The various embodiments of a technology described herein generally relate to electrical or electro-mechanical installations that are subject to service or repair during which components of such installations need to be bypassed. More particularly, the various embodiments described herein relate to wire bridges used to bypass components in an electrical or electro-mechanical installation and to monitor use of these wire bridges.
One example of an electrical or electro-mechanical installation is an elevator installation. Multi-story buildings are usually equipped with at least one elevator installation. In a generally known elevator installation, a suspension medium—such as a rope or flat belt-type rope—interconnects a counterweight and a car, and an electrical drive motor causes the suspension medium to move in order to thereby move the counterweight and the car up and down along a shaft or hoistway. An elevator controller of the elevator installation controls and monitors the operation of the elevator installation, e.g., by processing input signals received via communications network or signaling lines (e.g., from sensors, safety components (e.g., stop switches, door lock switches), etc.) and by generating control signals, which are fed to the communications network or the signaling lines.
An elevator installation is subject to regular servicing, maintenance, testing or occasional repairs. During these procedures, wire bridges or jumpers may be used to bypass, short circuit, or interrupt certain components, e.g., a safety door switch to allow operation of the elevator installation with an unlocked door, or a stop switch to allow a car to travel beyond a set stop. Once these procedures are finished, it is important that a technician removes all wire bridges, otherwise serious safety hazards exist. To minimize the risks caused by a jumper that has mistakenly been left in place, Wurtec, Inc., Ohio, USA, offers an electronic jumper that “times out” after a pre-programmed period of time. A jumper that times out is described in US 2009/0121731. Another approach is disclosed in WO 2011/090665, which describes an elevator safety tool for short circuiting an elevator switch. The tool includes a control module, and a relay, wherein the relay has a switch having a closed position and an open position. The control module receives status data and determines whether the operating status is “normal” or “service”. The switch is closed when the elevator is in service, and open when the elevator is in normal operation.
Even though these approaches reduce the risk caused by a “forgotten” jumper, the time-out functionality of such a jumper may not be sufficient to satisfy industry-standard safety requirements, especially when used for an extended period of time. Also, the elevator safety tool requires a technician not only to connect the tool to the switch to be short circuited, but also to the elevator control to receive status data. There is, therefore, a need for an alternative technology that further reduces the potential risks associated with using jumpers in electrical or electro-mechanical installations, such as an elevator installation, yet is simple to use for a technician in the field.
Accordingly, one aspect of such an alternative technology involves a monitoring system having a wire bridge and a monitoring device. The wire bridge is used by a technician during servicing an electrical or electro-mechanical installation to bridge a component of the electrical or electro-mechanical installation. The wire bridge has an electronic identification device configured to transmit a radio signal comprising an identification number of the wire bridge. The monitoring device has a transceiver, a memory and a processor. The transceiver receives the radio signal transmitted by the electronic identification device when within a predetermined radio range, and the memory records use of the wire bridge. The processor monitors if the wire bridge is within the predetermined radio range, and generates an alarm if the wire bridge is not within the predetermined radio range and the wire bridge is recorded as being in use.
Another aspect of the alternative technology involves a method of monitoring use of a wire bridge. In that method, a radio signal comprising an identification number of the wire bridge is received from the wire bridge when within a predetermined radio range. Based on the received radio signal, the method records that the wire bridge is used by a technician during servicing an electrical or electro-mechanical installation. The radio signal is monitored to determine if the wire bridge is still within the predetermined radio range. An alarm is generated if the wire bridge is not within the predetermined radio range and the wire bridge is recorded as being in use. The alarm is communicated to the technician using a monitoring device assigned to the technician.
The technology provides for an electronic wire bridge monitoring system that allows use of a wire bridge to be logged and tracked. According to that technology, a technician can generally position a wire bridge in an installation just like in the prior art, but without having to install or connect additional equipment or connections. As each wire bridge is provided with and wirelessly transmits a unique identifier, monitoring the use of the wire bridge occurs in a simple manner by means of a monitoring device.
In one embodiment, the monitoring device is included in a mobile device assigned to the technician. It may be a smartphone, a tablet computer, a portable computer, or an electronic service tool. These devices have a processor, a transceiver to receive and transmit data, and some kind of memory. The technician usually brings such devices to a site, so that the technician in one embodiment is not required to bring an additional tool to the site.
