The disclosure relates generally to switches, and more particular to non-contact type switches.
Non-contact type switches are commonly used in a wide variety of applications. For example, non-contact type switches are commonly used in interlock systems that restrict access to certain areas or equipment. For example, in an industrial setting, a potentially hazardous robot may be surrounded by a barrier that has an entrance gate. The gate may be equipped with a non-contact type switch whose state depends on whether the gate is open or closed. If the non-contact type switch indicates an open gate, a controller may command the robot to enter a safe state, such as a non-moving state.
In some instances, non-contact type switches may be willfully defeated in order to bypass certain safety or other features provided by the non-contact type switches. For example, if a non-contact type switch on one side of a gate is operated by a magnetic relay, the operator may permanently attach a magnet to the relay, thereby permanently closing the relay even when the gate is opened. What would be desirable, therefore, is a more secure non-contact type switch that would be more difficult to defeat. Such a non-contact type switch would have a wide variety of applications, including many interlock applications.
The disclosure relates generally to switches, and more particular to non-contact type switches. In an illustrative but non-limiting example, the disclosure provides a redundant non-contact switch for reporting, for example, a status of closed or open for a first member and a second member that move relative to each other between an open state and a closed state. An illustrative redundant non-contact switch may include a wireless authentication (WA) pair and a magnetic pair. The WA pair may include a WA responder attached to one of the first member and the second member, and a WA interrogator attached to the other of the first member and the second member. The WA pair is configured to register a WA status of closed or open, depending on a WA authentication between the WA responder and the WA interrogator. The magnetic pair may include a magnet attached to one of the first member and the second member, and a magnet sensor attached to the other of the first member and the second member. The magnetic pair may be configured to register a magnetic status of closed or open, depending on whether a magnet distance between the magnet and magnet sensor is beyond a threshold magnet distance. In some instances, the redundant non-contact switch may be configured to report the status as closed only if both the WA status is registered as closed and the magnetic status is registered as closed.
In some instances, operation of the WA authentication and/or the magnetic pair relies on inductive power transmission. In one example, a transmit coil may be attached to one of the first member and the second member, and a receive coil may be attached to the other of the first member and the second member. When so provided, sufficient operational power may only be provided for the WA authentication and/or the magnetic pair when the distance between the transmit coil and the receive coil is within a threshold distance.
The above summary is not intended to describe each and every disclosed illustrative example or every implementation of the disclosure. The Description that follows more particularly exemplifies various illustrative embodiments.
The following description should be read with reference to the drawings. The drawings, which are not necessarily to scale, depict selected illustrative embodiments and are not intended to limit the scope of the disclosure. The disclosure may be more completely understood in consideration of the following detailed description of various illustrative embodiments in connection with the accompanying drawings, in which:
a is a schematic diagram of an illustrative non-contact switch having first and second parts in close proximity within a threshold distance of each other;
b is a schematic diagram of the illustrative non-contact switch of
a is a schematic diagram of an illustrative non-contact switch with a magnet pair having first and second parts in close proximity within a threshold distance;
b is a schematic diagram of the illustrative non-contact switch of
a is a schematic diagram of an illustrative non-contact switch having first and second parts in close proximity, with a magnet pair in an alternate arrangement;
b is a schematic diagram of the illustrative non-contact switch of
a is a schematic diagram of another illustrative non-contact switch having first and second parts in close proximity; and
b is a schematic diagram of the illustrative non-contact switch of
The following description should be read with reference to the drawings, in which like elements in different drawings are numbered in like fashion. The drawings, which are not necessarily to scale, depict selected illustrative embodiments and are not intended to limit the scope of the disclosure. Although examples of construction, dimensions, and materials are illustrated for the various elements, those skilled in the art will recognize that many of the examples provided have suitable alternatives that may be utilized.
a and 2b are schematic diagrams of an illustrative non-contact switch 200, and in some instances may be used as either of switches 110 or 118 in the illustrative interlock system of
a illustrates the first and second parts 202, 204 of the illustrative non-contact switch 200 in close proximity, as may be the case when a door with which the switch is associated is closed.
