The present disclosure generally relates to work machines, and more particularly relates to security systems for work machines.
Work machines in the construction, mining, and agricultural industries comprise components that are expensive and not easily replaced. Such machines include but are not limited to excavators, track-type tractors and the like. Thus, it is vital to provide work machines with security systems to prevent theft and damage from intruders or unauthorized users, especially during off-work hours and at night. An owner/operator may wish to protect a work machine and its components from theft when not in use or operation. The owner/operator of the work machine may also wish to restrict access to certain systems on the work machine.
To address the above concerns, various theft-protection systems have emerged, which attempt to provide theft protection capabilities. In many of these systems, a controller, to which an operator has access, communicates with the work machine, the components, or the systems of the work machine (i.e. ignition system). When the controller detects an unauthorized operator, it may deactivate a system such as the engine or ignition system.
Conventional systems only provide for restricting access to a system of the work machine as an anti-theft security system but fail to activate a deterrent to prevent theft or deter unauthorized access to the work machine. For example, U.S. Pat. No. 7,295,098 discloses a system and method for providing theft protection in a work machine. The security system activates a module to restrict access to operational systems in the work machine such as the ignition system, braking systems, navigation system, and/or other propulsion system. As can be seen, the prior art only provides an anti-theft system that restricts access to parts of the work machine and fails to provide a security system that activates a deterrent mechanism to prevent theft and damage to the work machine and its components.
It can therefore be seen that a need exists for a security system in a work machine that activates deterrents to prevent theft and deter access to the work machine and its components by unauthorized persons.
In accordance with one aspect of the disclosure, a work machine comprising a frame, a battery, a ground engaging element supporting the frame; and a security system configured to activate an at least one anti-theft deterrent when an unauthorized person is detected in a detection zone around the work machine is disclosed.
In accordance with another aspect of the disclosure, a security system for a work machine is disclosed. The security system comprises: a battery; a plurality of cameras; a plurality of sensors; a controller, the controller connected to an at least one anti-theft deterrent in the work machine; and the controller is configured to activate the at least one anti-theft deterrent when the plurality of cameras or the plurality of sensors detect an unauthorized person within a detection zone.
In accordance with another aspect of the disclosure, a method for deterring theft in a work machine is disclosed. The method comprises: providing a frame, a ground engaging element supporting the frame, an engine, a battery operatively mounted to the engine, a controller, a plurality of imaging devices, a plurality of sensors, and a security system for deterring theft in the work machine; activating the security system in the work machine; monitoring, by the security system via the plurality of imaging devices and plurality of sensors, for persons approaching the work machine; detecting an unauthorized person; activating at least one anti-theft deterrent.
These and other aspects and features of the present disclosure will be better understood upon reading the following detailed description when read in conjunction with the accompanying drawings.
The figures depict one embodiment of the presented invention for purposes of illustration only. One skilled in the art will readily recognize from the following discussion that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles described herein.
Referring now to the drawings, and with specific reference to the depicted example, a work machine 100 is shown, illustrated as an exemplary excavator. Excavators are heavy equipment designed to move earth material from the ground or landscape at a dig site in the construction and agricultural industries. While the following detailed description describes an exemplary aspect in connection with the excavator, it should be appreciated that the description applies equally to the use of the present disclosure in other work machines including but not limited to backhoes, front-end loaders, skid steers, wheel loaders, and tractors, as well.
Referring now to
As illustrated in one embodiment, the work machine 100 further includes a plurality of imaging devices 114 and a plurality of sensors 116 for monitoring a detection zone 118 around the work machine 100. The detection zone 118 may be 360-degree coverage and have a radial detection distance 120 around the work machine 100. As an example, the radial detection distance 120 may be up to 16 meters around the work machine 100, in one exemplary embodiment. The detection zone 118 may also be a smaller coverage around the work machine 100 such as 180-degree or 270-degree coverage.
Now referring to
An operator may use the display interface 112 to activate or deactivate the security system 200. When activated, the security system 200 will send a signal to the on-board controller 202 to activate the anti-theft deterrents 204 when a person is detected by the plurality of imaging devices 114 and/or the plurality of sensors 116.
