Rock climbing is a popular activity enjoyed both indoors and outdoors. When climbing, for instance, at rock climbing facility, climbers are sometimes monitored by facility staff. However, there may be times when staff members are unable to monitor each climber. In such instances, it is desirable to have a system where a climber's activities may be restricted based on permissions. For instance, a climber may not be permitted to climb above a certain height without specific equipment, or a less experienced climber may not be permitted to enter an advanced climbing area.
Embodiments of the present disclosure enable methods and systems for providing a permissions-based alarm system. Such embodiments may be useful when a user (e.g., a climber) enters a restricted area without permission (e.g., exceeds a defined height on a climbing wall without being connected to a rope or belay mechanism, attempts to use a piece of equipment without permission, enters a particular climbing area, or ascends a wall without a specific level of certification), an alarm may sound to alert the user (and/or facility staff) of a breach of the restricted area. The alarm may sound before the breach occurs, and may continue to sound until the breach has been resolved.
According to one embodiment, a permissions-based alarm system for use in climbing environment comprises an identification device storing a permission setting relating to an aspect of the climbing environment and a detection module in communication with the identification device. The detection module detects the permission setting stored on the identification device and detects proximity of the identification device to an area restricted by the permission setting. When the identification device enters the restricted area of the climbing environment, an alert is provided.
According to another embodiment, a permissions-based method for use in a climbing environment includes receiving a permission setting from an identification device worn by a user of the climbing environment, detecting a permission setting stored on the identification device, detecting proximity of the identification device to an area restricted by the permission setting, and when the identification device enters the restricted area, providing an alert.
According to another embodiment, a permissions-based alarm system for use in climbing environment comprises an identification device configured to store a permission setting; a supplemental device configured to store equipment identification information; and a plurality of climbing zones. Each climbing zone includes a detection module in communication with the identification device and the supplemental device and further comprising: an antenna module configured to detect the permission setting stored on the identification device and, if present, equipment information stored on the supplemental device and further configured to detect proximity of the identification device and the supplemental device to an area restricted by the permission setting; a device reader configured to receive the detected permission setting and equipment information from the antenna module and determine a permission level; and an alarm module configured to provide an alert if the identification device enters the restricted area without permission or if the device reader does receive the equipment information.
Non-limiting and non-exhaustive embodiments are described with reference to the following figures in which:
Various embodiments are described more fully below with reference to the accompanying drawings, which form a part hereof, and which show specific exemplary embodiments. However, embodiments may be implemented in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the embodiments to those skilled in the art. Embodiments may be practiced as methods, systems or devices. The following detailed description is not to be taken in a limiting sense.
The identification device 1 may be a non-contact transmitting device (e.g., a radio frequency identification (RFID) device) capable of storing and wirelessly transmitting data from the device to another component (e.g., a device reader, described in detail below). For instance, in some embodiments, the identification device may be a small form factor device (e.g., a small RF transmitter). The identification device 1 and/or the supplemental device 2 (described in greater detail below) may be externally powered by another device (e.g., a passive RFID tag). For instance, the identification device 1 and/or the supplemental device 2 may receive RF energy from a reader, and may use the received energy to power internal circuitry and respond to interrogations with a unique code. Alternatively, the identification device 1 and/or the supplemental device 2 may be active or semi-active devices, which may use an internal battery for power. Identification device 1 memory may be of any capacity, and may typically range from about 64 bits up to about 4 KB. Identification devices may be read-write until programmed, and read-only once programmed, and may be modified only by facility staff. Identification devices may also be deactivated if needed.
The identification device 1 may be formed from a flexible or rigid material, and may be impervious to human contact. The identification device 1 may be attachable to or wearable by a user. In some embodiments, the identification device 1 may be embedded into a user's equipment or in a standard user access card or device (e.g., a membership card, punch card, etc.). For instance, the identification device 1 may be attached to a user, a bracelet, safety pin, a carabiner, hook and loop material, a harness, embedded in a proximity access card or device, or otherwise fixed the user or the user's clothing or equipment, or in direct proximity to the user.