In another embodiment, the monitoring device includes the mobile device and a wire bridge kit. The wire bridge kit has a housing to receive several wire bridges and a transceiver. The transceiver detects removal and return of a wire bridge from the housing. Data relating to these events is recorded to allow logging and tracking of a wire bridge's use. The data may be stored in a memory of the wire bridge kit, the mobile device and/or a remote log server. The log server may be viewed as being part of a decentralized monitoring device, wherein communications occur via a network.
The alarm may be generated in various ways. For example, generating the alarm may include generating a warning message (e. g., a text message (SMS)), a visible alarm (e. g., an activated light source), an audible alarm and/or a vibrational alarm. This allows adapting the alarm mechanism to particular circumstances (e. g., noisy environments) and preferences of the technician.
In one embodiment, usage data is stored to allow monitoring (including logging and tracking) the use of the wire bridge. The usage data may include the identification number, a location of where the wire bridge is used, date and time of its use, and/or a location of the monitoring device. Depending on a particular embodiment, the usage date may be stored in a memory of the mobile device, the wire bridge kit and/or the log server.
The described technology allows flexibility as to the communications technology used. That is, Bluetooth technology or RFID technology may be used. In one embodiment, the electronic identification device includes a Bluetooth beacon and the transceiver includes a Bluetooth module. In another embodiment, the electronic identification device includes an RFID tag and the transceiver includes an RFID reader.
In one embodiment, the alarm may be sent to a remote control center. The technician's supervisor is in communication with the control center and is made aware of the alarm. In case the technician does not confirm the alarm, either by confirming removal of a forgotten wire bridge or explaining its prolonged use, at least the supervisor can attend to the alarm. This contributes to maintaining the installation in a safe and reliable state.
The novel features and method steps characteristic of the technology are set out in the claims below. The various embodiments of the technology, however, as well as other features and advantages thereof, are best understood by reference to the detailed description, which follows, when read in conjunction with the accompanying drawings, wherein:
Briefly, the elevator installation 1 of
The exemplary elevator installation of
The jumper 18 illustrated in
Adapted for RFID technology, the ID device 26 includes a memory chip and an RFID transponder, which may be active (i. e., it has an internal power supply (e. g., a battery)) or passive (i. e., it requires external supply of power). Such an ID device 26 may be referred to as RFID tag. The memory chip stores data that identifies the jumper 18; the data may include a unique identification (ID) number. Upon activation by an RFID reader, e. g., as part of the mobile device 22, transmitting a polling signal, the RFID transponder within radio range responds by retrieving and transmitting the stored data. If a passive RFID transponder is used, the polling signal powers the RFID transponder. For such polling, a polling cycle may be defined for the RFID reader, wherein the polling cycle begins as soon as the technician 20 uses the jumper 18 and activates the mobile device 22, as described below. It is contemplated that polling may also be initiated by the technician 20, e. g., to locate the jumper 18 (which may then vibrate or sound). If the ID device 26 of the jumper 18 and the RFID reader are within radio range, the RFID reader receives the ID number via a radio communications link existing between them.
Adapted for Bluetooth technology, the ID device 26 includes a Bluetooth beacon. The communications between such a beacon and, e. g., a mobile device 22 with a Bluetooth module occur according to a Bluetooth standard, e. g., Bluetooth Standard 4.0 (Bluetooth Low Energy (BLE)) or any other Bluetooth standard. The beacon usually includes a battery operated transmitter that permanently transmits in short intervals of about 1 second a unique identification number (e. g., “ID=5”). If the beacon 26 and the mobile device 22 are within radio range, the mobile device 22 receives the beacon's identification number via a radio communications link existing between them. Correspondingly, once they are out of radio range, a radio communications link does not exist.
One example of a Bluetooth beacon is an Enterprise Beacon available from Onyx Beacon Ltd., Romania. Such a beacon has a buzzer to emit an audible signal. Another example is a so-called iBeacon from Apple, Inc., USA.
For example, a main page may be presented when the jumper app starts. The main page requires the technician 20 to log in, e. g., by inputting a password and/or an email address. Another page may allow the technician 20 to specify a maximum distance between the mobile device 22 and the jumper 18, and to specify an alarm type, e. g., vibration, message, audio, and/or light. The maximum distance defines a predetermined radio range; if the distance between the mobile device 22 and the jumper 18 is greater than the maximum distance, the jumper 18 is deemed out of range. If the jumper 18 is in use, the jumper app generates an alarm according to the specified alarm type.
