moving portions of the equipment."], "paragraphs": [{"key": 1, "content": "The claimed subject matter relates generally to industrial control systems and more particularly to systems and methods that employ time of flight sensing to automatically adjust safety zone regions for industrial environments.\n\nBACKGROUND"}, {"key": 10, "content": "Generally, since the protective field position monitored by the TOF sensor(s) is dependent on the speed and direction of object movement, the distance to the hazardous area can be very short if the movement is not toward the respective zone. It is similar if the speed is very slow. For example, at a press with manual changing, this is a consideration since the operator does not need to move long distances. Thus, the machine can be started as soon as the operator leaves the hazardous area and as long as he does not move towards the machine. By sensing additional dimensions such as speed and direction, various economic benefits can be realized as shorter safety distances can be realized to facilitate lower space requirements, lower building costs, shorter distances for the operator to move, faster machine cycles, and lower part costs."}, {"key": 25, "content": "Referring initially to FIG. 1, a system 100 illustrates a dynamically adjustable safety zone 110 for an industrial control environment. The system 100 includes a controller 120 that monitors an operating zone via one or more time of flight (TOF) sensors 140. It is noted that the controller 120 can also be included in the TOF sensor itself, whereas the controller does not have to be a stand alone controller. Equipment 150 within the operating zone 130 is also operated by the controller 120 although it is to be appreciated that a separate controller could be employed for the equipment 150 and another controller employed for dynamically adjusting safety regions within the zone 130. As shown, the safety zone 110 includes a dynamically adjustable dimension, region, or area that can be adjusted according to multiple dimensions or directions as will be described in more detail below. As objects (or people) 160 approach the operating zone 130, the TOF sensors 140 detect the speed or direction of the objects that is computed and determined by the controller 120."}, {"key": 27, "content": "In general, the system 100 provides dynamically adjustable safety zones to facilitate protection of people and machinery in an industrial environment. In one aspect, safety zones 110 are monitored via one or more time-of-flight (TOF) sensors 140 in order to detect movement toward the zones. On fast approaching objects 160 that include people or machines, the area or other dimension of the safety zone 110 can be increased in order that equipment operation can be altered or disabled in view of such detected movement. On detecting slower objects 160 approaching the respective zone 110 or 130, the area or other dimension (e.g., distance) can be decreased as logic detection would have more time to consider whether or not a safety shut-down event or other safety operation should occur."}, {"key": 28, "content": "Generally, since the protective field position monitored by the TOF sensor(s) 140 is dependent on the speed and direction of object 160 movement, the distance to the hazardous area can be very short if the movement is not toward the respective zone. It is similar if the speed is very slow. For example, at a press with manual changing, this is a consideration since the operator does not need to move long distances. Thus, the machine can be started as soon as the operator leaves the hazardous area and as long as he does not move towards the machine. By sensing additional dimensions such as speed and direction, various economic benefits can be realized as shorter safety distances can be realized to facilitate lower space requirements, lower building costs, shorter distances for the operator to move, faster machine cycles, and lower part costs."}, {"key": 59, "content": "Optical time-of-flight sensors consist of two light beams projected into the medium (e.g., fluid or air) whose detection is either interrupted or instigated by the passage of small particles (which are assumed to be following the flow). This is not dissimilar from the optical beams used as safety devices in motorized garage doors or as triggers in alarm systems. The speed of the particles is calculated by knowing the spacing between the two beams. If there is only one detector, then the time difference can be measured via autocorrelation. If there are two detectors, one for each beam, then direction can also be known. Since the location of the beams is relatively easy to determine, the precision of the measurement depends primarily on how small the setup can be made. If the beams are too far apart, the flow could change substantially between them, thus the measurement becomes an average over that space. Moreover, multiple particles could reside between them at any given time, and this would corrupt the signal since the particles are indistinguishable. For such a sensor to provide valid data, it must be small relative to the scale of the flow and the seeding density. Optical time of flight sensors can be constructed as a 3D camera with a time of flight camera chip."}]}, {"patent_id": "US 20050002530", "title": "Method and a system for control of unauthorized persons", "abstract": "A security method and system for the detection and/or control of unauthorized persons among a large number of freely moving authorized persons within a controlled restricted zone, incorporating an infrastructure of control points, electronic means borne by the authorized persons, communication between said electronic means and said control points, and cryptographic protection against forgery, allowing the interception of unauthorized persons by security authorities.", "claims": ["1. A security method for the detection and/or control of unauthorized humans (10a, 10b, . . . ) among a large number of authorized humans (12a, 12b, . . . ) within a controlled restricted zone (2), characterized in that all authorized humans are equipped with active permits (60a, 60b, . . . ) planned to perform a cryptographic action involving a secret cryptographic key (64), and the controlled restricted zone is equipped with automatic control points (20a, 20b, . . . ), and optionally with manual control points (40a, 40b, . . . ), each automatic control point detecting all humans entering or moving through a specific section (in its vicinity, and each manual control point selecting humans by the action of an operator, the humans detected by the automatic control points and the humans selected by the manual control points being hereafter referred to as designated humans, both types of control points being planned to acquire the results of said cryptographic actions performed by the active permits of said designated humans, a cryptographic authentication algorithm involving a validation key (being further performed upon each acquired said result, both types of control points being further planned to associate said acquired results to said designated humans, the designation of the