The present disclosure relates generally to the field of waste collection, and particularly to techniques for requesting and controlling access to waste collection points by using a mobile user device.
Pneumatic waste conveying systems are characterized by that wastes (e.g., household wastes) are conveyed therein through pipelines by means of air suction (or, in other words, by creating a pressure difference in the pipelines). This allows the wastes to be conveyed over long distances through the pipelines. Such systems are currently being used in different facilities, such as multi-dwelling units, shopping malls, etc.
A pneumatic waste conveying system typically comprises a number of waste collection points (also referred to as feed-in stations in the art), each of which comprises a plurality of input containers (also referred to as inlets or input points in the art). Each of the plurality of input containers may be connected to a system of pipelines. By opening and closing a shut-off means (e.g. a valve means) or by adjusting the intake of make-up air (also referred as replacement air) with a make-up air shut-off means and performing suction from a partial vacuum generator of the waste conveying system, it is possible to feed the wastes from the corresponding input container(s) to the system of pipelines, thereby emptying the input container(s). The system of pipelines may connect the waste collection points to a destination point, for example, a waste treatment station or plant where the wastes may be treated (e.g., recycled, if possible).
To receive the wastes, the input containers are provided with hatches. Today, the hatches of the input containers of the waste collection point are opened either mechanically by hand, or at the push of a button, or by using Radio Frequency Identification (RFID). Of these, only the RFID allows one to perform the touchless opening of the hatches. However, the RFID does not provide efficient access management for the waste collection point.
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features of the present disclosure, nor is it intended to be used to limit the scope of the present disclosure.
It is an objective of the present disclosure to provide a technical solution that allows an authorized user to gain access to a waste collection point by using his/her mobile user device.
The objective above is achieved by the features of the independent claims in the appended claims. Further embodiments and examples are apparent from the dependent claims, the detailed description and the accompanying drawings.
According to a first aspect, a mobile user device for requesting access to a waste collection point is provided. The waste collection point comprises at least one waste container and at least one hatch (or lock) connected to the at least one waste container. The mobile user device comprises a memory unit and a processing unit coupled to the memory unit. The memory unit is configured to store processor-executable instructions and a user identifier (ID). The user ID is granted permanent or temporary access rights to the at least one hatch connected to the at least one container of the waste collection point. Being executed by the processing unit, the processor-executable instructions cause the processing unit to:
The at least one access request comprises the user ID and the indication of the at least one waste container to be accessed. The mobile user device according to the first aspect allows the hatch(es) of the waste container(s) to be unlocked or opened only for an authorized user, thereby providing efficient access management for the waste collection point.
In one embodiment of the first aspect, the indication of the at least one waste container to be accessed comprises at least one type of waste or at least one ID of the at least one waste container to be accessed. By using such an indication in the user input, it is possible to grant access only to one or more waste containers storing one or more desired types of waste, thereby increasing the efficiency of access management for the waste collection point.
In one embodiment of the first aspect, the mobile user device further comprises a touch screen having buttons provided thereon. In this embodiment, the processing unit is configured to perform operation (a) via the buttons of the touch screen. This may allow operation (a) to be performed more easily and efficiently.
In one alternative embodiment of the first aspect, the mobile user device further comprises a camera. In this embodiment, the processing unit is configured to perform operation (a) by causing the camera to read a Quick Response (QR) code. This may allow operation (a) to be performed more easily and efficiently.
In one more alternative embodiment of the first aspect, the mobile user device further comprises a short-range wireless communication unit. In this embodiment, the processing unit is configured to perform operation (a) by causing the short-range wireless communication unit to read a Near Field Communication (NFC) tag. This may allow operation (a) to be performed more easily and efficiently.
In one embodiment of the first aspect, the processing unit is further configured to perform operation (b) by using at least one of Global Positioning System (GPS) signals, short-range wireless signals broadcasted by a beacon (e.g., a Bluetooth Low Energy (BLE) beacon) of the waste collection point, a QR code provided in the waste collection point, and an NFC tag provided in the waste collection point. This provides a variety of detection ways, thereby making the mobile user device according to the first aspect more flexible in use.
In one embodiment of the first aspect, the processing unit is configured to perform operation (c) by using short-range wireless communications (e.g., BLE) and/or over Internet. This may make the mobile user device according to the first aspect more flexible in use.
