US20080240577A1 - Infrared safety systems and methods - Google Patents
Infrared safety systems and methods Download PDFInfo
- Publication number
- US20080240577A1 US20080240577A1 US10/851,600 US85160004A US2008240577A1 US 20080240577 A1 US20080240577 A1 US 20080240577A1 US 85160004 A US85160004 A US 85160004A US 2008240577 A1 US2008240577 A1 US 2008240577A1
- Authority
- US
- United States
- Prior art keywords
- detector
- detectors
- safety
- image
- zone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims description 23
- 238000003860 storage Methods 0.000 claims abstract description 10
- 230000003213 activating effect Effects 0.000 claims abstract description 3
- 230000008859 change Effects 0.000 claims description 8
- 230000033001 locomotion Effects 0.000 claims description 7
- 230000006870 function Effects 0.000 claims description 5
- 238000002329 infrared spectrum Methods 0.000 claims description 4
- 238000012544 monitoring process Methods 0.000 claims description 3
- 238000005259 measurement Methods 0.000 claims 1
- 230000000737 periodic effect Effects 0.000 claims 1
- 238000001514 detection method Methods 0.000 abstract description 17
- 230000005855 radiation Effects 0.000 description 17
- 231100001261 hazardous Toxicity 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 238000009434 installation Methods 0.000 description 5
- 241000282414 Homo sapiens Species 0.000 description 4
- 238000013461 design Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000001960 triggered effect Effects 0.000 description 4
- 238000003491 array Methods 0.000 description 3
- 230000003595 spectral effect Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000014759 maintenance of location Effects 0.000 description 2
- 238000004806 packaging method and process Methods 0.000 description 2
- 238000002310 reflectometry Methods 0.000 description 2
- 238000003466 welding Methods 0.000 description 2
- 241000282412 Homo Species 0.000 description 1
- 229910000831 Steel Inorganic materials 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000005286 illumination Methods 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000002156 mixing Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 239000010959 steel Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000011282 treatment Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- F—MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
- F16—ENGINEERING ELEMENTS AND UNITS; GENERAL MEASURES FOR PRODUCING AND MAINTAINING EFFECTIVE FUNCTIONING OF MACHINES OR INSTALLATIONS; THERMAL INSULATION IN GENERAL
- F16P—SAFETY DEVICES IN GENERAL; SAFETY DEVICES FOR PRESSES
- F16P3/00—Safety devices acting in conjunction with the control or operation of a machine; Control arrangements requiring the simultaneous use of two or more parts of the body
- F16P3/12—Safety devices acting in conjunction with the control or operation of a machine; Control arrangements requiring the simultaneous use of two or more parts of the body with means, e.g. feelers, which in case of the presence of a body part of a person in or near the danger zone influence the control or operation of the machine
- F16P3/14—Safety devices acting in conjunction with the control or operation of a machine; Control arrangements requiring the simultaneous use of two or more parts of the body with means, e.g. feelers, which in case of the presence of a body part of a person in or near the danger zone influence the control or operation of the machine the means being photocells or other devices sensitive without mechanical contact
- F16P3/142—Safety devices acting in conjunction with the control or operation of a machine; Control arrangements requiring the simultaneous use of two or more parts of the body with means, e.g. feelers, which in case of the presence of a body part of a person in or near the danger zone influence the control or operation of the machine the means being photocells or other devices sensitive without mechanical contact using image capturing devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/181—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
Definitions
- the present invention relates generally to industrial control systems, and more particularly to a system and methodology that projects electromagnetic energy into a region in order to determine an intrusion of people or objects in the region, wherein the determination is based upon a detection of an interruption in the electromagnetic energy.
- Many safety systems operate on the principal of first determining what type of object is within a region then potentially disabling some device after the determination. For example, many systems within the infrared safety domain utilize techniques that combine images then analyze the combined image via pixel spectral power, density and/or threshold values. Other techniques include measuring thermal properties; measuring moving surfaces (reflectivity, smoothness, and so forth.) and techniques utilized to determine position. The following provides a brief description and examples of some current implementations that employ one or more of the above techniques.
- One example includes a remote sensing system for real time monitoring of patient position which can report variations in patient setup from day to day as well as motion during individual treatments.
- this type system includes: (a) a source of radiation for applying radiation to a patient; (b) targets affixed to the patient for reflecting radiation impinging thereon; (c) two cameras and a computer for detecting the reflected radiation and for determining the current position of the targets in three-dimensional space; (d) a data store for storing the position of the targets; (e) the computer also serving to compare the current position of the targets with positions stored in the data store; and (f) a display for displaying indicators whenever differences between the current position and the stored position exceed tolerances stored in the data store.
- This type of system employs reflected radiation for determining the position of a person.
- Another example includes a system for detecting presence and/or motion of a person or other movable entity within a selected space. Detection is accomplished by detecting reflected light or other radiation from the space, presence being signified when detected radiation differs from an established background, either up or down, by an amount exceeding a predetermined threshold. Blending of the entity with the background is avoided by viewing the entity at least two different angles with different backgrounds, for example by use of two spaced detectors, and variations in background are automatically compensated for when a presence indication persists for a selected period of time after the last motion indication is received. The background is updated to the current level when this occurs.
- light sources are structured to irradiate substantially the entire space and saturation of a detector by ambient radiation is avoided by providing a band-pass filter which passes only radiation in a narrow overlap wavelength band for the radiation sources and detectors.
- This type system operates by analyzing reflected radiation from the space, wherein differences in the reflected radiation are detected.
- a system in yet another example, includes an infrared detector having two cameras for viewing a scene to detect humans.
- the cameras focus the scene on respective pixel arrays.
- One array is designed with a filter to be sensitive to light from 0.8 to 1.4 microns and the array of the other camera is designed with a filter to be sensitive from 1.4 microns to 2.2 microns.