The on-board controller 202 may be connected to an off-board controller 208. The on-board controller 202 and the off-board controller 208 may communicate with each other through an off-board network 210. Furthermore, a mobile remote 212 may be connected to the off-board network 210 for controlling the security system 200 remotely. The mobile remote 212 may be a computer, laptop, mobile phone, tablet, or the like, that may access the off-board network 210 through a website, url, app, or the like, as generally known in the arts.
The on-board controller 202 in the work machine 100 may control operational systems 214 associated with the work machine 100. The operational systems 214 may be one of many operating systems found within a work machine 100 such as an ignition system, a fuel injection system, an oil transport system, a transmission, a throttle system, a power system, a braking system, a cooling system, a navigation system, a lighting system, an alarm system, a battery system, and/or an engine or other propulsion system, as generally known in the arts. These systems may also include one or more hydraulic, mechanical, electronic, and software-based components in which the on-board controller 202 may communicate with and control, as generally known in the arts. The mobile remote 212 may be used to communicate with the on-board controller 202, via the off-board network 210 and/or the off-board controller 208, to control, activate, or deactivate the operational systems 214 and the anti-theft deterrents 204 within the work machine 100.
The security system 200 is normally activated when the work machine 100 is no longer in use by the owner or operator so that the security system 200 deters theft while the owner/operator is away. When the work machine 100 is turned off and the security system 200 is activated, the security system 200 is powered by a battery 206 provided in or connected to the work machine 100. The security system 200 will operate and monitor the work machine 100, as long as power from the battery 206 is provided. The battery 206 may provide power for at least 10 hours in a single use or single charge.
The security system 200 is further connected to the plurality of imaging devices 114 and the plurality of sensors 116. The security system 200 uses the plurality of imaging devices 114 and the plurality of sensors 116 to monitor the work machine 100 and activate the anti-theft deterrents 204 when a person is detected within the detection zone 118. In one embodiment, there may be four imaging devices 114 provided on the work machine 100 and connected to the security system 200. The plurality of imaging devices 114 may include stereo cameras, smart cameras, monocular cameras, wired ethernet cameras with high compute FPGA, or smart vision systems having a dedicated processor onboard, including video processing acceleration provided by Field Programmable Gate array (FPGA), digital signal processor (DSP), general purpose graphics processing unit (GP-GPU), or any other suitable microprocessor with supporting application software, capable of detecting persons within the detection zone 118 from images or real-time videos. The processing of images and real-time videos may occur within a processor provided in the plurality of imaging devices 114, a nearby control module provided in the work machine 100, or via an off-board the work machine 100 via cloud computing, back office computing, and the like, as generally known in the arts.
The plurality of sensors 116 may includes proximity sensors that generally detect a person or object upon entering the detection zone 118. The plurality of sensors 116 may also include ultrasonic sensors which may use high frequency sound waves or RADAR sensors that use RF to determine if an object has been detected in its field of view. A variety of possible proximity sensors, LIDAR sensors, inertial measurement unit (IMU) sensors, ultrasonic sensors, and the like may be used. IMU sensors may also be utilized for detecting movement of the work machine 100. There are a number of different ways for the plurality of sensors 116, generally, and the individual sensors, specifically, to be constructed and/or mounted to the work machine 100, the frame 102, the cab 108, and the working mechanism 110, or other portions of the work machine 100. This may depend, in part, on the design and assembly of the work machine 100. Generally, the plurality of sensors 116 range in complexity from simplistic proximity devices to more complicated devices which include their own onboard computer processors, wired or wireless technology, memory, and the communication adapters. The work machine 100 may use the plurality of sensors 116 for detecting an unauthorized person within the detection zone 118 and alert the security system 200 to activate the anti-theft deterrents 204, via the off-board controller 202.