Non-contact switch 200 of
The illustrative non-contact switch 200 may also be structured and configured such that it reports a status of closed only if a wireless authentication (WA) is successfully achieved between the first part 200 and the second part 204, in which a WA responder component of the second part properly identifies itself to a WA interrogator component of the first part. This wireless authentication functionality may apply to any non-contact switch of the present disclosure. Various implementations of wireless authentication are further described herein.
The illustrative non-contact switch 200 of
As illustrated in
In
Inductive power receive coil 208 may be configured to provide operational power to WA responder 212, which in some instances, may require operational power from the inductive power receive coil to operate. Inductive power transmit coil 206 and inductive power receive coil 208 may be configured so that the inductive power receive coil 208 receives sufficient operational power to operate the WA responder 212 only when the inductive power coils 206, 208 are positioned proximally with respect to each other within a limited range of displacement (e.g. less than a threshold distance) and/or mutual orientation. These positioning criteria for the inductive power coils 206, 208 to transfer operational power may be effectively the same condition discussed herein where non-contact switch 200 reports a status of closed only if first part 202 and second part 204 are disposed relative to each other appropriately.
The positioning criteria for inductive power transfer arise at least in part from the fundamental physical phenomenon of Faraday induction upon which the power transfer is based. When inductive power transmit coil 206 carries a time-varying current, it produces a time-varying magnetic field, illustrated schematically with flux lines 220. The varying magnetic flux through receive coil 208, and hence the induced voltage/current in the coil, depends in part upon the relative positioning of the power transmit coil 206 and the power receive coil (e.g. separation distance). As the relative displacement and/or orientation of the coils 206, 208 change, the power induced in the induced power receive coil changes. This may account for whether the WA responder 212 receives sufficient operational power to operate the WA responder.
In
In some illustrative embodiments, additional circuitry (not shown) may be provided in the second part 204 of the non-contact switch 200. Such circuitry may, for example, analyze the electrical signal induced in the inductive power receive coil 208 to discern whether the transmit 206 and receive coils are positioned with respect to each other appropriately to satisfy the closed condition. If they are, the additional circuitry may allow operational power to pass to the WA responder 212. If they are not, the additional circuitry may prevent operational power from passing to the WA responder 212.
In some illustrative embodiments, operational power is received by an inductive power receive coil 208 from an inductive power transmit coil 206 only when the coils are positioned within a threshold distance of each other. This condition may essentially be equivalent, in some embodiments, to the WA distance between the WA interrogator and responder being below a threshold WA distance. These threshold distances may be, for example, about 10 mm. In some illustrative embodiments, operational power is received by an inductive power receive coil 208 from an inductive power transmit coil 206 only when the coils are positioned within a pre-defined range of displacement, and within a pre-defined range of rotational orientation, with respect to each other.
The wireless authentication pair including WA interrogator 210 and a WA responder 212 may employ any suitable communication method, such as but not limited to, radio, acoustic, and optical, and any suitable protocol, including but not limited to RFID protocols, Wi-Fi (including IEEE 802.11 and related standards), ZigBee (including IEEE 802.15.4 and related standards), and so on. To perform a wireless authentication, WA interrogator 210 may broadcast an interrogation signal 222, schematically represented with an arrow directed toward WA responder 212. In some cases, WA interrogator 210 may employ inductive power transmit coil 206 as an antenna. In some embodiments, the interrogation signal 222 may be encoded upon the time-varying magnetic flux used to transfer power to inductive power receive coil 208. Inductive power receive coil 208, in turn, may be employed by WA responder 212 as an antenna. Upon receiving an interrogation signal 222 from the WA interrogator 210, and when sufficiently supplied with operational power, WA responder 212 may reply with a response signal 224, schematically represented with an arrow directed toward the WA interrogator in
In some illustrative embodiments, “rolling” or “hopping” systems for varying codes may be employed.