- the arrays are co-registered spatially and temporally relative to the viewed scene and pixel transmission dynamics.
- the spectral powers of the pixels from both arrays are difference weighted and fused into one set of pixels.
- the fused pixels are thresholded into another set of pixels that have one of two values—black or white. These pixels are entered into a visual display that shows a segment image of a human if in the viewed scene.
- This type system employs image processing techniques that analyzes spectral densities associated with pixels.
- Another system includes a camera arrangement for detecting an object such as a driver or a child seat located on, above or in front of a vehicle seat.
- the system includes a camera for creating an image of any object in that position, and also includes an electromagnetic wave source such as an infrared light source.
- An image created with the source operational is stored in a first store and an image created with the source non-operational is stored in a second store.
- the stored images are then subtracted and any object in the subtraction image is identified by an image processor.
- the position of the object may also be determined and used to inhibit or modify the operation of a safety device such as an airbag in the vehicle.
- This type of system identifies an object by digital subtraction of images taken before and after illumination by a source.
- the present invention relates to a system and methodology that projects electromagnetic energy into a region (or regions) in order to determine an intrusion of people or objects in the region.
- the determination is based upon a detection of whether or not an interruption has occurred within the region as opposed to positively identifying what may have actually entered into the region.
- indications of intrusion can be made in a straightforward, reliable, economical, and highly robust manner by detecting the absence of energy rather than attempting to resolve or compute items within an image.
- an output device may be employed to disable equipment operating in or near the region in order to protect people or objects that may have entered the region.
- a notification may be sent or logged for further analysis indicating that an intrusion has occurred.
- one or more projectors direct electromagnetic energy (e.g., infrared spectrum images) into an area or region designated as a security or safety zone.
- One or more cameras or digital detectors record an image from the energized region during a period when only allowed objects (or no objects) are in the region.
- a space designated as a security zone may contain zero or more objects that normally occupy such space.
- the captured image from the space of allowed items (or no items) within the space is then stored by a processor. As time goes by, the processor and detector capture current images from the space at predetermined intervals.
- the processor After capturing a current image, the processor compares the current image with the previously stored image that contains allowed items. If an intrusion has occurred, portions of energy received by the detector is blocked or shielded from reaching the detector by the intruding device or person. Thus, after image comparison (e.g., digital subtraction of images), the processor detects a shadow (e.g., pixels not energized) in the current image, wherein such detection can then trigger further actions. For example, if a shadow or energy blockage is detected, hazardous equipment can be disabled or other events can be triggered such as sounding a warning. Other aspects include employment of multiple cameras for detecting differences with stored images, wherein differences detected by any of the cameras can trigger further actions. Also, multi-camera arrangements can be employed for three-dimensional reconstructions of an area for detecting objects or people therein.
- FIG. 1 is a schematic block diagram illustrates an automated safety system in accordance with an aspect of the present invention.
- FIG. 2 is a schematic diagram illustrating an example detection system in accordance with an aspect of the present invention.
- FIG. 3 is a diagram illustrating a projected image in a clear zone in accordance with an aspect of the present invention.
- FIG. 4 illustrates a projected image an obstructed zone in accordance with an aspect of the present invention.
- FIG. 5 illustrates multiple zones and shapes for an area in accordance with an aspect of the present invention.
- FIG. 6 illustrates an integrated design for a detector in accordance with an aspect of the present invention.
- FIG. 7 illustrates a modular design for a detector in accordance with an aspect of the present invention.
- FIG. 8 illustrates projection angles in accordance with an aspect of the present invention.
- FIG. 9 illustrates a detection methodology in accordance with an aspect of the present invention.
- FIG. 10 illustrates an alternative detection system for determining contours in a 3D image in accordance with an aspect of the present invention.
- the present invention relates to a system and methodology facilitating automated intrusion detection within a region of space in an industrial controller environment.
- An automated safety system is provided having at least one projector to direct electromagnetic energy into a region of space associated with a security, warning, or safety zone.
- a detector or detectors senses an interruption of the electromagnetic energy in the region of space by an object or person that may enter the space.
- the system includes a processor and a storage component, wherein the processor determines the interruption by comparing a current image from the detector with a previously stored image in the storage component.
- the processor Upon detection, the processor triggers an event based upon the comparison, whereby the event includes such aspects as activating an output, de-energizing a machine, sounding a warning, sounding an alarm, storing data associated with the event, and sending a notification to a local or a remote system, for example.
- the processor and associated projector/detector can project/construct two-dimensional images or three-dimensional images in order to determine the interruption.
- a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program and a computer.
- a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program and a computer.
- an application running on a server and the server can be components.
- One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers (e.g., via data packets and signals between the computers), industrial controllers, and/or modules communicating therewith.
- a system 100 illustrates an automated safety system in accordance with an aspect of the present invention.
- the system 100 includes one or more projectors 110 that direct electromagnetic energy 120 (e.g., infrared spectrum images) into an area or region 130 designated as a security or safety zone.
- electromagnetic energy 120 e.g., infrared spectrum images
- infrared radiation or energy 120 is selected since this type of radiation is invisible to the human eye.
- other frequencies such as visible frequencies may be employed.
- One or more cameras or digital detectors 140 record an image 150 from the energized region 130 during a period when only allowed objects (or no objects) are in the region.
- the region 130 can be allocated as a security zone that may contain zero or more objects that normally occupy the region.
- the captured image 150 from the space of allowed items (or no items) within the region 130 is then stored by a processor 160 having associated memory components and respective processor support components. As time goes by, the processor 160 and detector 140 capture current images 150 from the region 130 at predetermined intervals (e.g., at 10 or 20 hertz intervals).