The plurality of imaging devices 114 and the plurality of sensors 116 may function to record, store, and report information to the on-board controller 202, the off-board controller 208, and/or the off-board network 210. Any given sensor 116 or imaging device 114 may record or append a time stamp of recorded data for when the data was recorded. Data collected by the plurality of imaging devices 114 and the plurality of sensors 116 is communicated to the on-board controller 202, the off-board controller 208, and off-board network 210 to assist in providing data to the mobile remote 212 for remote accessibility of the data from the security system 200.
The anti-theft deterrents 204 may consist of a variety of deterrents that may be activated by the security system 200. The anti-theft deterrents 204 may be a lighting deterrent, an audible deterrent, an engine deterrent, an imaging deterrent, or an alert deterrent. The anti-theft deterrents 204 may be provided in the work machine 100 or exist in one of the operational systems 214 provided within the work machine 100.
Referring the
The engine auto-start 302, may be connected to the on-board controller 202, the battery 206, the engine 106, and the battery monitor 300. When the remaining life of the battery 206 falls below a warning threshold, the on-board controller 202 will alert the engine auto-start 302 and activate the engine 106 to provide power in the work machine 100 and recharge the battery 206, as generally known in the arts. The engine 106 may be requested to start when the battery 206 voltage reaches a configurable warning threshold. The engine auto-start 302 may have a variety of triggers for activation such as a sub-system for tending the battery 206, monitoring temperature and pressure, pre-determined conditions such as the temperature of oil and fluids, remote auto-start activation, or the like, as generally known in the arts.
The engine auto-start 302 allows the security system 200 to continue monitoring the work machine 100 for extended periods of time beyond a single charge of the battery 206 because the engine auto-start 302 activates the engine 106 to recharge the battery 206. For example, the battery 206 may have a life of 12 hours and the battery monitor 300 may alert the on-board controller 202 when the life of the battery 206 reduces to below 1-hour remaining, to activate the engine auto-start 302 to continue powering the security system 200 and recharge the battery 206 for extended anti-theft deterrence. The frequency of replacing the battery 206 is reduced by using the battery monitor 300 and an engine auto-start 302 with the security system 200 in the work machine 100.
Referring to
Referring now to
Referring now to
When the security system 200 is not enabled the power relay for the security system 200 remains opened, in a system block 706. If the prompt on the display interface 112 is not selected, the display interface 112 may timeout and the power relay will remain open. When the security system 200 is enabled, the power relay for the security system 200 is kept closed, in a system block 708.
In a system block 710, the security system 200 is active and monitoring coverage around the work machine 100 in the detection zone 118. When the security system 200 is activated it may communicate to the on-board controller 202 to initially activate the theft mode lighting 608 for a short period of time, in a system block 712. For example, the theft mode lighting 608 may be a solid green light for 10 seconds after arming and activating the security system 200. This allows an operator to know the security system 200 has been activated when exiting the work machine 100 after activating the security system 200 from the cab 108. It also allows the operator to exit the detection zone 118 within the allotted time without triggering the security system 200 to activate the anti-theft deterrents 204.
In system block 710, the security system 200 will remain monitoring 360-degree coverage around the work machine 100 by using the plurality of imaging devices 114 and the plurality of sensors 116 for detecting unauthorized persons approaching the work machine 100 in the detection zone 118. When the security system 200 detects a person, in activation step 602, the security system 200 may detect the person in the caution zone 500 or the critical zone 502 within the detection zone 118. The security system 200 may be configured to activate a variety of anti-theft deterrents 204 whether a person is detected in the caution zone 500, in activation step 604, or whether the person is detected in the critical zone 502, in activation step 606. When the security system 200 detects a person in the caution zone 500, in activation step 604, then the security system 200 may activate a theft mode lighting 608 or a perimeter lighting 610. The theft mode lighting 608 may be a steady green light, or the like, for deterring theft. Perimeter lighting 610 may be configurable to a timer to automatically turn on/off.