In one embodiment of the first aspect, the processing unit is further configured, before operation (c), to encrypt the at least one access request with a cryptographic protocol (e.g., e.g. Advanced Encryption Standard (AES) or Transport Layer Security (TLS) protocols to prevent eavesdropping and replay attacks). This may ensure secured access to the waste container(s) of the waste collection point.
In one embodiment of the first aspect, the processing unit is further configured to receive statistics from the access control system and output the statistics to a user of the mobile user device. The statistics may be based on a number of times the access to the at least one waste container of the waste collection point has been requested by the mobile user device for a predefined period of time. The statistics provides feedback to the user of the mobile user device, so that the user may have an idea about how he/she uses the waste collection point (e.g., whether a rest waste container (i.e. a mixed waste container) is used frequently or not; if yes, the user may focus more on sorting out rest waste to reduce its fraction in the whole amount of wastes placed by the user in the waste collection point for the predefining period of time).
In one embodiment of the first aspect, each of the at least one waste container of the waste collection point comprises a sensor for sensing a presence of infeed waste in the at least one waste container. In this embodiment, the statistics received by the processing unit of the mobile user device is additionally based on sensing signals from the sensor of each of the at least one waste container of the waste collection point. By using the sensing signals, it is possible to obtain more accurate statistical data about the usage of the waste collection point.
According to a second aspect, a method for requesting access to a waste collection point is provided. The waste collection point comprises at least one waste container and at least one hatch connected to the at least one waste container. The method comprises:
The at least one access request comprises a user ID associated with the mobile user device and the indication of the at least one container to be accessed. The user ID is granted permanent or temporary access rights to the at least one hatch of the at least one waste container of the waste collection point. By using the method according to the second aspect, it is possible to unlock or open the hatch(es) of the waste container(s) only for an authorized user, thereby providing efficient access management for the waste collection point.
In one embodiment of the second aspect, the indication of the at least one waste container to be accessed comprises at least one type of waste or at least one ID of the at least one waste container to be accessed. By using such an indication in the user input, it is possible to grant access only to one or more waste containers storing one or more desired types of waste, thereby increasing the efficiency of access management for the waste collection point.
In one embodiment of the second aspect, the mobile user device further comprises a touch screen having buttons provided thereon. In this embodiment, step (a) is performed by pressing the buttons of the touch screen. This may allow step (a) to be performed more easily and efficiently.
In one alternative embodiment of the second aspect, the mobile user device further comprises a camera. In this embodiment, step (a) is performed by causing the camera to read a QR code. This may allow step (a) to be performed more easily and efficiently.
In one more alternative embodiment of the second aspect, the mobile user device further comprises a short-range wireless communication unit. In this embodiment, step (a) is performed by causing the short-range wireless communication unit to read an NFC tag. This may allow step (a) to be performed more easily and efficiently.
In one embodiment of the second aspect, step (b) is performed by using at least one of GPS signals, short-range wireless signals broadcasted by a beacon (e.g., a BLE beacon) of the waste collection point, a QR code provided in the waste collection point, and an NFC tag provided in the waste collection point. This provides a variety of detection ways, thereby making the method according the second aspect more flexible in use.
In one embodiment of the second aspect, step (c) is performed by using short-range wireless communications (e.g., BLE) and/or over Internet. This may make the method according to the second aspect more flexible in use.
In one embodiment of the second aspect, the method further comprises, before step (c), the step of encrypting the at least one access request with a cryptographic protocol (e.g., e.g. AES or TLS protocols to prevent eavesdropping and replay attacks). This may ensure secured access to the waste container(s) of the waste collection point.
In one embodiment of the second aspect, the method further comprises the steps of receiving, in the mobile user device, statistics from the access control system and outputting the statistics to a user of the mobile user device. The statistics may be based on a number of times the access to the at least one waste container of the waste collection point has been requested by the mobile user device for a predefined period of time. The statistics provides a feedback to the user of the mobile user device, so that the user may have an idea about how he/she uses the waste collection point (e.g., whether a rest waste container (i.e. a mixed waste container) is used frequently or not; if yes, the user may focus more on sorting out rest waste to reduce its fraction in the whole amount of wastes placed by the user in the waste collection point for the predefined period of time).