- the processor 160 After capturing a current image 150 , the processor 160 compares the current image with the previously stored image that contains allowed items. If an intrusion has occurred in the region 130 , portions of energy received by the detector 140 is blocked or shielded from reaching the detector 140 by the intruding device or person. It is noted that intrusions may occur from substantially any direction into the region 130 as illustrated at 180 (e.g., up, down, left, right, from an angle and so forth). Thus, after image comparison (e.g., digital subtraction of images), the processor 160 detects a shadow (e.g., pixels not energized or lightly energized) in the current image 150 , wherein such detection can then trigger further actions.
- a shadow e.g., pixels not energized or lightly energized
- hazardous equipment can be disabled or other events can be triggered at 170 by the processor 160 such as sounding a warning or sending a notification (e.g., electronic message, e-mail).
- a notification e.g., electronic message, e-mail
- thresholds can be set up in the processor 160 to make intrusion determinations (e.g., more than three pixels having lower returned energy, fire an event).
- the system 100 can be employed in various applications that are designed to facilitate safety in an industrial environment.
- the system 100 can be employed as an Infrared Safety Camera targeted for applications in which a machine or installation can be stopped in any position in its production cycle. This can include machine stoppage via the event 170 which can trigger an output device such as a relay, for example.
- the system 100 is typically not employed to safeguard installations with rundown time or end-of cycle applications. Examples of safety applications (e.g., where machines are shut down upon detecting intrusion) include: robotic cells (welding, assembly), packaging machines, large machine entrances, hot storages such as in foundries, and so forth.
- This system 100 can also apply to the following example industries:
- the system 200 includes an Infrared Safety Camera 210 providing two PNP safety outputs 220 that drive a safety relay 230 having associated contacts 240 .
- the Infrared Safety Camera 220 can be designed to safeguard man and machine against hazards through moving parts and stored energy.
- the Infrared Safety Camera 220 can be part of a safety system 200 in which the Infrared Safety Camera has the function of a presence-sensing device, whereas other parts such as the safety relay 230 and contactors 240 are employed for disabling devices after presence has been detected.
- the Infrared Safety Camera 210 includes a single infrared projector, two infrared cameras, a safe processor, software for the processor, and two safe outputs 220 .
- the projector can be mounted in a housing with the respective cameras (e.g., respective cameras on either side of projector) and the processor may be constructed in the same housing with the safe outputs 220 , if desired.
- the projector projects a pattern on a surface, (crosses, stripes, or other pattern), whereby it is not required the surface is flat.
- both cameras are aimed at the same area as where the pattern is projected, whereby the respective cameras are generally situated at a slightly different angle.
- each of the cameras has a picture stored that was taken at the time of machine installation.
- a current picture or image taken at regular intervals e.g., 10 Hz
- one of the cameras detects a difference with the stored picture, it is compared with the active danger area to switch the status of the outputs 230 .
- the cameras combine a current picture and form a 3D relief, as soon as the 3D relief alters, the processor determines if the change takes place inside a danger zone (as with a laser scanner) if so, the outputs 220 of the Infrared Safety Camera 210 change state.
- Pattern By projecting a regular pattern this can be regarded as a form of detection Resolution, rather than taking a picture and depend upon the density of pixels. If an object such as an arm, leg, etc. enters the zone where the pattern is projected, a shadow is created on the place where before the projection was (See FIGS. 3 and 4 below). The shadow or obstruction is then detected by the cameras. If the pattern on the surface is for instance 40 mm (50 mm minimum detectable object size), this may be observed as limb detection in conformity with specification EN61496, for example.
- the pattern projected should be invisible, non-hazardous infrared light with a wavelength between 840 nm and 950 nm. There is generally no need for coding the light source (projector).
- the projector can optionally be equipped with a zoom lens with adjustments for setting focus.
- the Infrared Safety Camera 210 can be programmed in a similar way as a safety laser scanner and can include warning zones and safety zones which are described in more detail below.
- a wired connection should be employed to visualize the combined life picture taken by both the cameras. Through this picture, the safety zone(s) and warning zone(s) can be independently programmed. This can be achieved in a similar manner as the commercially available ABGM SafeZone Safety Laser Scanner, for example.
- the Infrared Safety Camera 210 can be designed to be mounted vertically above a hazardous area or in the vicinity, looking under an angle toward or away from the hazard. Optionally, for some applications it is also possible to mount the camera horizontally.
- a system 300 illustrates a projected image in a clear zone in accordance with an aspect of the present invention.
- the system 300 includes a safety camera 310 having associated cameras 320 and projector 330 .
- the projector 330 projects an image 340 into a designated zone having a fixed object 350 therein.
- the zone where the projected image 340 is directed is considered a clear zone during initial installation, thus implying that no objects or people normally not in the zone are present.
- the respective cameras 320 capture a picture (pixels) of the image 340 . These captured images are illustrated at 360 and 370 , respectively.
- FIG. 4 illustrates a projected image in an obstructed zone in accordance with an aspect of the present invention.
- an object 410 enters the designated zone and blocks electromagnetic energy from being directed in a projected image at 420 .
- the projected image 420 is then captured by detectors of a safety camera 430 , the captured images are shown with missing elements (or lowly-illuminated pixels) at 440 and 450 , respectively.
- the images 440 and 450 are compared to images taken without the intruding object 410 , a determination can be made that an object has entered the zone since, for example, a subtraction of the respective images would indicate that some of the previously illuminated pixels are now darkened (e.g., lowered in digital value of intensity) by the intrusion.
- events can be fired that turn off associated machinery or cause other actions to occur.
- FIG. 5 illustrates multiple zones and shapes for an area 500 in accordance with an aspect of the present invention.
- the area designated for protection can be sectioned into one or more zones having differing sizes and shapes (e.g., circular, triangular, rectangular, irregular, cubic, and so forth).