The identification device 1 may be programmed with user-specific information, including a permissions-level. For instance, continuing with the climbing facility example, in order to gain access to a climbing wall, or an area within a climbing facility that requires special training or equipment, a user would be issued, and be required to carry or wear, an identification device 1 (e.g., a card, badge or tag) to access the area. In some embodiments, a climbing facility may program and issue member or guest identification devices (e.g., at the front desk). Thus, a facility may be equipped with a system for programming the identification cards. Other pre-programmed information specifically relating to the user may include a certification level (e.g., certified to use certain equipment or techniques such as auto-belay, top rope, lead climb, ice climb, etc.) member number, membership status, access privileges (e.g., permission to access climbing area but not weight room) may all be stored on the device. Different types of access may be given to different users. For instance, access may be based on a level of certification, user age, user height, etc.
In some instances the system may include a supplemental device 2 detectable by a component of detection module 20. A supplemental device 2 may include one or more of the features set forth above with respect to the identification device 1. The supplemental device 2 may be attachable to a required piece of equipment, a second form of identification, etc., to provide another level of permission for a user. For instance, a second RF-type device may be embedded or connected to an end of a climbing rope (e.g., a climbing rope controlled by an autobelay device that automatically protects a climber against falls) in use in the facility, or any other type of climbing assistance device. In some embodiments, the supplemental device 2 may be embedded in a textile pouch, permanently or semi-permanently affixed to an object, heat shrunk, or otherwise secured to the object. The supplemental device 2 (e.g., a device employed with a rope or lanyard) may be programmed with data. Such data may include route type (e.g., bouldering, top rope, lead climbing, auto belay climbing, ice climbing, etc.), proximity of a route to an RF field or other route information (e.g., difficulty, the name of the route setter, the date the route was set, wall height, allowable height before an alert is activated, etc.). Such data may further include a replacement or inspection interval of climbing equipment (e.g., a rope, a lanyard, an auto belay device, etc.). Such data may be hand programmed. In instances where replacement or inspection data indicates an issue with the equipment, the detection module 20 may be programmed to prevent access to the area (e.g., by providing an audible alert) until an inspection or re-certification of the equipment has been met. It should be noted that while the device is referred to herein as “supplemental” for ease of reference, the supplemental device 2 may be the only device needed to gain access to an area (e.g., in scenarios where a climber does not need to carry personal identification, but does need to be using certain equipment which has been tagged with an identification device 1).
As set forth above, information stored on the identification device 1 and/or on the supplemental device 2 may be detectable by at least one component of detection module 20 when the identification device 1 is within a certain range of the detection module 20.
An antenna module 9 may register proximity in distance and may be operably connected to the reader 11.
Many climbing walls include some form of visible marking to indicate the height at which climbers are allowed to climb without being connected to a rope, sometimes referred to as the bouldering line or bouldering height. Often the bouldering line is a piece of colored tape that extends across the climbing wall at the bouldering height. In an embodiment, one or more antennas may be incorporated into a tape that is then affixed to the climbing wall at the bouldering height. In this embodiment, one or both ends of the tape could be provided with the electrical connections necessary to operate the different antennas. Other components could also be included in the tape as well as desired. For example, alarms could be built into the tape as well or, alternatively, connectors for connecting the tape at different locations to alarms located along the bouldering height could be provided.
If the antenna module 9 has detected device information and proximity, the information may be transmitted to a reader 11. As indicated above, the detection module 20 may include one or more identification device reader 11 (e.g., an RFID reader or interrogator) operably connected to the antenna module 9.
A separate reader may be positioned at specific access points (e.g., the main entry into a climbing area). Such a reader may be programmed slightly differently (than the height alarm readers), to verify that a user who passes the threshold meets certain criteria. For example, the reader 11 may detect the presence of the required identification device, a certification level, membership status (e.g., late, current, etc.), age, or any other criteria. Additionally, the reader 11 may be linked to a physical access gate (e.g., a turnstile that is locked until access is granted, via, for example, the system described herein). In some instances, the gate access reader 11 may be a combination reader/antenna module. In some embodiments, reader 11 may be a handheld reader or a smart device reader.