In one embodiment of the second aspect, each of the at least one waste container of the waste collection point comprises a sensor for sensing a presence of infeed waste in the at least one waste container. In this embodiment, the statistics received by the mobile user device is additionally based on sensing signals from the sensor of each of the at least one waste container of the waste collection point. By using the sensing signals, it is possible to obtain more accurate statistical data about the usage of the waste collection point.
According to a third aspect, an access control system for controlling access to a waste collection point is provided. The waste collection point comprises at least one waste container and at least one hatch connected to the at least one waste container. The access control system comprises a memory unit and a processing unit coupled to the memory unit. The memory unit is configured to store processor-executable instructions, as well as a database. The database comprises user IDs that are granted permanent or temporary access rights to the at least one hatch connected to the at least one waste container of the waste collection point. Being executed by the processing unit, the processor-executable instruction causes the processing unit to:
The control signal instructs the waste collection point to unlock or open the at least one hatch connected to the at least one waste container to be accessed. The system according to the third aspect allows the hatch(es) of the waste container(s) to be unlocked or opened only for an authorized user, thereby providing efficient access management for the waste collection point.
Other features and advantages of the present disclosure will be apparent upon reading the following detailed description and reviewing the accompanying drawings.
The present disclosure is explained below with reference to the accompanying drawings in which:
Various embodiments of the present disclosure are further described in more detail with reference to the accompanying drawings. However, the present disclosure may be embodied in many other forms and should not be construed as limited to any certain structure or function discussed in the following description. In contrast, these embodiments are provided to make the description of the present disclosure detailed and complete.
According to the detailed description, it will be apparent to the ones skilled in the art that the scope of the present disclosure encompasses any embodiment thereof, which is disclosed herein, irrespective of whether this embodiment is implemented independently or in concert with any other embodiment of the present disclosure. For example, the devices, systems, and/or methods disclosed herein may be implemented in practice using any numbers of the embodiments provided herein. Furthermore, it should be understood that any embodiment of the present disclosure may be implemented using one or more of the elements presented in the appended claims.
The word “exemplary” is used herein in the meaning of “used as an illustration”. Unless otherwise stated, any embodiment described herein as “exemplary” should not be construed as preferred or having an advantage over other embodiments.
As noted earlier, a user (e.g., a tenant, resident, etc.) may currently open hatches of waste containers in a desired waste collection point either mechanically by hand, or at the push of an activation button provided on each of the waste containers, or by using a RFID technology. Of these, the RFID technology is of particular interest, since it allows the user to open the hatches without having to touch them (i.e. it is enough to show or apply a RFID tag to a RFID reader installed in the waste collection point). However, the RFID technology does not provide efficient access management for the waste collection point. Furthermore, the user should always have a separate RFID tag at hand to gain access to the waste collection point.
The exemplary embodiments disclosed herein provide a technical solution that allows mitigating or even eliminating the above-sounded drawbacks peculiar to the prior art. In particular, the technical solution disclosed herein involves using a mobile user device to gain access to a desired waste collection point. The mobile user device is initially provided with a user ID that is granted permanent or temporary access rights to one or more hatches connected to the waste containers of the waste collection point. By using the user ID and a user input that comprises an indication of one or more of the waste containers to be accessed in the waste collection point at a given time instant, the mobile user device sends an access request to an access control system. In response to the access request, the control access system unlocks or opens the hatch(es) of the waste container(s) to be accessed when the mobile user device is in the vicinity of the waste collection point. By so doing, it is possible to provide efficient access management for the waste collection point.
As used in the embodiments disclosed herein, the mobile user device may refer to a mobile terminal, a mobile phone, a cellular phone, a smart phone, a cordless phone, a personal digital assistant (PDA), a wireless communication device, a laptop computer, a tablet computer, a netbook, a smartbook, an ultrabook, a wearable device (e.g., a smart watch, a smart wrist band, etc.), an entertainment device (e.g., a video player, etc.), a vehicular component or sensor, an unmanned vehicle (e.g., an industrial robot, a quadcopter, etc.), industrial manufacturing equipment, a global positioning system (GPS) device, an Internet-of-Things (IoT) device, an Industrial IoT (IIoT) device, a machine-type communication (MTC) device, a group of Massive IoT (MIoT) or Massive MTC (mMTC) devices/sensors, or any other suitable mobile device configured to support wireless communications. In some embodiments, the mobile user device may refer to at least two collocated and inter-connected mobile user devices thus defined.