- a warning zone 510 can be configured on an exterior perimeter of the area 500 that if an object is detected therein, a warning or some other indication can be given without actually disabling associated equipment. If an object were to enter a safety zone 520 , more direct actions can occur such as actually removing power from respective equipment.
- one or more other zones 530 can be similarly configured having varying degrees of consequences or events associated therewith for objects entering such zones.
- the systems of the present invention are designed for industrial use.
- the task is to detect access of persons to dangerous areas 500 and stop the hazardous movement of a machine in this area.
- a signal is triggered when a person or object enters the monitored area 500 in accordance with the following examples:
- Warning, Safety and or other zones can be achieved through commercially available SCD (Safety Configuration and Diagnostic) Windows-based software. Warning and Safety zones are easily configured through the use of the PCs mouse, for example. Actions such as clicking and dragging points along the perimeter of a desired zone to shape the contour of the zone can be easily achieved.
- SCD Safety Configuration and Diagnostic
- FIG. 6 illustrates an integrated design 600 for a detector and safety instrument in accordance with an aspect of the present invention.
- This aspect illustrates how various components of the safety systems described above can be packaged into a singular housing.
- one or more of the following components may be packaged such as a processor 610 and associated circuits, one or more detectors 620 , generally one projector 630 , but others can be employed, associated output components 640 that can be triggered by the processor 610 upon detecting an intruding object or person.
- the output components can include various aspects such as output controls for controlling switches, electronic capabilities such as logging events, or other capabilities such as remote network access for notifying people authorized people of an occurrence(s) of an intrusion.
- the system 600 can be designed in a modular manner, whereby one or more of the components 610 - 640 are adapted and operate remote from the system.
- FIG. 7 illustrates a modular design for a detector and safety system 700 in accordance with an aspect of the present invention.
- one or more of the respective components of the system may be adapted to work as separate components that communicate with one another.
- this type of system may or may not be adapted as a safety system, such systems could also be employed as a security system, wherein an area is monitored for unwanted intruders and warnings and/or alarms are generated upon detected entry of designated areas.
- the system 700 includes a projector 710 that projects into an area 720 . Radiation from the area 720 is received by one or more detectors 730 that transmit images over a remote link 740 to a programmable logic controller 750 .
- the controller 750 is associated with an output module 760 that controls equipment 770 .
- the controller 750 can perform image comparisons and activate or deactivate the equipment 760 via the output module 760 .
- the controller could monitor one or more areas 720 via various detectors 730 , whereby if intrusions are detected in the respective areas, the controller could log the event, send electronic messages to authorities, sound alarms, and/or send messages to substantially any location via wireless mechanisms or more traditional communication modalities such as over the Internet, for example.
- FIG. 8 illustrates projection angles 800 in accordance with an aspect of the present invention.
- electromagnetic energy can be transmitted to and received from substantially any angle.
- the diagram 800 depicts different relationships such as energy being provided to an area 810 from above the area at 820 and/or below the are at 830 .
- energy can be directed from differing sides and at varying depths of an area such as at 840 and 850 , for example.
- energy can be received from a plurality of differing angles such as illustrated at 860 .
- intrusions can be detected from a plurality of angles and directions.
- FIG. 9 illustrates a detection methodology 900 in accordance with an aspect the present invention. While, for purposes of simplicity of explanation, the methodology is shown and described as a series of acts, it is to be understood and appreciated that the present invention is not limited by the order of acts, as some acts may, in accordance with the present invention, occur in different orders and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram. Moreover, not all illustrated acts may be required to implement a methodology in accordance with the present invention.
- a pattern is projected as electromagnetic energy on an area or designated zone.
- the pattern can include substantially any type of pattern and the energy can be in the infrared spectrum or other frequency.
- an initial image is captured of the pattern during a period when it is known that no unintended objects are in the area. This period often correlates to an initial installation of the system.
- images of the designated area are captured at regular intervals (can also occur a periodically).
- a determination is made as to whether or not an intrusion has occurred. This is achieved by comparing the initial image captured with subsequent images that are captured at 930 and determining whether or not some of the pixels after comparison are at a different intensity than the originally captured pixels.
- the process proceeds to 950 and triggers an event such as energizing/de-energizing an output, sounding an alarm, or generating a notification, for example. If no change is detected at 940 , the process proceeds back to 930 and continues to monitor for subsequent intrusions into the designated or defined area. As noted above, three-dimensional reconstructions can be created with multiple detectors to determine intrusions in multiple dimensions of space.
- FIG. 10 illustrates an alternative detection system 1000 for determining contours in a 3D image in accordance with an aspect of the present invention.
- a Distance A at 1010 is shown between a camera A 1020 and a camera B 1030 , wherein Distance A is defined as a known parameter or distance.
- An angle a at 1040 under which camera A 1020 receives input from a projection C at 1050 is known as an angle b at 1060 under which camera B 1030 receives input from projection C 1050 .
- the angles a 1040 and b 1060 are derived from 2D pictures created by both cameras 1020 and 1030 , respectively.
- aspects of the system 1000 include:
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Mechanical Engineering (AREA)
- Burglar Alarm Systems (AREA)
- Alarm Systems (AREA)
- Emergency Alarm Devices (AREA)
- Geophysics And Detection Of Objects (AREA)
Abstract
Description
- The present invention relates generally to industrial control systems, and more particularly to a system and methodology that projects electromagnetic energy into a region in order to determine an intrusion of people or objects in the region, wherein the determination is based upon a detection of an interruption in the electromagnetic energy.