When the security system 200 detects a person in the critical zone 502, in activation step 606, the security system 200 may activate an alert beacon light 612, an audible alarm 614, a video feed log 616, or send alert data 618. The alert beacon light 612 may be a yellow rotating light typically found on mobile equipment, such as police vehicles and ambulances, as generally known in the arts. When activating alert data 618, the alert data 618 may be communicated to the off-board controller 208 and the mobile remote 212 to alert the owner/operator of the work machine 100. The alert data 618 may immediately be transmitted to the mobile remote 212 when the security system 200 detects a person in the caution zone 500 or the critical zone 502. Alert data 618 may include machine serial numbers, time, date, gps, duration, number of detections, corresponding video links for recorded and real-time video feed log 616, and the like.
The battery 206, which powers the security system 200 and work machine 100 when the work machine 100 is turned off, may be connected to the battery monitor 300 so that the voltage of the battery 206 is continuously monitored, in a system block 714. When the battery monitor 300 detects the voltage of the battery 206 reaches a configurable warning threshold, the battery monitor 300 will request the engine 106 to activate via the engine auto-start 302. The battery monitor 300 may communicate with the on-board controller 202 to request the engine 106 to start. The mobile remote 212 may also be used to communicate to the on-board controller 202, via the off-board controller 208 and off-board network 210, to start the engine 106 by using the engine auto-start 302 feature. In a system block 716, the engine auto-start 302, requested by the battery monitor 300, starts the engine 106 and charges the battery 206.
The owner/operator may also disable the security system 200, in a system block 718. The owner/operator may disable the security system 200 by using the display interface 112 in the cab 108. The security system 200 may also recognize an authorized person approaching the work machine 100, whereby the anti-theft deterrents 204 are not activated to allow the authorized person to enter the cab 108 and disable the security system 200. For example, the security system 200 may recognize a unique ID included in a smart key, whereby the on-board controller 202 may compare the unique ID with a stored unique ID to generate an authentication signal to avoid activating the anti-theft deterrents 204. The security system 200 may also be deactivated by authorized users via a message to the on-board controller 202 from a mobile app or via a back office connected via wireless network. The message to the work machine 100 may be an instant command to deactivate or it may deactivate at a specified time. The mobile app may act like a smart key whereby when the user approaches the work machine 100 close enough for a mobile phone to communicate the user ID with the work machine 100 for deactivation. Deactivation schedules may be implemented into the on-board controller 202 or off-board controller 210 for deactivating the security system 200 when they have their operators dispatched for their daily assignments. The owner/operator may also utilize the mobile remote 212 to disable the security system 200. In some situations, an owner/operator may attempt to access the work machine 100 while the security system 200 is enabled causing the anti-theft deterrents 204 to trigger and become activated when entering the detection zone 118. The owner/operator, or other personnel, may deactivate the anti-theft deterrents 204 by accessing the cab 108 of the work machine 100 and entering a pin, code, or other operator login on the display interface 112 to deactivate the anti-theft deterrents 204 and disable the security system 200.
When the security system 200 is disabled, in system block 718, the work machine 100 may deactivate the anti-theft deterrents 204, in a system block 720. Additionally, the work machine 100 may begin a graceful shutdown 722. The graceful shutdown 722 may begin when the security system 200 is disabled or when the battery monitor 300 detects a configurable critical threshold of the remaining voltage in the battery 206. The graceful shutdown 722 allows the security system 200 and on-board controller 202 to complete processing the transmission of info or data collected during coverage monitoring by the plurality of imaging devices 114 and the plurality of sensors 116. The graceful shutdown 722 helps avoids corruption of data transmission to the off-board network 210 when, for example, the power source to the security system 200 immediately ceases. The graceful shutdown 722 will begin prior to the termination of power from the battery 206 and/or engine 106 so that the on-board controller 202 may have sufficient time to transmit data collected by the security system 200 to the off-board network 210, to be stored in cloud computing networks, or the like, as generally known in the arts. When the security system 200 is disabled, the power relay for the security system 200 remains opened, as shown in system block 706
In operation, the present disclosure may find applicability in many industries including, but not limited to, the construction, earth-moving, mining, and agricultural industries. Specifically, the technology of the present disclosure may be used for deterring theft in work machines including, but not limited to, excavators, backhoes, skid steers, wheel loaders, tractors, and the like, comprising valuable and critical components, systems, work tools, and the like. While the foregoing detailed description is made with specific reference to excavators, it is to be understood that its teachings may also be applied onto the other work machines such as backhoes, skid steers, wheel loaders, tractors, mulchers, and the like.