humans, the acquiring of said results, the association of said acquired results to said designated humans and the performing of said cryptographic authentication algorithm upon said acquired results not requiring a substantial change in the motion conditions and/or the behavior of the humans, classifying as unauthorized at least humans which have been designated but whose said results either have not been acquired or have not been cryptographically authenticated, an alert message being transmitted to security authorities for each human which has been classified as unauthorized, allowing in such a way for an immediate intervention and a possible interception of the unauthorized humans, at least some of the control points, hereafter referred to as particular control points, being moreover planned to acquire physical characteristics of said designated humans, allowing their direct recognition, said alert message including in this case said physical characteristics.", "2. A method as described in claim 1, in which at least some of said active permits, hereafter referred to as particular active permits, additionally have distinct identities (62a, 62b, . . . ), each distinct identity belonging to a group of one or more of said particular active permits, and distinct identity determination being further performed for all designated humans bearing said particular active permits, upon each said acquired result.", "3. A method as described in claim 2, in which said controlled restricted zone contains one or more sub-zones, each human further being authorized or unauthorized for each of the sub-zones, each sub-zone being further equipped with automatic control points and optionally with manual control points, a database (of authorization data regarding said particular active permit distinct identities being associated with each sub-zone, each determined distinct identity of a human designated by a control point being further checked against said authorization data in the databases associated with the sub-zones containing that control point, said databases being automatically and/or manually modifiable by the security authorities, additionally classifying as unauthorized humans which have been designated but whose said distinct identities are indicated as unauthorized by the authorization data in at least one of the databases associated with the sub-zones containing that control point.", "4. A method as described in claim 2, in which data regarding said designated humans (such as said particular active permit distinct identities, control points location, times of designation of humans, etc) is additionally recorded, this data being searched for inconsistencies with regard to time and/or humans location, the results of this search assisting security authorities in finding potential impersonations of said particular active permits.", "5. A method as described in claim 2, in which said secret cryptographic keys of at least some of said particular active permits are distinct, each distinct key corresponding to a group of one or more said particular active permit distinct identities, this, according to the level of protection required for those said particular active permits, correspondence between said distinct secret cryptographic keys and said distinct identities being additionally required in order to cryptographically authenticate said results, so that a perpetrator in possession of a particular active permit, is prevented from impersonating a particular active permit with a different distinct secret cryptographic key.", "6. A method as described in claim 1, in which said alert messages are prioritized, according to the control point characteristics, such as its location, alert message history, etc, and/or the time of designation of the human, and/or said acquired physical characteristics if available, and/or current operational intelligence if available, improving the effectiveness of the intervention of the security authorities.", "7. A method as described in claim 1, in which at least some of the humans are equipped with a human communication unit (containing their active permit, these humans when classified as unauthorized, being selectively notified immediately upon their classification by means (of sending a notification in the control points and/or means (of notification in the human communication units.", "8. A method as described in claim 1, in which at least some of the humans are equipped with a human communication unit containing their active permit, the secret cryptographic keys of at least some of said active permits being contained within supports, which can be detached from said human communication units.", "9. A method as described in claim 1, in which the secret cryptographic keys of at least some of said active permits are contained within supports, these supports planned to prevent a perpetrator from finding out, through physical penetration and/or deduction, the secret cryptographic keys they contain.", "10. A method as described in claim 1, in which the secret cryptographic keys of at least some of said active permits are contained within supports, all the information produced during said cryptographic action leading to a possible disclosure of said secret cryptographic keys being exclusively contained in said supports.", "11. A method as described in claim 1, in which at least some of said active permits are additionally associated to PINs (Personal Identification Numbers), said PINs supplied to said active permits by authorized humans, 'said PINs being additionally required by said active permits in order to generate said results of said cryptographic action, and/or being further required in order to cryptographically authenticate said results.", "12. A method as described in claim 1, in which digital elements of a first type are used in performing the cryptographic actions of at least some of said active permits, said digital elements of the first type being additionally required in order to cryptographically authenticate said acquired results, said digital elements of the first type being furthermore different at different times, preventing in this way the authentication of forgery attempts by recording and replaying of said results.", "13. A method as described in claim 12, in which said digital elements of the first type are based on the outputs of time clocks.", "14. A method as described in claim 12, in which said digital elements of the first type are acquired by the control points and transmitted to the human communication units of said designated humans.", "15. A method as described in claim 12, in which said digital elements of the first type are the elements of predefined series associated with distinct identities.", "16. A method as described in claim 2, in which digital elements of a second type are generated by at least some of said active permits, are used in performing the cryptographic actions of these particular active permits, and are required to be different at different times in order to cryptographically authenticate said results of these particular active permits, preventing in this way the authentication of forgery attempts by