- Many safety systems operate on the principal of first determining what type of object is within a region then potentially disabling some device after the determination. For example, many systems within the infrared safety domain utilize techniques that combine images then analyze the combined image via pixel spectral power, density and/or threshold values. Other techniques include measuring thermal properties; measuring moving surfaces (reflectivity, smoothness, and so forth.) and techniques utilized to determine position. The following provides a brief description and examples of some current implementations that employ one or more of the above techniques.
- One example includes a remote sensing system for real time monitoring of patient position which can report variations in patient setup from day to day as well as motion during individual treatments. In particular, this type system includes: (a) a source of radiation for applying radiation to a patient; (b) targets affixed to the patient for reflecting radiation impinging thereon; (c) two cameras and a computer for detecting the reflected radiation and for determining the current position of the targets in three-dimensional space; (d) a data store for storing the position of the targets; (e) the computer also serving to compare the current position of the targets with positions stored in the data store; and (f) a display for displaying indicators whenever differences between the current position and the stored position exceed tolerances stored in the data store. This type of system employs reflected radiation for determining the position of a person.
- Another example includes a system for detecting presence and/or motion of a person or other movable entity within a selected space. Detection is accomplished by detecting reflected light or other radiation from the space, presence being signified when detected radiation differs from an established background, either up or down, by an amount exceeding a predetermined threshold. Blending of the entity with the background is avoided by viewing the entity at least two different angles with different backgrounds, for example by use of two spaced detectors, and variations in background are automatically compensated for when a presence indication persists for a selected period of time after the last motion indication is received. The background is updated to the current level when this occurs. With light radiation, light sources are structured to irradiate substantially the entire space and saturation of a detector by ambient radiation is avoided by providing a band-pass filter which passes only radiation in a narrow overlap wavelength band for the radiation sources and detectors. This type system operates by analyzing reflected radiation from the space, wherein differences in the reflected radiation are detected.
- In yet another example, a system includes an infrared detector having two cameras for viewing a scene to detect humans. The cameras focus the scene on respective pixel arrays. One array is designed with a filter to be sensitive to light from 0.8 to 1.4 microns and the array of the other camera is designed with a filter to be sensitive from 1.4 microns to 2.2 microns. The arrays are co-registered spatially and temporally relative to the viewed scene and pixel transmission dynamics. The spectral powers of the pixels from both arrays are difference weighted and fused into one set of pixels. The fused pixels are thresholded into another set of pixels that have one of two values—black or white. These pixels are entered into a visual display that shows a segment image of a human if in the viewed scene. This type system employs image processing techniques that analyzes spectral densities associated with pixels.
- Another system includes a camera arrangement for detecting an object such as a driver or a child seat located on, above or in front of a vehicle seat. The system includes a camera for creating an image of any object in that position, and also includes an electromagnetic wave source such as an infrared light source. An image created with the source operational is stored in a first store and an image created with the source non-operational is stored in a second store. The stored images are then subtracted and any object in the subtraction image is identified by an image processor. The position of the object may also be determined and used to inhibit or modify the operation of a safety device such as an airbag in the vehicle. This type of system identifies an object by digital subtraction of images taken before and after illumination by a source.
- Although the above systems serve various applications, these systems suffer in that reflected radiation from the object must first be received by a detector and then post processed in order to make a determination or identification regarding the object. These types of analyses can be prone to error depending on the reflectivity of the object, speed of the object, and other factors associated with object variables.
- The following presents a simplified summary of the invention in order to provide a basic understanding of some aspects of the invention. This summary is not an extensive overview of the invention. It is intended to neither identify key or critical elements of the invention nor delineate the scope of the invention. Its sole purpose is to present some concepts of the invention in a simplified form as a prelude to the more detailed description that is presented later.
- The present invention relates to a system and methodology that projects electromagnetic energy into a region (or regions) in order to determine an intrusion of people or objects in the region. The determination is based upon a detection of whether or not an interruption has occurred within the region as opposed to positively identifying what may have actually entered into the region. Thus, indications of intrusion can be made in a straightforward, reliable, economical, and highly robust manner by detecting the absence of energy rather than attempting to resolve or compute items within an image. After detection, an output device may be employed to disable equipment operating in or near the region in order to protect people or objects that may have entered the region. Also, a notification may be sent or logged for further analysis indicating that an intrusion has occurred.
- In one aspect, one or more projectors direct electromagnetic energy (e.g., infrared spectrum images) into an area or region designated as a security or safety zone. One or more cameras or digital detectors record an image from the energized region during a period when only allowed objects (or no objects) are in the region. For example, a space designated as a security zone may contain zero or more objects that normally occupy such space. The captured image from the space of allowed items (or no items) within the space is then stored by a processor. As time goes by, the processor and detector capture current images from the space at predetermined intervals.
- After capturing a current image, the processor compares the current image with the previously stored image that contains allowed items. If an intrusion has occurred, portions of energy received by the detector is blocked or shielded from reaching the detector by the intruding device or person. Thus, after image comparison (e.g., digital subtraction of images), the processor detects a shadow (e.g., pixels not energized) in the current image, wherein such detection can then trigger further actions. For example, if a shadow or energy blockage is detected, hazardous equipment can be disabled or other events can be triggered such as sounding a warning. Other aspects include employment of multiple cameras for detecting differences with stored images, wherein differences detected by any of the cameras can trigger further actions. Also, multi-camera arrangements can be employed for three-dimensional reconstructions of an area for detecting objects or people therein.
- The following description and the annexed drawings set forth in detail certain illustrative aspects of the invention. These aspects are indicative, however, of but a few of the various ways in which the principles of the invention may be employed and the present invention is intended to include all such aspects and their equivalents. Other advantages and novel features of the invention will become apparent from the following detailed description of the invention when considered in conjunction with the drawings.