If a breach occurs, that is, if one or more devices are detected and based on the information associated with the devices it is determined that an undesired condition is occurring (such as a person is climbing above the bouldering height who is not attached to a climbing rope), as determined by the reader 11, the detection module may provide an audible or visual indication of permission granted or denied via the alarm module 7.
The alarm module 7 may be operably connected to the reader 11 and/or the antenna module 9. The alarm module 7 may also include a battery compartment. The alarm module 7 may provide a local (in close proximity to the user), a universal alert, and/or a targeted personnel alert. Additional functionality of the alarm module 7 may include providing additional visual alerts, such via a strobe or other easily visible light source. For instance, the alarm module 7 may include a plurality of indicators having different colors. One color (e.g., green) may indicate that permission to access a restricted area is granted. Another color (e.g., red) may indicate that permission to access a restricted area is denied (and an alarm may also be activated). Additional colors (e.g., yellow) may be displayed for other events (e.g., low battery).
In some embodiments, the alarm module 7 may be installed as a physical component of a restricted access area (e.g., as a climbing hold of a climbing wall positioned at a pre-established height).
One or more detection module components may be installed on a section of climbing wall, or may be used to allow restricted access to a space (e.g., a weight room). Some or all of the aforementioned components may also be utilized for member check in and to test functionality of identification devices. The detection module 20 may also operate during any season, indoors or outdoors, and may also be weatherproofed appropriately for outdoor use.
As shown in
In some instances, a single zone may include multiple detection modules, which may be in communication with a centralized computing system.
In further embodiments, multiple detection modules may be utilized and may be in communication with a centralized computing system.
The detection module 20 may be connected to a central database to track individual climber data (total climbs per session, collective feet of ascent, etc.) through a variety of different connection methods (hardwire internet, Wi-Fi, LAN, etc.). Custom software may be employed to track gym usage or member usage data. Since a user's identification device 1 may store information specific to a user, system software may track data usable by facility operators in day-to-day operations. For example, the system may track the popularity of particular routes or climbing structures, or the popularity of each route difficulty (to allow management to increase turnover for the most popular grades—or to change routes when they aren't popular). The facility may also track user fitness information (e.g., cumulative feet climbed in a month period), popularity or usage of particular areas, features, or styles of climbing or establish patterns (e.g., establish instances of injuries related to bouldering or auto belay usage). The system may also track compliance (e.g., if a user frequently forgets to tie in, the user may be reprimanded—or otherwise penalized).
Returning to
In some embodiments, all identification devices within a single zone may be on the same frequency. Alternatively, each identification device, or a grouping of identification devices may be set to a specific frequency. Thus, if three chips entered into a field, suggesting one user with permission (e.g., a first climber having an identification device 1 and a rope having an attached supplemental device 2), and one user without permission (e.g., a second climber in the area without at least one device), an alert may be provided.
The alarm module 7 may provide an audible alert of entry into the restricted zone or may send an alert message to central computing system, to facility personnel, or to another designated location to address the breach of the restricted zone. The alarm module 7 may be programmed to provide a localized alert (e.g., an alarm just in front of the climber only), or in a centralized alert (e.g., more than one or all alarms activate simultaneously). Additionally or alternatively, an alarm positioned at a front desk or office may be activated, and may provide detailed of the location of the infraction. In such embodiments, the operational staff may be notified of an infraction, and can deploy personnel to the area of the breach.
Upon receiving the permission setting, the detection module 20 may compare the permission setting associated with the identification device and proximity of the identification device (e.g., identification device 1) to an area restricted by the permission setting in a detection operation 1204. For example, in one embodiment, when an identification device is detected within range of a specific antenna the permission setting associated with the identification device are compared to the required permission setting or settings previous identified by the environment operator as a necessary level for access to the area associated with the antenna. When the permission setting associated with identification device does correspond to previously identified permission settings required to enter the area of the climbing environment, no alarm is generated. In some embodiments, however, all detections and associated permission levels may be stored in a log.
If, however, the detection module 20 detects that the identification device 1 is within a restricted area based on that identification device's permission setting (that is, that the permission setting associated with the identification device is not sufficient for the area being accessed), flow may proceed to alert operation 1206, in which an alert may be provided. As described above, an alert may take many forms and many different types of alerts, local and remote, may be generated simultaneously or over time based on the time that the identification device is detected within the restricted area.