Now referring to
In a step 804, the security system 200 in the work machine 100 is activated. In a step 806, the security system 200 monitors for persons approaching the machine. In a step 808, the security system 200 detects a person in the detection zone 118. In a step 808, at least one deterrent is activated. The anti-theft deterrent may be an audible deterrent, a lighting deterrent, and an imaging deterrent. The audible deterrents may be activating a horn, alarm, engine 106, and/or the like, to deter a potential thief. The lighting deterrent may be an activation of the theft mode lighting 608, the perimeter lighting 608, the alert beacon light 612, and/or the like. The imaging deterrent may be camera flashing, video recording, and/or logging real-time video feed.
The method 800 may further consist of capturing an image of a person approaching the machine and storing the image, alerting a central location by communicating with the off-board controller 208.
When the life of the battery 206 falls below a warning threshold, such as when the voltage or life of the battery 206 is low, the engine auto-start 302 may activate the engine 106 in the work machine 100. The method 800 may further consist of activating a control module to restrict access to the operational systems 214 in the work machine 100.
From the foregoing, it can be seen that the technology disclosed herein has industrial applicability in a variety of settings such as, but not limited to, activating a deterrent for deterring a potential theft of the work machine 100 and its components.
Number | Name | Date | Kind |
---|---|---|---|
4600356 | Bridges | Jul 1986 | A |
5198800 | Tozawa | Mar 1993 | A |
5490081 | Kuromoto | Feb 1996 | A |
5711391 | Brandt | Jan 1998 | A |
6072396 | Gaukel | Jun 2000 | A |
6186260 | Schenck | Feb 2001 | B1 |
6226902 | Heyne | May 2001 | B1 |
6577909 | McGowan | Jun 2003 | B1 |
6629050 | Modgil | Sep 2003 | B2 |
7103545 | Furuta | Sep 2006 | B2 |
7283903 | Merten | Oct 2007 | B2 |
7295098 | Betts, Jr. | Nov 2007 | B2 |
7342486 | Tsukada | Mar 2008 | B2 |
7743865 | Brunner | Jun 2010 | B2 |
7899597 | Vitale | Mar 2011 | B2 |
8016074 | Black | Sep 2011 | B2 |
8248263 | Shervey | Aug 2012 | B2 |
8346512 | McAree | Jan 2013 | B2 |
8437920 | Hobenshield | May 2013 | B2 |
8700246 | Kurikuma | Apr 2014 | B2 |
8768583 | Hargrave, Jr. | Jul 2014 | B2 |
8773286 | Friend | Jul 2014 | B1 |
8810210 | Yokoyama | Aug 2014 | B2 |
8880302 | Tachibana | Nov 2014 | B1 |
8917292 | Gotou | Dec 2014 | B2 |
9030332 | Tafazoli Bilandi | May 2015 | B2 |
9080311 | Yoshida | Jul 2015 | B2 |
9133602 | Ooki | Sep 2015 | B2 |
9133604 | Kodaka | Sep 2015 | B2 |
9206588 | Wu | Dec 2015 | B2 |
9249556 | Magaki | Feb 2016 | B2 |
9457715 | Mitsuta | Oct 2016 | B2 |
9457718 | Husted | Oct 2016 | B2 |
9587380 | Matsumoto | Mar 2017 | B2 |
9598036 | Lim | Mar 2017 | B2 |
9657458 | Hutchinson | May 2017 | B2 |