In one embodiment, the mobile device 22 is equipped with a Bluetooth module. Such a Bluetooth module is a standard equipment of a smartphone, and enables communications with other Bluetooth enabled devices, such as a Bluetooth enabled ID device 26 of the jumper 18. Using the display 36, the technician 20 can enable or disable the Bluetooth module. In another embodiment, the mobile device 22 is equipped with an RFID reader. In one embodiment, such an RFID reader may be configured as an attachment to a smartphone. In such a configuration, the mobile device 22 includes an RFID reader and a Bluetooth module.
In one embodiment, the memory 41 stores usage data of the jumper 18, such as the identification number, a location of where the jumper 18 is used, date and time of its use, and a location of the mobile device 22. Some of that data may be entered by the technician 20, e. g., via the jumper app. The location data may be automatically entered using the GPS system of the mobile device 22.
With the understanding of the general structure of the wire bridge monitoring system and certain features of its components described with reference to
Proceeding to a step A2, the method receives a radio signal 21 comprising the jumper's ID number from the jumper 18 when within the predetermined radio range. If the radio signal 21 is received, e. g., by the mobile device 22, the technician 20 is in proximity of the jumper 18. The technician 20 may still handle the jumper 18 to prepare its installation, or may have already installed the jumper 18 and work in its proximity.
Proceeding to a step A3, the method records use of the wire bridge 18 by the technician 20. The use may be recorded in a log file maintained, e. g, in the mobile device's memory 41. The use is based on the received radio signal 21 because, e. g., once the technician 20 is done inputting data regarding the use of the jumper 18, receipt of the radio signal 21 is considered to be the beginning of the jumper's use. Depending on a particular embodiment, the jumper app may display a signal strength of the received radio signal 21 and, e. g., a charge state if a battery-powered Bluetooth beacon or an active RFID tag is used.
Proceeding to a step A4, the method monitors the radio signal 21. In one embodiment, the mobile device 22 may monitor the received signal strength as a function of time to determine if the jumper 18 remains within the predetermined radio range. As mentioned above, the mobile device 22 receives the radio signal 21 as long as the technician 20 is in proximity of the jumper 18, i. e., while the distance between them is less than the predetermined maximum distance.
Proceeding to a step A5, if the method determines that the jumper 18 is within the predetermined radio range, the method proceeds along the Yes branch to a step A6. In step A6, the method determines that the technician 20 is present and that, therefore, no potentially critical situation exists regarding the use of the jumper 18. If the technician 20 no longer needs the jumper 18, the technician is supposed to remove the jumper 18 and to use the jumper app to check the jumper 18 in. After such check in, the log file is updated and the jumper 18 is no longer recorded as being used. The method ends in step A11.
If in step A5 the method determines that the jumper 18 is not within the predetermined radio range, the method proceeds along the No branch to a step A7. In step A7, the method determines that the technician 20 is not present. For example, the technician 20 may have left the site for the day, or may have temporarily left the immediate vicinity of the jumper 18.
Proceeding to a step A8, the method determines if the jumper 18 is still recorded as being used. For example, if the technician 20 properly checked in the jumper 18 after its use, the log file no longer shows the jumper 18 as being used. In that case, the absence of the technician 20 is not critical and regarding the monitoring of the jumper use all is in order. The method proceeds along the No branch to the end at step A11.
If in step A8 the method determines that the jumper 18 is recorded as being used, a critical situation may exist because the jumper 18 is still in use, but the technician 20 is no longer present. For example, the technician 20 may have forgotten to remove the jumper 18 at the end of the service. In that case, the method proceeds along the Yes branch to a step A9.
In step A9, the method generates an alarm. In one embodiment, the alarm is communicated to the technician 20 using the mobile device 22. The mobile device 20 may display a text message, alone or in combination with symbols or light effects, vibrate, generate an audio message, or a combination thereof. In one embodiment, the alarm may be communicated to the technician's supervisor, e. g., in a manner that corresponds to the manner the alarm is communicated to the technician 20, for example, via a mobile device assigned to the supervisor.
Proceeding to a step A10, the method determines if the alarm is confirmed. The alarm requires a response or action either by the technician 20 or the supervisor. For example, if the technician 20 forgot to remove the jumper 18, the technician 20 is required to confirm that the jumper 18 has been removed, or will be removed shortly. In some situations it may be justified to leave the jumper 18 in place. In such a situation, however, the technician 20 may be required to report a justification, if any, for leaving the jumper 18 on site to the supervisor. The supervisor may accept such an explanation and disable the alarm.