In some embodiments, the waste collection point may be implemented as a fully automated waste collection point or feed-in station in which hatches of waste containers may be unlocked and opened automatically in response to the access request from the mobile user device. To perform this automatic opening, the waste collection point should comprise hatch actuators, such, for example, as an electric actuator, a pneumatic actuator, etc. The type of the hatch actuator depends on particular applications (e.g., installation sites), as should be obvious to those skilled in the art.
In some other embodiments, the waste collection point may be implemented as a semi-automated waste collection point or feed-in station in which hatches of waste containers may be unlocked but not opened in response to the access request from the mobile user device. Once the hatches of the waste containers are unlocked, a user can open the hatches manually or by pressing one or more corresponding push buttons provided in the waste collection point.
Furthermore, the waste collection point may be provided with a single hatch providing access to one or more waste containers in the waste collection point. In one embodiment, the waste collection point may comprise a waste handling means configured to sort out waste placed inside via the single hatch such that different types of waste are directed to the corresponding waste containers. In another embodiment, the waste collection point may be configured to receive, via the single hatch, different wastes at different times (i.e. there may be special mechanisms in the waste collection point which would provide a corresponding route for a certain type of waste to one of the waste containers within a predefined period of time).
In one embodiment, the system 100 may be implemented without the valves 110-1, 110-2, 110-3, and the intake of make-up air (also referred to as replacement air) may be controlled by make-up air valves. When it is determined that one or more of the branch pipelines 106-1, 106-2, 106-3 should be emptied, at least a partial vacuum is provided in the main pipeline 108 by using the suction unit, whereupon corresponding one or more of the make-up air valves are opened and the wastes are conveyed through the main pipeline 108 to a destination point (e.g., a waste treatment plant or station, or an output or end waste container for a certain type of waste).
It is assumed that the processing unit 202 includes different subunits required to request access to the waste collection point. In particular, the processing unit 202 may comprise a transceiving subunit (not shown) capable of performing different operations required to perform the data reception and transmission, such, for example, as signal modulation/demodulation, encoding/decoding, etc. In general, the processing unit 302 may comprise one or more of the following: a CPU, general-purpose processor, single-purpose processor, microcontroller, microprocessor, application specific integrated circuit (ASIC), field programmable gate array (FPGA), digital signal processor (DSP), complex programmable logic device, etc.
The memory unit 204 may be implemented as a classical nonvolatile or volatile memory used in the modern electronic computing machines. As an example, the nonvolatile memory may include Read-Only Memory (ROM), ferroelectric Random-Access Memory (RAM), Programmable ROM (PROM), Electrically Erasable PROM (EEPROM), solid state drive (SSD), flash memory, magnetic disk storage (such as hard drives and magnetic tapes), optical disc storage (such as CD, DVD and Blu-ray discs), etc. As for the volatile memory, examples thereof include Dynamic RAM, Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDR SDRAM), Static RAM, etc.
The processor-executable instructions 206 stored in the memory unit 204 may be configured as a computer-executable code which causes the processing unit 202 to perform the aspects of the present disclosure. The computer-executable code for carrying out operations or steps for the aspects of the present disclosure may be written in any combination of one or more programming languages, such as Java, C++, or the like. In some examples, the computer-executable code may be in the form of a high-level language or in a pre-compiled form and be generated by an interpreter (also pre-stored in the memory unit 204) on the fly.
It should be noted that the mobile user device 200 (or, in other words, the user of the mobile user device 200) may be given the user ID 208 in response to registering the user in the access control system. Once the user is registered, the user ID may be transferred to the mobile user device 200, e.g., a mobile phone, via a QR code, Near-Field Communications (NFC), Bluetooth (e.g., BLE), Short Message Service (SMS), email or typed manually. For example, the user may install special software (e.g., a mobile application) on the mobile user device 200, and the user ID 208 may be sent from the access control system to the mobile user device 200 in response to such an installation.
In one embodiment, the indication of the waste container(s) to be accessed may comprise one or more types of waste or one or more IDs of the waste container(s) to be accessed. Such an indication in the user input makes it possible to grant access only to one or more waste containers storing one or more desired types of waste, thereby increasing the efficiency of access management for the waste collection point.