-
FIG. 1 is a schematic block diagram illustrates an automated safety system in accordance with an aspect of the present invention. -
FIG. 2 is a schematic diagram illustrating an example detection system in accordance with an aspect of the present invention. -
FIG. 3 is a diagram illustrating a projected image in a clear zone in accordance with an aspect of the present invention. -
FIG. 4 illustrates a projected image an obstructed zone in accordance with an aspect of the present invention. -
FIG. 5 illustrates multiple zones and shapes for an area in accordance with an aspect of the present invention. -
FIG. 6 illustrates an integrated design for a detector in accordance with an aspect of the present invention. -
FIG. 7 illustrates a modular design for a detector in accordance with an aspect of the present invention. -
FIG. 8 illustrates projection angles in accordance with an aspect of the present invention. -
FIG. 9 illustrates a detection methodology in accordance with an aspect of the present invention. -
FIG. 10 illustrates an alternative detection system for determining contours in a 3D image in accordance with an aspect of the present invention. - The present invention relates to a system and methodology facilitating automated intrusion detection within a region of space in an industrial controller environment. An automated safety system is provided having at least one projector to direct electromagnetic energy into a region of space associated with a security, warning, or safety zone. A detector or detectors senses an interruption of the electromagnetic energy in the region of space by an object or person that may enter the space. The system includes a processor and a storage component, wherein the processor determines the interruption by comparing a current image from the detector with a previously stored image in the storage component. Upon detection, the processor triggers an event based upon the comparison, whereby the event includes such aspects as activating an output, de-energizing a machine, sounding a warning, sounding an alarm, storing data associated with the event, and sending a notification to a local or a remote system, for example. The processor and associated projector/detector can project/construct two-dimensional images or three-dimensional images in order to determine the interruption.
- It is noted that as used in this application, terms such as “component,” “model,” “system,” and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution as applied to an automation system for industrial control. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program and a computer. By way of illustration, both an application running on a server and the server can be components. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers (e.g., via data packets and signals between the computers), industrial controllers, and/or modules communicating therewith.
- Referring initially to
FIG. 1 , asystem 100 illustrates an automated safety system in accordance with an aspect of the present invention. Thesystem 100 includes one ormore projectors 110 that direct electromagnetic energy 120 (e.g., infrared spectrum images) into an area orregion 130 designated as a security or safety zone. In general, infrared radiation orenergy 120 is selected since this type of radiation is invisible to the human eye. However, it is to be appreciated that other frequencies such as visible frequencies may be employed. One or more cameras ordigital detectors 140 record animage 150 from the energizedregion 130 during a period when only allowed objects (or no objects) are in the region. For example, theregion 130 can be allocated as a security zone that may contain zero or more objects that normally occupy the region. The capturedimage 150 from the space of allowed items (or no items) within theregion 130, is then stored by aprocessor 160 having associated memory components and respective processor support components. As time goes by, theprocessor 160 anddetector 140 capturecurrent images 150 from theregion 130 at predetermined intervals (e.g., at 10 or 20 hertz intervals). - After capturing a
current image 150, theprocessor 160 compares the current image with the previously stored image that contains allowed items. If an intrusion has occurred in theregion 130, portions of energy received by thedetector 140 is blocked or shielded from reaching thedetector 140 by the intruding device or person. It is noted that intrusions may occur from substantially any direction into theregion 130 as illustrated at 180 (e.g., up, down, left, right, from an angle and so forth). Thus, after image comparison (e.g., digital subtraction of images), theprocessor 160 detects a shadow (e.g., pixels not energized or lightly energized) in thecurrent image 150, wherein such detection can then trigger further actions. For example, if a shadow or energy blockage is detected, hazardous equipment can be disabled or other events can be triggered at 170 by theprocessor 160 such as sounding a warning or sending a notification (e.g., electronic message, e-mail). It is also noted that thresholds can be set up in theprocessor 160 to make intrusion determinations (e.g., more than three pixels having lower returned energy, fire an event). - The
system 100 can be employed in various applications that are designed to facilitate safety in an industrial environment. In one aspect, thesystem 100 can be employed as an Infrared Safety Camera targeted for applications in which a machine or installation can be stopped in any position in its production cycle. This can include machine stoppage via theevent 170 which can trigger an output device such as a relay, for example. Thesystem 100 is typically not employed to safeguard installations with rundown time or end-of cycle applications. Examples of safety applications (e.g., where machines are shut down upon detecting intrusion) include: robotic cells (welding, assembly), packaging machines, large machine entrances, hot storages such as in foundries, and so forth. Thissystem 100 can also apply to the following example industries: - Automotive industry: Welding robots
-
- Assembly cells
- Transfer lines
General industry: Packaging - Storage and retrieval
- Handling systems
- Conveyor systems
Steel industry: Hot storages - Dusty environments
- Other industries where machine/human safety or security is of concern.
- Other example applications include employment of multiple cameras for detecting differences with stored images, wherein differences detected by any of the cameras can trigger further actions. Also, multi-camera arrangements can be employed for three-dimensional reconstructions of an area for detecting objects or people therein. These applications are described in more detail below.