In one embodiment, several jumpers 18 may be organized in a jumper kit 24.
The jumpers 18 and the transceiver 28 communicate with each other using wireless technology. Examples of such wireless technology are the RFID technology and the Bluetooth technology, as described above. If the ID device 26 of the jumper 18 and the transceiver 28 are within radio range, the transceiver 28 receives the ID number via a radio communications link existing between them. As the transceiver 28 receives a response from each jumper 18 present in the jumper kit 24 any “missing” jumper 18 can be identified.
As indicated by a symbol for a radio wave 29, the transceiver 28 not only communicates with the jumpers 18 of the jumper kit 25, but also with one or more other entities, as described below with reference to
The jumper kit 24 and, hence, its jumpers 18 may be assigned to the technician 20. For that purpose, the jumper kit 24 may have a number or code, e. g., a visible code or number on an outer surface, or an electronic number or code stored in the memory 23 coupled to the transceiver 28. In the latter case, the transceiver 28 can retrieve and transmit that number or code according to a preset schedule or in response to a received request. It is contemplated that the memory 23 may further store usage data, e. g., such as described above with reference to the memory 41.
The log server 46 may be maintained by the company that installed the elevator installation 1 and/or services the elevator installation 1. Its database 48 maintains records with details regarding serviced elevator installations 1 (e. g., locations, service records), names of its technicians 20, their contact information (e. g., device numbers or phone numbers of their mobile devices 22, or e-mail addresses), jumper kits 24 assigned to the technicians 20, IDs of the jumpers 18 assigned to each jumper kit 24. For example, if the ID of a jumper 18 is known, the database 48 allows identification of the jumper kit 24 to which this jumper 18 belongs and to which technician 20 the jumper kit 24 is assigned.
The control center 44 represents in one embodiment, a computing device of the technician's supervisor. The computing device may be also a mobile device, such as a smartphone, or a stationary computer at a service headquarters.
Also shown in
Referring to
Proceeding to a step S2, the method includes detecting removal of a jumper 18 from the jumper kit 24. When the technician 20 removes the jumper 18, and ultimately installs it in the elevator installation 1, the jumper 18 is no longer within radio range of the transceiver 28, and the transceiver 28 detects that that particular jumper 18 (e. g., with “ID=5) is no longer in the jumper kit 24. In one embodiment, the indicator 30 shown in
In one embodiment, while the technician 20 handles the jumper 18 or works in close proximity of the jumper 18, the communications link L5 shown in
Proceeding to a step S3, the method includes identifying, by the log server 46, the jumper ID sent by the transceiver 28. A software program being executed in the log server 46 uses the jumper ID to access the database 48 and retrieve information that identifies the jumper kit 24 to which the jumper ID is assigned and the technician 20 to which the jumper kit 24 is assigned. With the technician 20 being identified, the technician's contact information (e. g., phone number) is available as well.
Proceeding to a step S4, the method includes sending a message to the technician's mobile device 22. The message may be a text message (e. g., based on the Short Message Service (SMS)) sent to the phone number (e. g. obtained in the step S3) assigned to the mobile device 22. The text message requests the technician 20 to provide use particulars for the jumper 18, e. g., location and purpose of the use. In one embodiment, the message may start the jumper app which then requests input of the use particulars from the technician 20, e. g., via the fields 40, 42 shown in
Proceeding to a step S5, the method includes receiving use particulars. For example, the jumper app may prompt the technician 20 to enter the location of the jumper 18 via the field 40, and to specify its purpose via the field 42. As mentioned above, the mobile device 22 may receive the jumper ID directly from the jumper 18. In that case, the jumper app may automatically provide the jumper ID to the field 38. In the alternative, the jumper ID may be entered by the technician 20. Once these use particulars are provided, the jumper app causes the mobile device 22 to send the use particulars to the log server 46 where it is logged.
Proceeding to a step S6, the method includes sending the use particulars received in step S5 to the control center 44. As mentioned above, the control center 44 is in one embodiment a computing device of the technician's supervisor. It is contemplated that in certain embodiments it may not be necessary or desired to inform the supervisor, but the jumper use would still be logged at the control center and that, therefore, step S6 may be omitted. In that case, the monitoring function by the supervisor is disabled. The situations that allow such disabling may be defined by an administrator of the application.