In some illustrative embodiments, for additional security a WA interrogator as well as a WA responder may broadcast an identification code, and the WA responder may be configured to broadcast its authenticating response only if it receives a known identification code from the interrogator. Such secure authenticating procedures may be employed to make it more difficult to willfully bypass the switch.
In some illustrative embodiments, it may be desired to provide a switch bypass or override capability. In such cases, a third wireless transceiver, in addition to the interrogator and responder of a WA pair, may be used in a disarming key and brought into proximity of the interrogator. A disarming key may include other components as well, such as a magnetic component to serve as part of a magnetic pair. The third wireless transceiver may mimic the nominal WA responder, or it may broadcast its own distinct identification code that the WA interrogator may be programmed to accept as a known bypass identification code. Such a switch bypass capability may provide multiple advantages over older switch technologies. For example, a bypass disarming key having a distinctive bypass identification code may make it possible for an interlock system controller to be aware that a bypass disarming key is in use, instead of the nominal second part corresponding to the first part of the switch. The controller and/or switch may, for example, log the information for later review, and/or the controller may take or command actions in view of the use of the bypass disarming key, such as issuing warnings or limiting machine operations. In some illustrative embodiments, any appropriate information about any attempted status changes of a non-contact switch may be logged, such as status changes (closed to open, open to closed), authentication attempts, the success or failure of authentication attempts, the time of attempts, identification codes received, whether a bypass disarming key was used, etc. Logged information may be read out in any appropriate way, such as over cable 218 or any optical, wired, or wireless communication link.
In some instances, WA transceivers may be supplied by a manufacturer with pre-programmed identification codes (RFID tags with pre-programmed codes, SAW sensors with pre-programmed codes, etc.). In other instances, WA transceivers may be supplied in a field-programmable form. It may be possible to program WA pairs via, for example, an interlock system controller such as controller 122 of
a and 3b are schematic diagrams of an illustrative non-contact switch 300, and in some instances may be used as either of switches 110 or 118 in the illustrative interlock system of
The magnetic pair of switches 300 of
In
In some illustrative embodiments, a magnetic sensor/switch may not physically make or break an electrical connection between a coil/antenna and responder, but may provide a signal of magnetic status (closed or open), and the responder, for example, may be configured to then accept or ignore input from the coil/antenna. Regardless of the particular implementation details, and in some instances, switch 300 may be configured so that it reports the status as closed only if both the WA status is registered as closed and the magnetic status is registered as closed. Note that as the positions of the first and second parts 302, 304 of switch 300 change with respect to each other, as would happen, for example, when the first and second parts move along with first and second members to which they are attached, the WA distance and magnet distance vary.
Other arrangements of a magnet pair in a switch are contemplated. For example,
As with magnetic pair of switch 300, the magnetic pair of switch 400 of
a and 5b are schematic diagrams of an illustrative non-contact switch 500, and in some instances may be used as either of switches 110 or 118 in the illustrative interlock system of
Illustrative non-contact switch 500 may include a wireless authentication pair including a WA interrogator 538 which may have an antenna 540 and a WA responder 542 which may have an antenna 544. The wireless authentication pair of switch 500 may employ any suitable technologies and protocols as further disclosed elsewhere herein. In particular, the wireless authentication pair of switch 500 may incorporate Radio Frequency IDentification (RFID) technology and/or Surface Acoustic Wave (SAW) technology. WA responder 542 may be an RFID tag or a SAW tag, or an RFID tag incorporating SAW technology. WA interrogator 538 and WA responder 542 may employ antennas 540 and 544 when executing or attempting a wireless authentication. To perform a wireless authentication, WA interrogator 538 may broadcast an interrogation signal 546, schematically represented with an arrow directed toward WA responder 542. Upon receiving an interrogation signal 546 from the WA interrogator 538, WA responder 542 (which may be powered from any suitable source, including power carried by the interrogation signal 546) may reply with a response signal 548, schematically represented with an arrow directed toward the WA interrogator in
The illustrative non-contact switch 500 of
In some illustrative embodiments, hardware requirements may be reduced by combining multiple second parts (each with a WA responder) to provide multiple switches that operate with a single first part (with a WA interrogator), and a single communication link to an interlock system controller. Unique identifying codes associated with the distinct second parts may make it possible for a single first part to serve multiple switches. Such an arrangement may be feasible, for example, with double doors closing onto a common center pillar.