- Referring now to
FIG. 2 , anexample detection system 200 is illustrated in accordance with an aspect of the present invention. Thesystem 200 includes anInfrared Safety Camera 210 providing twoPNP safety outputs 220 that drive asafety relay 230 having associatedcontacts 240. TheInfrared Safety Camera 220 can be designed to safeguard man and machine against hazards through moving parts and stored energy. TheInfrared Safety Camera 220 can be part of asafety system 200 in which the Infrared Safety Camera has the function of a presence-sensing device, whereas other parts such as thesafety relay 230 andcontactors 240 are employed for disabling devices after presence has been detected. - In one example, the
Infrared Safety Camera 210 includes a single infrared projector, two infrared cameras, a safe processor, software for the processor, and twosafe outputs 220. The projector can be mounted in a housing with the respective cameras (e.g., respective cameras on either side of projector) and the processor may be constructed in the same housing with thesafe outputs 220, if desired. The projector projects a pattern on a surface, (crosses, stripes, or other pattern), whereby it is not required the surface is flat. Typically, both cameras are aimed at the same area as where the pattern is projected, whereby the respective cameras are generally situated at a slightly different angle. - The following describes example operations of the
system 200 although other operations can also be provided. - In one example, each of the cameras has a picture stored that was taken at the time of machine installation. A current picture or image taken at regular intervals (e.g., 10 Hz) is compared with a stored picture or image. When one of the cameras detects a difference with the stored picture, it is compared with the active danger area to switch the status of the
outputs 230. - In another example, the cameras combine a current picture and form a 3D relief, as soon as the 3D relief alters, the processor determines if the change takes place inside a danger zone (as with a laser scanner) if so, the
outputs 220 of theInfrared Safety Camera 210 change state. - The following aspects describe various features of the Infrared Safety Camera 210:
- Pattern: By projecting a regular pattern this can be regarded as a form of detection Resolution, rather than taking a picture and depend upon the density of pixels. If an object such as an arm, leg, etc. enters the zone where the pattern is projected, a shadow is created on the place where before the projection was (See
FIGS. 3 and 4 below). The shadow or obstruction is then detected by the cameras. If the pattern on the surface is for instance 40 mm (50 mm minimum detectable object size), this may be observed as limb detection in conformity with specification EN61496, for example. - Light: In general, the pattern projected should be invisible, non-hazardous infrared light with a wavelength between 840 nm and 950 nm. There is generally no need for coding the light source (projector).
- Optics: The projector can optionally be equipped with a zoom lens with adjustments for setting focus.
- Software: Through software, the
Infrared Safety Camera 210 can be programmed in a similar way as a safety laser scanner and can include warning zones and safety zones which are described in more detail below. - Programming: A wired connection should be employed to visualize the combined life picture taken by both the cameras. Through this picture, the safety zone(s) and warning zone(s) can be independently programmed. This can be achieved in a similar manner as the commercially available ABGM SafeZone Safety Laser Scanner, for example.
- Mounting: The
Infrared Safety Camera 210 can be designed to be mounted vertically above a hazardous area or in the vicinity, looking under an angle toward or away from the hazard. Optionally, for some applications it is also possible to mount the camera horizontally. - Turning to
FIG. 3 , asystem 300 illustrates a projected image in a clear zone in accordance with an aspect of the present invention. Thesystem 300 includes a safety camera 310 having associatedcameras 320 andprojector 330. Theprojector 330 projects animage 340 into a designated zone having a fixedobject 350 therein. The zone where the projectedimage 340 is directed is considered a clear zone during initial installation, thus implying that no objects or people normally not in the zone are present. During this time, therespective cameras 320 capture a picture (pixels) of theimage 340. These captured images are illustrated at 360 and 370, respectively. -
FIG. 4 illustrates a projected image in an obstructed zone in accordance with an aspect of the present invention. In this aspect, anobject 410 enters the designated zone and blocks electromagnetic energy from being directed in a projected image at 420. When the projectedimage 420 is then captured by detectors of a safety camera 430, the captured images are shown with missing elements (or lowly-illuminated pixels) at 440 and 450, respectively. Thus, when the 440 and 450 are compared to images taken without the intrudingimages object 410, a determination can be made that an object has entered the zone since, for example, a subtraction of the respective images would indicate that some of the previously illuminated pixels are now darkened (e.g., lowered in digital value of intensity) by the intrusion. As noted above, after detecting the intrusion, events can be fired that turn off associated machinery or cause other actions to occur. -
FIG. 5 illustrates multiple zones and shapes for anarea 500 in accordance with an aspect of the present invention. In this aspect, the area designated for protection can be sectioned into one or more zones having differing sizes and shapes (e.g., circular, triangular, rectangular, irregular, cubic, and so forth). For example, awarning zone 510 can be configured on an exterior perimeter of thearea 500 that if an object is detected therein, a warning or some other indication can be given without actually disabling associated equipment. If an object were to enter asafety zone 520, more direct actions can occur such as actually removing power from respective equipment. As can be appreciated, one or moreother zones 530 can be similarly configured having varying degrees of consequences or events associated therewith for objects entering such zones. - In general, the systems of the present invention are designed for industrial use. Thus, the task is to detect access of persons to
dangerous areas 500 and stop the hazardous movement of a machine in this area. A signal is triggered when a person or object enters the monitoredarea 500 in accordance with the following examples: -
- If a person or object is present within the
warning zone 510, a relay contact can be switched at the corresponding signal output. This signal can be used for acoustic and optical warnings. Warnings are to indicate that the hazardous area is to be left before the protective field is activated, and before the system issues a stop signal that would trigger a machine stop. - If a person or object is present within the
safety zone 520 the system switches two independent relay contacts. This signal leads to an immediate switching off of the dangerous machine movement.
- If a person or object is present within the
- Configuration of the Warning, Safety and or other zones can be achieved through commercially available SCD (Safety Configuration and Diagnostic) Windows-based software. Warning and Safety zones are easily configured through the use of the PCs mouse, for example. Actions such as clicking and dragging points along the perimeter of a desired zone to shape the contour of the zone can be easily achieved.