recording and replaying of said results.", "17. A method as described in claim 1, in which said control points are moreover planned to acquire a credential from the active permit of each said designated human, said validation key being securely extracted from each acquired credential by performing a cryptographic extraction algorithm involving an extraction key.", "18. A method as described in claim 2, in which said validation key is selected from a list of validation keys, according to said determined distinct identity.", "19. A method as described in claim 1, in which the cryptographic process consisting of said cryptographic actions in said active permits and said cryptographic authentications of said acquired results, is of a symmetric type, an asymmetric type, or a combination of both.", "20. A method as described in claim 1, in which at least some of said control points are further planned to associate each said acquired result to a particular designated human.", "21. A method as described in claim 1, in which the memory contents of said active permits can be altered as a consequence of instructions and/or data transmitted from the control points.", "22. A method as described in claim 1 in which said required change in the motion conditions of the humans is in the range of 0.5.times.V-1.5.times.V, V being the average velocity of the humans before reaching the specific section (in the vicinity of said control points.", "23. A security system for the detection and/or control of unauthorized humans (10a, 10b, . . . ) among a large number of authorized humans (12a, 12b, . . . ) within a controlled restricted zone (2), to implement the method of claim 1, comprising:\nhuman communication units (50a, 50b, . . . ), borne by all authorized humans, comprising means (of activating the transmission of an identification message by the human communication unit, an active permit (containing a distinct identity (62), and a transmitter (54), means of issuing (170), and of revoking (of active permits (60a, 60b, . . . ), at least one database (containing authorization data regarding humans, automatic control points (20a, 20b, . . . ), and optionally manual control points (40a, 40b, . . . ), both distributed in the controlled restricted zone (2), each automatic control point comprising means (of detection and counting of all humans entering or moving through a specific section (in its vicinity, and each manual control point comprising means of selection (of humans by the action of an operator, the humans detected by the automatic control points and the humans selected by the manual control points being hereafter referred to as designated humans, both types of control points additionally comprising means (of activating requests for identification to the human communication units of the designated humans, means (of reception capable of receiving identification messages transmitted by human communication units, hereafter referred to as human communication unit responses (90a, 90b, . . . ), and a controller (capable of associating human communication unit responses to designated humans, means (of retrieving prior data from the database (180), means (of classification of designated humans, at least one security center (160), additional means (in the manual control points of notifying the manual control point operator, a communication network (between at least some of the control points, the database (180), the means of issuing (and revoking (of active permits, the means of retrieving prior data (130), the means of classification (and the security centers, characterized in that:\nI) The active permit (contains in addition a secret cryptographic key (associated to the distinct identity (of the active permit (60), and is planned to perform a cryptographic confirmation algorithm (involving at least the distinct identity (and the secret cryptographic key (64), II) The human communication unit response (comprises the result of the cryptographic confirmation algorithm (66), III) Means (of cryptographic authentication are planned to check for each human communication unit response (whether or not the secret cryptographic key (corresponding to the distinct identity (contained in the human communication unit response (was the one used in the calculation of this response (90), this action involving a validation key (corresponding to the same distinct identity (62), and a cryptographic validation algorithm (76), IV) For every newly authorized human, the means (of issuing allocate a distinct identity (62), initialize a new active permit (to bear the allocated distinct identity (and a corresponding secret cryptographic key (64), and update the database (with information regarding the newly authorized human (12), V) The means (of revoking are planned to automatically (for example time dependent expiration) and/or manually modify elements in the database (180), VI) The means of retrieving prior data (utilize the distinct identity (contained in the human communication unit response (90), in order to retrieve from the database (180), authorization data regarding this human, VII) The means (of classification utilize the data produced by the means (of detection and counting, and/or the means (of reception, and/or the controller (28), and/or the means (of authentication, and/or the means (of retrieving prior data, to determine whether a designated human is authorized or not, VIII) Means (of alert convey to at least one security center (and/or to the means (of notifying the manual control point operator, an alert message containing the data provided by the means (of reception, and/or the controller (28), and/or the means (of authentication, and/or the means (of retrieving prior data, for at least some of the humans classified as unauthorized, IX) At least some of the control points comprise in addition means (of acquiring physical characteristics of designated humans, such as photographic information, height, weight, features, etc . . . , the means of alert (additionally include said acquired physical characteristics in at least some of the alert messages.", "24. A system according to claim 23, in which the means (of authentication are additionally planned to determine the validation key (74), by utilizing the distinct identity (contained in the human communication unit response (90), to select from-a validation key list (containing for each distinct identity (a corresponding validation key (74), and the means (of issuing are also additionally planned to update for every newly authorized human (the validation key list (with the allocated distinct identity (and the corresponding validation key (74).", "25. A system according to claim 23, in which the human communication unit response (additionally comprises a credential (174), the means (of authentication being additionally planned to determine the validation key (74), by utilizing a cryptographic extraction algorithm (involving an extraction key (78), in order to securely extract the validation key (from the credential (contained in the human communication unit response (90), and the means (of issuing being also additionally planned to initialize for every newly