The disclosure should not be considered limited to the particular examples described above. Various modifications, equivalent processes, as well as numerous structures to which the disclosure can be applicable will be readily apparent to those of skill in the art upon review of the instant specification.
Number | Name | Date | Kind |
---|---|---|---|
4105899 | Velosa | Aug 1978 | A |
5757672 | Hoepken | May 1998 | A |
5836187 | Janssen et al. | Nov 1998 | A |
6072383 | Gallagher, III et al. | Jun 2000 | A |
6212052 | Heuer et al. | Apr 2001 | B1 |
6283514 | Letzel | Sep 2001 | B1 |
6311803 | Turk | Nov 2001 | B1 |
6366532 | Hoepken | Apr 2002 | B1 |
6539760 | Letzel et al. | Apr 2003 | B1 |
6570817 | Hoepken | May 2003 | B2 |
6659232 | Oelschlegel | Dec 2003 | B2 |
7034683 | Ghazarian | Apr 2006 | B2 |
7086111 | Hilscher et al. | Aug 2006 | B2 |
7357429 | Eichenauer | Apr 2008 | B2 |
7377560 | Wiemer et al. | May 2008 | B2 |
7469838 | Brooks et al. | Dec 2008 | B2 |
7474211 | Kramer | Jan 2009 | B2 |
7492905 | Fitzgibbon | Feb 2009 | B2 |
7504747 | Pullmann et al. | Mar 2009 | B2 |
7520426 | Hoepken et al. | Apr 2009 | B2 |
7545620 | Klees | Jun 2009 | B2 |
7696878 | Cable et al. | Apr 2010 | B2 |
20050108945 | Wiemer et al. | May 2005 | A1 |
20060220846 | Stratmann | Oct 2006 | A1 |
20060226948 | Wright et al. | Oct 2006 | A1 |
20070013236 | Fleiner et al. | Jan 2007 | A1 |
20070205861 | Nair et al. | Sep 2007 | A1 |
20080048826 | Agrawal et al. | Feb 2008 | A1 |
20090058607 | Hou et al. | Mar 2009 | A1 |
20100079289 | Brandt et al. | Apr 2010 | A1 |
20100097186 | Wielebski et al. | Apr 2010 | A1 |
Number | Date | Country |
---|---|---|
19540867 | May 1996 | DE |
19624846 | Jan 1998 | DE |
102006038036 | Nov 2007 | DE |
0287686 | Oct 1988 | EP |
0034605 | Jun 2000 | WO |
2008041143 | Apr 2008 | WO |
2008131704 | Nov 2008 | WO |
Entry |
---|
Rockwell Automation “Sensaguard RFID Coded Non-Contact Interlocks,” 2 Pages, Feb. 2008. |
Euchner, “Non-Contact Safety Systems CES-A/CES-AZ,” 11 pages, prior to Feb. 5, 2010. |
Engineer Live, “Safety Switch Uses RFID Technology,” 3 pages, Jul. 17, 2009. |
Etta, “New Non-Contact Safety Interlocks Satisfy Safety Category 3 or 4 Requirements,” 10 pages, prior to Feb. 5, 2010. |
Rockwell Automation Inc, “Integrated Saftey, Let the Ripple-Effect Increase Your Bottom Line,” Brochure, 6 pages, 2008. |
Schmersal Ltd., “RFID Key-Operated Selector Switch,” 1 page, Apr. 14, 2008. |
Number | Date | Country | |
---|---|---|---|
20110193422 A1 | Aug 2011 | US |