It is contemplated that in addition to the functions described above, other tracking information may be gathered by the alarm system. For example, a facility may track usage of particular climbing features for popularity, or track peak usage and/or breaches during different times of the day. The facility may track route popularity, or track cumulative feet of ascent over a period (e.g., a climbing competition to climb the equivalent of Mount Everest). In addition, the facility may track incidents of injury as compared with styles of climbing (top roped, lead climbing, bouldering or Auto belay climbing). The system may further be utilized to track profitability, member satisfaction, and to generate reports of one or more of the aforementioned statistics. The system may also minimize false alarms. In alternative embodiments, the system may be hard-wired and may comprise a plurality of modules connected (e.g., in series) to accomplish the functionalities described herein.
It is further contemplated that other applications of the permissions-based alarm system are possible. For example, the system may be used construction or mining applications to provide a mechanism for detecting whether workers or miners are connected to a safety lanyard while ascending or descending from a location. The system may also be utilized to protect workers or employees from a localized or non-localized hazard. For example, a worker may be prohibited access to a specific work zone without certain equipment and/or training or certification to gain such access.
The system may further be utilized to prevent equipment from functioning. For example, imagine that an employee who was not certified in operations, or does possess the correct equipment to operate a piece of equipment (forklift, metalworking equipment, industrial manufacturing equipment, etc.). The alarm system may prevent the equipment from being operable unless the operator has a specified RF tag installed (on a safety harness, helmet, etc.), and/or the operator has the correct certification for operations of the specific equipment. In another application, the alarm system may be used to try to prevent unauthorized personnel from entering a restricted area without the proper safety equipment (e.g., respirator, helmet, steel-toed boots, etc.). In this embodiment, each piece of safety equipment may have its own supplement device (with its own equipment-specific information) embedded in or affixed to the equipment and the system may check to verify that all required equipment is present on each user entering the area.
It will be clear that the systems and methods described herein are well adapted to attain the ends and advantages mentioned as well as those inherent therein. Those skilled in the art will recognize that the methods and systems within this specification may be implemented in many manners and as such is not to be limited by the foregoing exemplified embodiments and examples. In other words, functional elements being performed by a single or multiple components and individual functions can be distributed among different components. In this regard, any number of the features of the different embodiments described herein may be combined into one single embodiment and alternate embodiments having fewer than or more than all of the features herein described are possible.
The embodiments described herein are non-limiting examples of a permissions-based alarm system. While various embodiments have been described for purposes of this disclosure, various changes and modifications may be made which are well within the scope of the disclosed methods. Variations of any component or component functionality of the system, or of the method steps are contemplated. Numerous other changes may be made which will readily suggest themselves to those skilled in the art and which are encompassed in the spirit of the disclosure.
The embodiments and functionalities described herein may operate via a multitude of computing systems including, without limitation, wired and wireless computing systems, mobile computing systems (e.g., mobile telephones, netbooks, tablet or slate type computers, and laptop computers). In addition, the embodiments and functionalities described herein may operate over distributed systems (e.g., cloud-based computing systems), where application functionality, memory, data storage and retrieval and various processing functions may be operated remotely from each other over a distributed computing network, such as the Internet or an intranet. User interfaces and information of various types may be displayed via on-board computing device displays or via remote display units associated with one or more computing devices. For example user interfaces and information of various types may be displayed and interacted with on a wall surface onto which user interfaces and information of various types are projected. Interaction with the multitude of computing systems with which embodiments of the invention may be practiced include, keystroke entry, touch screen entry, voice or other audio entry, gesture entry where an associated computing device is equipped with detection (e.g., camera) functionality for capturing and interpreting user gestures for controlling the functionality of the computing device, and the like.
The present application claims the benefit of U.S. Provisional Application Ser. No. 61/790,309 filed Mar. 15, 2013. Said U.S. Provisional Application Ser. No. 61/790,309 filed Mar. 15, 2013 is hereby incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
61790309 | Mar 2013 | US |