authorized human (12), the active permit (with a credential (containing the result of a cryptographic binding algorithm (involving the validation key (and a binding key (which corresponds to the extraction key (78).", "26. A system according to claim 23, in which the means (of activating requests for identification transmit to every designated human an interrogation message.", "27. A system according to claim 23, in which the means (of activating requests for identification comprise a trigger element in the vicinity of the control point, that is planned to be detectable by means (in the human communication units.", "28. A system as described in claim 23, which is utilized to perform additional functions such as Admittance Fee Collection, Access Control, in particular on the perimeter of the controlled restricted zone and/or any of its sub-zones, Messaging, Crew Management, statistical survey, a crime investigation tool, etc.", "29. A system as described in claim 23, in which the human communication unit (is powered by an internal power source (58), and/or by a coil (converting the energy of an RF wave generated by means (in the control points."], "paragraphs": [{"key": 17, "content": "One such field of application is alarm systems, in which various methods and systems have been developed in order to alert security authorities upon the entrance of a person into a restricted zone. In a typical system of such type, the restricted zone, whether an apartment, a house or a larger area, is equipped with sensors, for instance infra-red, thermal or a video camera, that are activated by the last authorized person leaving the zone, transmitting an alarm signal to security authorities and possibly also to law enforcement authorities upon sensing a person entering the restricted zone. An authorized person can typically de-activate the sensors for instance by a key, PIN code, etc. Such systems are commonly used in buildings and areas of varying sizes. One such a system is described in U.S. Pat. No. 5,530,429."}, {"key": 24, "content": "According to the invention, a security method for the detection and/or control of unauthorized humans (10a, 10b, . . . ) among a large number of authorized humans (12a, 12b, . . . ) within a controlled restricted zone (2), is characterized in that all authorized humans are equipped with active permits (60a, 60b, . . . ) planned to perform a cryptographic action involving a secret cryptographic key (64), and the controlled restricted zone is equipped with automatic control points (20a, 20b, . . . ), and optionally with manual control points (40a, 40b, . . . ), each automatic control point detecting all humans entering or moving through a specific section (21) in its vicinity, and each manual control point selecting humans by the action of an operator, the humans detected by the automatic control points and the humans selected by the manual control points being hereafter referred to as designated humans, both types of control points being planned to acquire the results of said cryptographic actions performed by the active permits of said designated humans, a cryptographic authentication algorithm involving a validation key (74) being further performed upon each acquired said result, both types of control points being further planned to associate said acquired results to said designated humans, the designation of the humans, the acquiring of said results, the association of said acquired results to said designated humans and the performing of said cryptographic authentication algorithm upon said acquired results not requiring a substantial change in the motion conditions and/or the behavior of the humans, classifying as unauthorized at least humans which have been designated but whose said results either have not been acquired or have not been cryptographically authenticated, an alert message being transmitted to security authorities for each human which has been classified as unauthorized, allowing in such a way for an immediate intervention and a possible interception of the unauthorized humans, at least some of the control points, hereafter referred to as particular control points, being moreover planned to acquire physical characteristics of said designated humans, allowing their direct recognition, said alert message including in this case said physical characteristics."}, {"key": 35, "content": "In a method according to the invention, at least some of said active permits are additionally associated to PINs (Personal Identification Numbers), said PINs supplied to said active permits by authorized humans, said PINs being additionally required by said active permits in order to generate said results of said cryptographic action, and/or being further required in order to cryptographically authenticate said results."}, {"key": 90, "content": "The means (22) of detection and counting can be made by any known technique in the field of human detection and counting such as a weighing device, a sensor triggered by the interruption of an electromagnetic beam, infrared heartbeat detection, etc."}, {"key": 110, "content": "In an example of implementation, the geometric parameters of means (42,24,26,30) are designed to ensure that, given proper aiming by the operator, sufficient geometric data is acquired to enable the controller (28) to distinguish the response or the lack of response of the communication unit (50) of the selected human from responses possibly received from the communication units (50) of other humans."}]}, {"patent_id": "US 20090072029", "title": "INVENTORY CONTROL SYSTEM", "abstract": "An inventory control system is disclosed. The system includes a plurality of inventory item storage locations, an access system for controlling access to the inventory items, where the access system includes an input device for entering the identity of a user, a monitoring system for monitoring the removal and replacement of the inventory items from the storage locations, at least one locatable device that is arranged to be carried by a user of the inventory control system and that is locatable by a positioning system, a positioning system, arranged to determine the location of the locatable device, and a data processing system for recording the removal and replacement of inventory items and location data received from the positioning system such that the movement of the or each locatable device can be tracked.", "claims": ["1. An inventory control system, comprising:\na plurality of inventory item storage locations; and\nan access system for controlling access to the inventory items, said access system, comprising:\nan input device for entering the identity of a user;\na monitoring system configured to monitor the removal and replacement of the inventory items from the storage locations;\nat least one locatable device configured to be removed by a user of the inventory control system;\na positioning system configured to locate the locatable device; and\na data processing system configured to record the removal and replacement of inventory items, the identity of the user of the inventory items and location data received from the positioning system such