Proceeding to a step S7, the method checks if the jumper 18 has been returned to the jumper kit 24. In one embodiment, that checking is performed by the log server 46 at regular intervals. The software program of the log server 46 monitors the status of the jumper 18 recorded in the log file. For example, a jumper 18 that is currently in use may be considered to having a status “in use”. At the end of the service, the technician 20 is supposed to remove the jumper 18 from the elevator installation 1 and to return it to the jumper kit 24. As soon as the jumper 18 is in the jumper kit 24, the transceiver 28 detects its presence and sends a message with the jumper ID to the log server 46. The log server 46 records the return of the jumper 18 and sets the jumper's status to “not in use.” The method then proceeds along the Yes branch to the end of the method in step S11.
If, however, the jumper 18 is not returned, the log server 46 will continue showing the jumper 18 with a status “in use,” i. e., as being used at the previously specified location in the elevator installation 1 by the technician 20. In that case, the method proceeds along the No branch to a step S8.
Referring to step S8, the method includes determining if the technician 20 is still on site, which is an indication of whether or not the technician 20 finished servicing the elevator installation 1. In one embodiment, the method verifies if the communications link L5 shown in
As an alternative to verifying if the communications link L5 still exists between the mobile device 22 and the jumper 18, the (GPS) positioning system of the mobile device 22 may be used to monitor the location of the technician 20. The positioning system may not be precise enough to determine if the technician 20 is in close proximity of the jumper 18, but sufficiently precise to determine whether or not the technician 20 is still at the site of the elevator installation 1.
Referring to the step S9, the method sends a warning message to the technician's mobile device 22 and possibly the supervisor. The warning message is sent to clarify a potentially critical situation: the technician 20 is no longer on site (see step S8) and the jumper 18 has not been returned (see step S7). The message may be presented to the technician 20 via a text message or the jumper app. The message informs the technician 20 that the jumper 18 has not yet been returned to the jumper kit 24. Further, the message requires the technician 20 to return the jumper 18 or to explain why it is still in use, e. g., via the jumper app or a phone call with the supervisor.
In one embodiment, a message is also sent to the jumper kit 24 to activate the indicator 30. This may serve as an additional measure to remind the technician 20 of the missing jumper 18.
In one embodiment, a corresponding warning message may also be sent to the control center 44 to inform the technician's supervisor. Sending the warning message to the control center 44 is an additional safety measure that ensures other persons are made aware of the potentially critical situation just in case the technician 20 does not receive the warning message or cannot act upon it.
Proceeding to a step S10, the method receives a confirmation regarding the warning message sent in step S9. The warning message requires a response or action either by the technician or the supervisor. For example, the technician 20 may be required to report back the justification, if any, for leaving the jumper 18 or the jumper kit 24 on site. If the technician 20 forgot to remove and return the jumper 18, the technician 20 is required to confirm that the jumper 18 has been returned or will be removed and returned shortly. In that case, the method proceeds to step S7 and will detect the return of the jumper 18, as described above. In the illustration of
It is apparent that there has been disclosed a technology for bypassing components of an electrical or electro-mechanical installation that fully satisfy the objects, means, and advantages set forth herein before. For example, logging and tracking the use of a jumper 18 reduces the potential risks associated with a jumper 18 being left in place after servicing the installation. In one embodiment (see
In either one of these monitoring schemes, the monitoring device and the associated jumper app running on the mobile device 22 can be configured for certain functionalities that further assist the monitoring. For these purposes, the jumper app may display various buttons to be clicked when needed. For example, the log file may be used to identify the time a communication with the jumper 18 broke down and where the mobile device 22 was located at that time. This provides information about where the jumper 18 was last “seen.” In another example, the mobile device 22 may cause (e. g., by emitting a polling signal) any ID device 26 within radio range to vibrate or to emit a sound. The technician 20 can then follow the sound and find the jumper 18. According to another function the mobile device 22 can generate and display a warning message if the jumper 18 and the mobile device are too far apart and the communication breaks down. The jumper app may also viewing a history of the jumper's use over time.
In accordance with the provisions of the patent statutes, the present invention has been described in what is considered to represent its preferred embodiment. However, it should be noted that the invention can be practiced otherwise than as specifically illustrated and described without departing from its spirit or scope.
Number | Date | Country | Kind |
---|---|---|---|
15186542.5 | Sep 2015 | EP | regional |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2016/072338 | 9/21/2016 | WO | 00 |