In one embodiment, the mobile user device 200 may further comprise a touch screen having buttons provided thereon, and the step S302 of the method 300 may be performed in response to the user pressing the buttons of the touch screen. In an alternative embodiment, the mobile user device 200 may further comprise a camera, and the step S302 of the method 300 may be performed by causing the camera to read a QR code. In one more alternative embodiment, the mobile user device 200 may further comprise a short-range wireless communication unit, and the step S302 of the method 300 may be performed by causing the short-range wireless communication unit to read an NFC tag. Each of these embodiments may allow the step S302 to be performed more easily and efficiently.
In one embodiment, the step S304 of the method 300 may be performed by the processing unit 202 by using GPS signals (e.g., received via the transceiving subunit). In one other embodiment, the step S304 of the method 300 may be performed by the processing unit 202 by using short-range wireless signals broadcasted by a beacon (e.g, a BLE beacon) arranged in the waste collection point. In one more other embodiment, the step S304 of the method 300 may be performed by the processing unit 202 by using a QR code or an NFC tag provided in the waste collection point. It should be also noted that the step S304 of the method 300 may be performed by using any combination of these embodiments, i.e., for example, by using the GPS signals and the QR code, or by using the GPS signals and the NFC tag, and so on.
In one embodiment, the step S306 of the method 300 may be performed by the processing unit 202 by using short-range wireless communications, Internet, or the combination of both. In case of the short-wireless communication network, both the processing unit 202 and the waste collection point may be equipped with proper wireless communication subunits configured to support the short-range wireless communications (e.g., Bluetooth). By using the combination of the short-range wireless communication network and Internet, the user may request the opening or unlocking of the hatch(es) of the desired waste container(s) in the waste collection point from home via Internet, and the opening or unlocking itself will take place only when the mobile user device 200 in the vicinity of the waste collection point by using the short-range wireless communications or over the Internet (if the position of the mobile user device 200 is determined with the GPS signals).
In one embodiment, the method 300 may comprise, before the step S306, an additional step, according to which the processing unit 202 encrypts the access request(s) with a cryptographic protocol (e.g., e.g. AES or TLS protocols). This allows one to prevent eavesdropping and replay attacks.
In one embodiment, the method 300 may comprise additional steps, in which the processing unit 202 receives statistics from the access control system and outputs the statistics to a user of the mobile user device 200 (e.g., on the touch screen or via any other user interface). The statistics may be based on a number of times the access to the waste container(s) of the waste collection point has been requested by the mobile user device 200 for a predefined period of time (e.g., one year, month, week, etc.). The statistics provides a feedback to the user of the mobile user device 200, so that the user may have an idea about how he/she uses the waste collection point (e.g., whether a rest waste container (i.e. a mixed waste container) is used frequently or not; if yes, the user may focus more on sorting out rest waste to reduce its fraction in the whole amount of wastes placed by the user in the waste collection point for the predefined period of time). To make the statistics more accurate, each of the waste container(s) of the waste collection point may comprises a sensor for sensing a presence of infeed waste in the waste container, and the statistics may be additionally based on sensing signals from the sensor(s) of the waste container(s) of the waste collection point.
In one embodiment, the mobile user device 200 may belong to a guest user rather than a resident or tenant of a certain building. Although the guest user does not have permanent access rights to the waste container(s) of a waste collection point arranged near the building, he/she may request the resident or tenant having such access rights to give him/her a temporary permit (or temporary rights) to use the waste collection point. This may be done, for example, by installing, on the guest's mobile device, the same special software (e.g., mobile application) as the one used by the resident or tenant to gain access to the waste collection point. The resident may, for example, give such a temporary permit via a QR code generated in his/her own mobile application. As an example, the temporary permit may be as follows: “For the next hour for biowaste and cardboard in waste collection point Rosalankatu 4B”. Thus, the guest user may use the waste collection point with the user ID of the resident or tenant, and the usage of the waste collection point by the guest user will be accumulated as the usage statistics of the user ID of the resident or tenant.
It should be noted that the processing unit 502, the memory unit 504, and the processor-executable instructions 506 may be implemented in the same or similar manner as the above-discussed processing unit 202, the memory unit 204, and the processor-executable instructions 206, respectively.