that the movement of the locatable device is tracked.", "2. The inventory control system according to claim 1, wherein the positioning system includes a real time location system having a plurality of transmitter-receiver devices arranged to locate the position of the locatable device.", "3. The inventory control system according to claim 2, wherein the locatable device includes a RFID tag and the positioning system includes a plurality of RFID tag detecting devices.", "4. The inventory control system according to claim 2, wherein the locatable device includes an RuBee tag and the positioning system includes a plurality of RuBee tag detecting devices.", "5. The inventory control system according to claim 1, wherein the positioning system is arranged to locate the locatable device by triangulation or trilateration.", "6. The inventory control system according to claim 1, wherein the monitoring system comprises at least one of a sensor system, a camera system with image recognition, a camera system with optical character recognition, and at least one barcode reading device.", "7. The inventory control system according to claim 6, wherein the sensor system includes a plurality of sensors configured to sense the presence of inventory items in the storage locations, each sensor being associated with a storage location and arranged to generate a signal representing the presence or absence of an inventory item in the associated storage location.", "8. The inventory control system according to claim 6, wherein the data processing system is constructed and arranged to identify the inventory items from the signals received from the monitoring system.", "9. The inventory control system according to claim 1, wherein each inventory item storage location comprises an individually-shaped recess for receiving a specific inventory item, the shape of the recess being matched to the shape of the inventory item.", "10. The inventory control system according to claim 1, further comprising an enclosure having a closure member that can be opened and closed by a user.", "11. The inventory control system according to claim 10, wherein the enclosure comprises a container having a plurality of storage compartments,", "12. The inventory control system according to claim 10, wherein the access control system includes a locking mechanism for controlling access to the inventory items in the enclosure.", "13. The inventory control system according to claim 1, wherein the access control system includes at least one user identification device to enable a user to log in via the input device.", "14. The inventory control system according to claim 13, wherein each user identification comprises at least one of:\na swipe card, a chip and pin card, an RFID tag, a RuBee tag, and a proximity device, and wherein the input device comprises a reading device compatible with the user identification.", "15. The inventory control system according to claim 14, wherein the locatable device and the identification device are integrated into a single unit.", "16. The inventory control system according to claim 1, further comprising storage locations for receiving the locatable device.", "17. The inventory control system according to claim 16, wherein the monitoring system is arranged to monitor the removal and replacement of the locatable device.", "18. The inventory control system according to claim 16, wherein the data processing system is arranged to start tracking the movement of the locatable device in response to receiving signals from the monitoring system that the locatable device has been removed from its storage location.", "19. The inventory control system according to claim 18, wherein the data processing system is arranged to stop tracking the movement of the locatable device in response to receiving signals from the monitoring system indicating that the locatable device has been returned to its storage location.", "20. The inventory control system according to claim 1, wherein the data processing system is arranged to start tracking the movement of the locatable device in response to receiving signals from the access system indicating that the user has logged in.", "21. The inventory control system according to claim 1, wherein the data processing system is arranged to start tracking the movement of the locatable device in response to receiving signals from the monitoring system indicating that the user has removed inventory items from the storage locations.", "22. The inventory control system according to claim 1, wherein the data processing system is arranged to stop tracking the movement of the locatable device in response to receiving signals from the monitoring system indicating that the user has replaced the inventory items in the storage locations.", "23. The inventory control system according to claim 12, further comprising means for determining the operational status of the locking mechanism and means for inhibiting the operation of the monitoring system according to the signals received from the means for determining the operational status of the locking mechanism.", "24. The inventory control system according to claim 12, wherein the locking mechanism is arranged to automatically open when an authorized user has been identified.", "25. The inventory control system according to claim 1, wherein the data processing system is configured to record the time of removal and replacement of inventory items.", "26. The inventory control system according to claim 10, wherein the data processing system is located remotely from the enclosure and is connected to the reading device by a data link.", "27. The inventory control system according to claim 1, wherein the enclosure includes a local indicator device for indicating the presence and/or absence of inventory items in the enclosure.", "28. A method of controlling inventory, the method comprising:\nproviding a plurality of inventory item storage locations;\noperating an access system for controlling access to the inventory items, wherein operating the access system comprises:\nwith an input device, entering the identity of a user;\nwith a monitoring system, monitoring the removal and replacement of the inventory items from the storage locations;\nwith a positioning system, determining the location of at least one locatable device that is arranged to be removed by a user of the inventory control system; and\nwith a data processing system, recording the removal and replacement of inventory items, the identity of the user of the inventory items and location data received from the positioning system such that the movement of the or each locatable device is tracked.", "29. The process according to claim 28, wherein the positioning system includes a plurality of transmitter-receiver devices.", "30. The process according to claim 29, wherein the locatable device includes a RFID tag and the positioning system includes a plurality of RFID tag detecting devices.", "31. The process according to claim 29, wherein the locatable device includes a RuBee tag and the positioning system includes a plurality of RuBee tag detecting devices.", "32. The process according to claim 