9695024 | Herauf | Jul 2017 | B2 |
9695982 | Rivet | Jul 2017 | B2 |
9715015 | Izumikawa | Jul 2017 | B2 |
9776566 | Ishimoto | Oct 2017 | B2 |
9836938 | Kiyota | Dec 2017 | B2 |
9911320 | Franz | Mar 2018 | B2 |
9975472 | Wadell | May 2018 | B2 |
9975522 | Nakamura | May 2018 | B2 |
9990543 | Fukuda | Jun 2018 | B2 |
9995232 | Khafagy | Jun 2018 | B2 |
10100497 | Izumikawa | Oct 2018 | B2 |
10323386 | Kiyota | Jun 2019 | B2 |
10380473 | Manci | Aug 2019 | B2 |
10507793 | De Moura Partika | Dec 2019 | B1 |
10527731 | Kinoshita | Jan 2020 | B2 |
10544567 | Petrany | Jan 2020 | B2 |
10697152 | Izumikawa | Jun 2020 | B2 |
10794046 | Imura | Oct 2020 | B2 |
10915308 | Mori | Feb 2021 | B2 |
10927528 | Morimoto | Feb 2021 | B2 |
10967834 | Kinugawa | Apr 2021 | B2 |
11015319 | Izumikawa | May 2021 | B2 |
11149406 | Doi | Oct 2021 | B2 |
11292700 | Lyngbäck | Apr 2022 | B2 |
11320830 | Moorehead | May 2022 | B2 |
11365527 | Kiyota | Jun 2022 | B2 |
11479945 | Yamamoto | Oct 2022 | B2 |
11501619 | Cherney | Nov 2022 | B2 |
11532221 | Rogan | Dec 2022 | B1 |
11624214 | Elangovan | Apr 2023 | B2 |
11697920 | Kiyota | Jul 2023 | B2 |
11781290 | Kurokawa | Oct 2023 | B2 |
20100036645 | McAree | Feb 2010 | A1 |
20120327261 | Tafazoli Bilandi | Dec 2012 | A1 |
20130088593 | Ishimoto | Apr 2013 | A1 |
20140354813 | Ishimoto | Dec 2014 | A1 |
20150077281 | Taniguchi et al. | Mar 2015 | A1 |
20150175071 | Ishimoto | Jun 2015 | A1 |
20150240454 | Yogita | Aug 2015 | A1 |
20160200252 | Oota | Jul 2016 | A1 |
20160202351 | Uotsu | Jul 2016 | A1 |
20160311401 | Altawil | Oct 2016 | A1 |
20170028919 | Izumikawa | Feb 2017 | A1 |
20170073935 | Friend | Mar 2017 | A1 |
20170107692 | Robertson | Apr 2017 | A1 |
20170298595 | Machida | Oct 2017 | A1 |
20170305018 | Machida | Oct 2017 | A1 |
20180072269 | Tong | Mar 2018 | A1 |
20180122218 | Shanley | May 2018 | A1 |
20180258616 | Kiyota | Sep 2018 | A1 |
20180274206 | Kozui | Sep 2018 | A1 |
20190061687 | Khalil | Feb 2019 | A1 |
20190170879 | Kinoshita | Jun 2019 | A1 |
20190237987 | Martell | Aug 2019 | A1 |
20200399863 | Aizawa | Dec 2020 | A1 |
20220153232 | Gallagher | May 2022 | A1 |
20220154431 | Kurosawa | May 2022 | A1 |
20220219954 | Teranishi | Jul 2022 | A1 |
20220314931 | Yates | Oct 2022 | A1 |
20220397897 | Pandita | Dec 2022 | A1 |
20230083504 | Burns | Mar 2023 | A1 |
20230111327 | Ling | Apr 2023 | A1 |
20230278526 | Broadnax | Sep 2023 | A1 |
20230339429 | Maley | Oct 2023 | A1 |
Number | Date | Country |
---|---|---|
115071495 | Sep 2022 | CN |
2005267568 | Sep 2005 | JP |
2011046319 | Mar 2011 | JP |
4794617 | Oct 2011 | JP |
5117448 | Jan 2013 | JP |
100786698 | Dec 2007 | KR |
101219131 | Jan 2013 | KR |
Entry |
---|
Written Opinion and International Search Report for Int'l. Patent Appln. No.PCT/US2024/010389, mailed May 8, 2024 (25 pgs). |
Number | Date | Country | |
---|---|---|---|
20240246510 A1 | Jul 2024 | US |