As for the DB 508, it may be configured as a data container where each user ID is associated with the permanent or temporary access rights to the hatch(es) of the waste container(s) of a certain waste collection point. The DB 508 may be configured as a Structured Query Language (SQL) database, a graph database, etc., depending on particular applications, as should be apparent to those skilled in the art Correspondingly, the processor 504 may be configured to query and maintain the DB 508 by using any suitable programming language, depending on the type of the DB 508 (e.g., SQL in case of the SQL database).
In one embodiment, the method 600 comprises an additional step, in the which the processor unit 502 counts a number of times the user ID 208 has been used to unlock or open the hatch of each waste container in the waste collection point for a predefined period of time. This number of times may be used to obtain various statistics about the types of wastes collected in the waste containers by using the user ID 208. For example, there may be a goal for the quantity of a particular type of waste (e.g., the quantity of rest waste should be under 50% of the total quantity of all wastes placed by the user in the waste containers at the waste collection point for a certain period of time), and the user may achieve this goal by analyzing such statistics. Furthermore, the number of times the user ID 208 has been used for the predefined period of time may be used to calculate an average weight and/or volume of waste collected in each waste container. The average weight and/or volume of waste in each waste container may be also used to obtain various statistics about the types of wastes collected in the waste containers by using the user ID 208.
As noted earlier, each of the waste containers of the waste collection point may comprise the sensor for sensing the presence of infeed waste in the waste container. In this case, the processing unit 502 may receive the sensing signal from the sensor of each of the waste containers whenever the waste is fed into the waste container, and calculate the average weight and/or volume of waste collected in each of the waste containers based on the sensing signals (i.e. their numbers). The sensing signals may be used as an alternative or addition to the above-discussed number of times.
In one embodiment, if there is a rest waste container among the waste containers of the waste collection point, the method 600 comprises an additional step, in which the processing unit 502 compares the counted number of the user ID 208 has been used to unlock or open the hatch of the rest waste container (or the average weight or volume of waste collected in the rest waste container by using the user ID 208) to a threshold value. If the counted number of times the user ID 208 has been used to unlock or open the hatch of the rest waste container (or the average weight or volume of waste collected in the rest waste container by using the user ID 208) is above than the threshold value, the processing unit 502 may send a first feedback signal to the mobile user device 200 (i.e. the processing unit 202). If the counted number of times the user ID 208 has been used to unlock or open the hatch of the rest waste container (or the average weight or volume of waste collected in the rest waste container by using the user ID 208) is less than or equal to the threshold value, the processing unit 502 may send a second feedback signal to the mobile user device 200 (i.e. the processing unit 202). The second feedback signal is different from the first feedback signal. The first and second feedback signals may be outputted in the mobile user device 200 in a variety of ways. For example, they may be converted to different color signals or audio signals. Furthermore, the processing unit 202 may output both the first and second feedback signals when the mobile user device 200 is at a predefined distance from the waste collection point (e.g., when the mobile user device 200 leaves the coverage area of BLE beacons installed in the waste collection point). By using the first and second feedback signals, the user may understand when he/she needs to focus more on waste sorting, so that the quantity of rest waste is reduced.
It should be noted that each step or operation of the methods 300 and 500, or any combinations of the steps or operations, can be implemented by various means, such as hardware, firmware, and/or software. As an example, one or more of the steps or operations described above can be embodied by processor-executable instructions, data structures, program modules, and other suitable data representations. Furthermore, the processor-executable instructions which embody the steps or operations described above can be stored on a corresponding data carrier and executed by the processing unit 202 or the processing unit 502. This data carrier can be implemented as any computer-readable storage medium configured to be readable by the processing unit 202 or the processing unit 502 to execute the processor-executable instructions. Such computer-readable storage media can include both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, the computer-readable media comprise media implemented in any method or technology suitable for storing information. In more detail, the practical examples of the computer-readable media include, but are not limited to information-delivery media, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile discs (DVD), holographic media or other optical disc storage, magnetic tape, magnetic cassettes, magnetic disk storage, and other magnetic storage devices.
Although the exemplary embodiments of the present disclosure are described herein, it should be noted that any various changes and modifications could be made in the embodiments of the present disclosure, without departing from the scope of legal protection which is defined by the appended claims. In the appended claims, the word “comprising” does not exclude other elements, steps or operations, and the indefinite article “a” or “an” does not exclude a plurality. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
Number | Date | Country | Kind |
---|---|---|---|
20215466 | Apr 2021 | FI | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/FI2022/050256 | 4/20/2022 | WO |