28, wherein the positioning system is arranged to locate the locatable device by triangulation or trilateration.", "33. The process according to claim 28, further comprising an enclosure having a closure member that can be opened and closed by a user in order to gain access to the enclosure.", "34. The process according to claim 33, wherein the container includes a plurality of storage compartments,", "35. The process according to claim 32, wherein the access control system includes a locking mechanism for controlling access to the inventory items.", "36. The process according to claim 28a, wherein the access control system includes at least one user identification device to enable users log into the access control system.", "37. The process according to claim 36, wherein each user identification device comprises at least one of a swipe card, a chip and pin card, an RFID tag, a RuBee tag, and a proximity device, and wherein the input device comprises a reading device compatible with the user identification.", "38. The process according to claim 37, wherein the locatable device and the identification device are integrated into a single unit.", "39. The process according to claim 35, further comprising providing storage locations for receiving the locatable device.", "40. The process according to claim 39, wherein the monitoring system is arranged to monitor the removal and replacement of the locatable device from the storage locations.", "41. The process according to claim 38, further comprising starting to track the movement of the locatable device in response to receiving signals from the monitoring system that at least one of the locatable devices has been removed from its storage location.", "42. The process according to claim 41, further comprising stopping the tracking of the movement of the locatable device in response to receiving signals from the monitoring system indicating that the locatable device has been returned to its storage location.", "43. The process according to claim 35, further comprising starting to track the movement of the locatable device in response to receiving signals from the access system indicating that the user has logged in.", "44. The process according to claim 35, further comprising starting to track the movement of the locatable device in response to receiving signals from the monitoring system indicating that the user has removed inventory items from the storage locations.", "45. The process according to claim 44, further comprising stopping the tracking of the movement of the locatable device in response to receiving signals from the monitoring system indicating that the user has replaced the inventory items in the storage locations.", "46. The process according to claim 28, wherein the inventory items are tools.", "47. The process according to claim 28, further comprising reviewing the movement of the user in the event of an inventory item being lost."], "paragraphs": [{"key": 10, "content": "Accordingly, certain embodiments seek to provide an inventory control system and process that mitigates at least some of the aforesaid problems, or to at least provide an alternative to known systems and processes."}, {"key": 11, "content": "According to one aspect, there is provided an inventory control system including a plurality of inventory item storage locations, an access system for controlling access to the inventory items, said access system including an input device for entering the identity of a user, a monitoring system for monitoring the removal and replacement of the inventory items from the storage locations, at least one locatable device that is arranged to be carried by a user of the inventory control system and that is locatable by a positioning system, a positioning system arranged to determine the location of the or each locatable device, and a data processing system for recording the removal and replacement of inventory items, the identity of the user of the inventory items and location data received from the positioning system such that the movement of the or each locatable device can be tracked."}, {"key": 12, "content": "Certain embodiments enable the inventory control system to determine, which inventory items a user has removed from the storage locations and to track the movements of the user while he is in possession of the inventory items such that, if a tool is lost, it is possible to retrace the steps of the user from the tracking information recorded to increase the likelihood of the tool being retrieved. This system has particular application to the aerospace industry where lost tools can cause significant damage to aircraft, for example when tools are left in jet engines during routine maintenance. By tracking the movement of the user of the tool this allows the user to retrace his/her steps in order to improve the chances of the tool being found and significantly reducing the amount of time spent looking for the tool. In some instances it may also prevent aircraft from being grounded, which may happen if it is feared that the tool was lost in a vulnerable part of the aircraft."}, {"key": 18, "content": "The monitoring system monitors which tools have been removed from and replaced in the container, and indicates the presence and/or absence of the tools. This makes it easy to assess whether all the tools taken from the container have been returned after use, thus reducing the risk of any tools being inadvertently left behind. Safety in situations such as aircraft engine maintenance is thus significantly improved. Some embodiments also reduce the risk of tools being lost or stolen, since the fact that a tool has gone missing can be indicated immediately. The system also makes it possible to monitor which tools are being taken for any specified task, thereby helping to ensure best practice in maintenance operations."}, {"key": 55, "content": "The input pad 15 can be used to input other data, such as a part number or to select options on a menu system."}]}, {"patent_id": "US 20070194944", "title": "Systems and methods that evaluate distance to potential hazards utilizing overlapping sensing zones", "abstract": "The claimed subject matter provides industrial automation systems and/or methods that evaluate a proximity to potential hazards. A plurality of sensors can provide redundant detected data. Additionally, a proximity evaluation component can evaluate the detected data, determine a location of at least one of a person and an object, and identify a distance from the location to one or more hazardous zones in a monitored region.", "claims": ["1. An industrial automation system that evaluates proximity to potential hazards, comprising:\na plurality of sensors that provide redundant detected data; and\na proximity evaluation component that evaluates the detected data, determines a location of at least one of a person and an object, and identifies a distance from the location to one or more hazardous zones in a monitored region.", "2. The system of claim 1, the plurality of sensors provide redundancy by utilizing overlapping sensing ranges.", "3. The system of claim 1, the plurality of sensors includes one or more of thermal energy sensors, electromagnetic sensors, mechanical sensors, chemical sensors, optical sensors, radiation sensors, acoustic sensors, and biological sensors.", "4. The system of claim 1, the plurality of sensors continuously monitor the monitored region.", "5. The system of claim 1, the plurality of sensors intermittently evaluate the monitored region utilizing at least one of a predetermined time interval and a varying time interval.", "6. The system of claim 1, the plurality of sensors monitor the monitored region upon an occurrence of an event.", "7. The system of claim 1, the plurality of sensors each obtain a two-dimensional image associated with a corresponding section of the monitored region facing a respective one of the plurality of sensors.", "8. The system of claim 1, the plurality of sensors each being associated with a separate, respective proximity evaluation component.", "9. The system of claim 1, the proximity evaluation component continuously evaluates the location and the distance to the one or more hazardous zones.", "10. The system of claim 1, the proximity evaluation component individually analyzes the detected data provided from each of the plurality of sensors.", "11. The system of claim 1, the proximity evaluation component determines whether the distance from the location to any of the hazardous zones is below a threshold.", "12. The system of claim 1, further comprising a location component that obtains the detected data and identifies at least one of a position, an orientation, and a change in location associated with the at least one of the person and the object.", "13. The system of claim 12, the location component analyzes a two-dimensional image obtained from one of the plurality of sensors and identifies disparate shapes other than shapes associated with potential hazards.", "14. The system of claim 1, further comprising a distance analysis component that evaluates a minimum distance between the location and the one or more hazardous zones.", "15. The system of claim 1, further comprising a hazardous zone recognition component that identifies the one or more hazardous zones within the monitored region.", "16. The system of claim 15, the hazardous zone recognition component identifies hazardous zones associated with at least one of a movement of machinery, a temperature, a pressure, and an amount of emitted radiation.", "17. The system of claim 15, the hazardous zone recognition component further comprises a teaching component that evaluates potentially harmful characteristics associated with the monitored region prior to entry into the monitored region by the at least one of the person and the object.", "18. The system of claim 17, the teaching component identifies the one or more hazardous zones by integrating detected motions associated with machinery into an envelope shape for each of the one or more hazardous zones.", "19. The system of claim 15, the hazardous zone recognition component further comprises a definition component that interactively updates at least one of a shape and a contour of the one or more hazardous zones during operation.", "20. The system of claim 1, further comprising a safety logic component that utilizes the distance from the location to the one or more hazardous zones to yield a corresponding response.", "21. The system of claim 20, the safety logic component modifies operation based at least in part upon the distance.", "22. The system of claim 21, the modification being at least one of halting, slowing, speeding up, and restarting operation.", "23. The system of claim 20, the safety logic component combines distance related information associated with the plurality of sensors.", "24. The system of claim 20, the safety logic component further comprises a weighting component that weights distance related information based upon a likelihood of accurate measurement related to each of the plurality of sensors.", "25. The system of claim 20, the safety logic component further comprises a combination component that aggregates distance related information associated with the plurality of sensors.", "26. The system of claim 20, further comprising an optimization component that generates a voting configuration that the safety logic component employs to generate the corresponding response based upon distance related information from the plurality of sensors.", "27. The system of claim 1, further comprising a control component that causes a machine to modify operating parameters based at least in part upon the distance.", "28. The system of claim 1, further comprising an alarm component that provides an alarm based at least in part upon the distance.", "29. A method that facilitates determining a proximity to a potential hazard in an industrial automation environment, comprising:\nredundantly monitoring an industrial automation environment;\nidentifying one or more hazardous zones existent during operation in the environment;\ndetermining a position of at least one of a person and an object in the environment; and\nevaluating a distance from the position of the at least one of the person and the object to the one or more hazardous zones.", "30. The method of claim 29, further comprising obtaining a redundant sense of the environment by utilizing a plurality of sensors.", "31. The method of claim 29, further comprising monitoring areas in the environment in which the at least one of the person and the object one or more of enters, exits, and traverses.", "32. The method of claim 29, further comprising continuously monitoring the environment, continuously identifying the one or more hazardous zones, continuously determining the position, and continuously evaluating the distance.", "33. The method of claim 29, further comprising:\nmonitoring movement of machinery in the environment prior to entry by the at least one of the person and the object; and\nidentifying the one or more hazardous zones by analyzing the movement of the machinery to determine corresponding shapes and contours of the one or more hazardous zones.", "34. The method of claim 29, further comprising updating at least one of a contour and a shape associated with at least one of the one or more identified hazardous zones during runtime.", "35. The method of claim 29, further comprising:\nobtaining a two-dimensional image associated with a section of the environment facing each of a plurality of sensors;\nlocating a shape other than the one or more hazardous zones; and\ndetermining a distance from the location of the shape to the one or more hazardous zones.", "36. The method of claim 29, further comprising identifying a minimum distance from the position to the one or more hazardous zones.", "37. The method of claim 29, further comprising separately evaluating detected data from a plurality of sensors to determine distance related information corresponding to each of the plurality of sensors.", "38. The method of claim 29, further comprising at least one of modifying operation and providing an alarm based upon the determined distance being below a threshold value.", "39. A system that determines a proximity to a potential hazard in an industrial automation environment, comprising:\nmeans for redundantly monitoring a region;\nmeans for identifying a hazardous zone in the region;\nmeans for determining a location of at least one of a person and an object in the region;\nmeans for evaluating a distance from the location of the at least one of the person and the object to the hazardous zone; and\nmeans for providing a response based at least in part upon the distance."], "paragraphs": [{"key": 26, "content": "Turning now to the drawings, FIG. 1 illustrates a system 100 that enables evaluating distance(s) to potential hazard(s) in an industrial automation environment. The system 100 can include any number of sensors 102-104 (e.g., sensor 1 102, . . . sensor N 104, where N can be any positive integer). It is to be appreciated that the sensors 102-104 can be utilized to monitor and/or detect any type of signal and/or physical condition associated with a machine, a person, a process, a product, an environment, etc. The sensors 102-104 can provide the detected data to a proximity evaluation component 106 that can determine a distance to a potential hazard. Thus, by way of illustration, the proximity evaluation component 106 can utilize the detected data from the sensors 102-104 to identify a location at which a person and/or an object can enter into and/or traverse within and/or exit a monitored region. Additionally or alternatively, the proximity evaluation component 106 can determine and/or obtain information (e.g., location related information, . . . ) associated with dangerous zone(s) during operation of a machine, a process, etc. within the region monitored via the sensors 102-104. Moreover, the proximity evaluation component 106 can calculate a distance (e.g., minimum distance, . . . ) between the person and/or the object and any number of dangerous zones. Further, the system 100 can include a safety logic component 108 that can utilize data associated with distance(s) to potential hazard(s) to effectuate modifying operation associated with a machine, process, etc. It is to be appreciated that the data associated with distance(s) to potential hazard(s) can be provided to a disparate component (not shown) to enable further utilization of such information; however, the claimed subject matter is not so limited."}, {"key": 27, "content": "The multiple sensors 102-104 can be utilized to monitor and/or record a two-dimensional image of an environment facing each of the sensors 102-104, for example. The sensors 102-104 can continuously monitor the environment, intermittently evaluate the environment at predetermined and/or varying intervals of time, monitor the environment upon an occurrence of an event (e.g., starting operation, modifying operation, determining a person and/or object entered the monitored region, . . . ), etc. Additionally, the sensors 102-104 can provide redundancy by way of utilizing overlapping sensing ranges associated with each of the sensors 102-104. Thus, for example, any number of the sensors 102-104 can redundantly detect data related to a particular machine, person, object, process, product, environment, etc. The overlap can create redundancy within a sensor system that can be utilized in connection with a control system such as, for instance, a safety system, an availability system, a system that can customize (e.g., optimize) allocation of redundancy (e.g., dynamically during runtime, at a time of setup, . . . ) to provide for a mixture of safety and availability, etc. Pursuant to an example, a person can be traversing through an industrial automation environment (e.g., region monitored with the sensors 102-104, . . . ) and her location can be continuously monitored by any number of disparate sensors (e.g., two, three, . . . N, where N can be any positive integer). Thus, an overlapping view of the location of the person can be obtained; however, the claimed subject matter is not limited to the aforementioned example."}]}] | {"reason": "Regarding Claim 10, the combination of Hardegger and Kogan teaches the safety system of claim 1, wherein the defined safety zone defines a discrete volume of space.", "code": "103"} |
13857544 | 11 | "{\"title\": \"SAFETY SYSTEMS AND METHODS FOR PRODUCTION ENVIRONMENTS\", \"abstract\": \"ABSTRACT Sa(...TRUNCATED) | "[{\"patent_id\": \"US 20110298579\", \"title\": \"DYNAMICALLY ADAPTABLE SAFETY ZONES\", \"abstract\(...TRUNCATED) | "{\"reason\": \"Regarding Claim 11, the combination of Hardegger and Kogan teaches the safety system(...TRUNCATED) |
13857544 | 12 | "{\"title\": \"SAFETY SYSTEMS AND METHODS FOR PRODUCTION ENVIRONMENTS\", \"abstract\": \"ABSTRACT Sa(...TRUNCATED) | "[{\"patent_id\": \"US 20110298579\", \"title\": \"DYNAMICALLY ADAPTABLE SAFETY ZONES\", \"abstract\(...TRUNCATED) | "{\"reason\": \"Regarding Claim 12, the combination of Hardegger and Kogan teaches the safety system(...TRUNCATED) |
13857544 | 13 | "{\"title\": \"SAFETY SYSTEMS AND METHODS FOR PRODUCTION ENVIRONMENTS\", \"abstract\": \"ABSTRACT Sa(...TRUNCATED) | "[{\"patent_id\": \"US 20110298579\", \"title\": \"DYNAMICALLY ADAPTABLE SAFETY ZONES\", \"abstract\(...TRUNCATED) | "{\"reason\": \"Regarding Claim 13, Kogan teaches the safety system of claim 1, further comprising o(...TRUNCATED) |
13857544 | 14 | "{\"title\": \"SAFETY SYSTEMS AND METHODS FOR PRODUCTION ENVIRONMENTS\", \"abstract\": \"ABSTRACT Sa(...TRUNCATED) | "[{\"patent_id\": \"US 20110298579\", \"title\": \"DYNAMICALLY ADAPTABLE SAFETY ZONES\", \"abstract\(...TRUNCATED) | "{\"reason\": \"Regarding Claim 14, Kogan teaches the safety system of claim 13, wherein the safety (...TRUNCATED) |
13857544 | 15 | "{\"title\": \"SAFETY SYSTEMS AND METHODS FOR PRODUCTION ENVIRONMENTS\", \"abstract\": \"ABSTRACT Sa(...TRUNCATED) | "[{\"patent_id\": \"US 20110298579\", \"title\": \"DYNAMICALLY ADAPTABLE SAFETY ZONES\", \"abstract\(...TRUNCATED) | "{\"reason\": \"Regarding Claim 15, Hardegger teaches the safety system of claim 14, wherein the con(...TRUNCATED) |
13857544 | 16 | "{\"title\": \"SAFETY SYSTEMS AND METHODS FOR PRODUCTION ENVIRONMENTS\", \"abstract\": \"ABSTRACT Sa(...TRUNCATED) | "[{\"patent_id\": \"US 20110298579\", \"title\": \"DYNAMICALLY ADAPTABLE SAFETY ZONES\", \"abstract\(...TRUNCATED) | "{\"reason\": \"Regarding Claim 16, Hardegger teaches the safety system of claim 14, wherein the con(...TRUNCATED) |
13857544 | 17 | "{\"title\": \"SAFETY SYSTEMS AND METHODS FOR PRODUCTION ENVIRONMENTS\", \"abstract\": \"ABSTRACT Sa(...TRUNCATED) | "[{\"patent_id\": \"US 20110298579\", \"title\": \"DYNAMICALLY ADAPTABLE SAFETY ZONES\", \"abstract\(...TRUNCATED) | "{\"reason\": \"Regarding Claim 17, Kogan teaches the safety system of claim 13, wherein the one or (...TRUNCATED) |
13857544 | 18 | "{\"title\": \"SAFETY SYSTEMS AND METHODS FOR PRODUCTION ENVIRONMENTS\", \"abstract\": \"ABSTRACT Sa(...TRUNCATED) | "[{\"patent_id\": \"US 20110298579\", \"title\": \"DYNAMICALLY ADAPTABLE SAFETY ZONES\", \"abstract\(...TRUNCATED) | "{\"reason\": \"Regarding Claim 18, the combination of Hardegger, Kogan, and Martin teaches the safe(...TRUNCATED) |
End of preview.
README.md exists but content is empty.
- Downloads last month
- 34