-
FIG. 6 illustrates anintegrated design 600 for a detector and safety instrument in accordance with an aspect of the present invention. This aspect illustrates how various components of the safety systems described above can be packaged into a singular housing. Thus, one or more of the following components may be packaged such as aprocessor 610 and associated circuits, one ormore detectors 620, generally oneprojector 630, but others can be employed, associatedoutput components 640 that can be triggered by theprocessor 610 upon detecting an intruding object or person. The output components can include various aspects such as output controls for controlling switches, electronic capabilities such as logging events, or other capabilities such as remote network access for notifying people authorized people of an occurrence(s) of an intrusion. As can be appreciated, thesystem 600 can be designed in a modular manner, whereby one or more of the components 610-640 are adapted and operate remote from the system. -
FIG. 7 illustrates a modular design for a detector andsafety system 700 in accordance with an aspect of the present invention. In this aspect one or more of the respective components of the system may be adapted to work as separate components that communicate with one another. Although this type of system may or may not be adapted as a safety system, such systems could also be employed as a security system, wherein an area is monitored for unwanted intruders and warnings and/or alarms are generated upon detected entry of designated areas. Thesystem 700 includes aprojector 710 that projects into anarea 720. Radiation from thearea 720 is received by one ormore detectors 730 that transmit images over aremote link 740 to aprogrammable logic controller 750. - The
controller 750 is associated with anoutput module 760 that controlsequipment 770. Thus, thecontroller 750 can perform image comparisons and activate or deactivate theequipment 760 via theoutput module 760. Also, rather than controlling equipment, the controller could monitor one ormore areas 720 viavarious detectors 730, whereby if intrusions are detected in the respective areas, the controller could log the event, send electronic messages to authorities, sound alarms, and/or send messages to substantially any location via wireless mechanisms or more traditional communication modalities such as over the Internet, for example. -
FIG. 8 illustrates projection angles 800 in accordance with an aspect of the present invention. As noted above, electromagnetic energy can be transmitted to and received from substantially any angle. The diagram 800 depicts different relationships such as energy being provided to anarea 810 from above the area at 820 and/or below the are at 830. Also, energy can be directed from differing sides and at varying depths of an area such as at 840 and 850, for example. Also, energy can be received from a plurality of differing angles such as illustrated at 860. As can be appreciated, intrusions can be detected from a plurality of angles and directions. -
FIG. 9 illustrates adetection methodology 900 in accordance with an aspect the present invention. While, for purposes of simplicity of explanation, the methodology is shown and described as a series of acts, it is to be understood and appreciated that the present invention is not limited by the order of acts, as some acts may, in accordance with the present invention, occur in different orders and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram. Moreover, not all illustrated acts may be required to implement a methodology in accordance with the present invention. - Proceeding to 910, a pattern is projected as electromagnetic energy on an area or designated zone. As noted above, the pattern can include substantially any type of pattern and the energy can be in the infrared spectrum or other frequency. At 920, an initial image is captured of the pattern during a period when it is known that no unintended objects are in the area. This period often correlates to an initial installation of the system. At 930, during operations, images of the designated area are captured at regular intervals (can also occur a periodically). At 940, a determination is made as to whether or not an intrusion has occurred. This is achieved by comparing the initial image captured with subsequent images that are captured at 930 and determining whether or not some of the pixels after comparison are at a different intensity than the originally captured pixels. If a change is detected at 940, the process proceeds to 950 and triggers an event such as energizing/de-energizing an output, sounding an alarm, or generating a notification, for example. If no change is detected at 940, the process proceeds back to 930 and continues to monitor for subsequent intrusions into the designated or defined area. As noted above, three-dimensional reconstructions can be created with multiple detectors to determine intrusions in multiple dimensions of space.
-
FIG. 10 illustrates analternative detection system 1000 for determining contours in a 3D image in accordance with an aspect of the present invention. In this aspect, a Distance A at 1010 is shown between acamera A 1020 and acamera B 1030, wherein Distance A is defined as a known parameter or distance. An angle a at 1040 under whichcamera A 1020 receives input from a projection C at 1050 is known as an angle b at 1060 under whichcamera B 1030 receives input fromprojection C 1050. Through straightforward trigonometry, it is therefore possible to determine the distances from cameras A 1020 andB 1030 toprojection C 1050. If this is performed with all projections, a 3D contour image results. The angles a 1040 andb 1060 are derived from 2D pictures created by both 1020 and 1030, respectively. Several aspects of thecameras system 1000 include: -
- 1) Angle measuring: the 3D picture, built up from the 2 or more 2D pictures taken by the cameras, is based upon angle measuring. This can be achieved by determining the difference in angle where the same projection is detected by the cameras. The 3D picture is therefore based upon angle measuring.
- 2) Recognition zone: in addition to “other zones”, besides safety zone and warning zone, it is possible that an object placed in a pre-determined zone, programmed in the safety camera, is used to determine a certain contour, if the contour meets pre-programmed requirements, then this object is allowed to enter a safety zone without causing the outputs to change state. This is similar to a form of muting as with light curtains.
- 3) Inputs: the camera assembly may be equipped with one or more inputs to activate desired functionality.
- 4) Configuration storage: The camera may be equipped with a configuration module storing the programmed configuration for ease of exchange-ability.
- 5) Reference projection: the projector may be equipped with 1 or more reference projections as a basis to synchronize the cameras as part of the total assembly in order to allow angle measuring.
- 6) Auxilliary projectors: it is possible to equip certain (e.g., moving) objects in the camera's active zone with self contained auxiliary projectors. These emit an energy detectable by the camera assembly, that may be used to track movement of these object(s) to activate other functions in the camera assembly.
- 7) Other functions: the inputs and/or auxiliary projectors may trigger the camera to change the pre-programmed zones (safety, warning, recognition, other) to an other pre-programmed zone or allow the camera to work with “active” zones, including zones adapting to the actual state of the machinery guarded by the safety camera.
- 8) System input: the safety camera assembly may be equipped with one or more I/O ports to connect one or more safety camera assembly's with each other forming a functional chain.
- What has been described above are preferred aspects of the present invention. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the present invention, but one of ordinary skill in the art will recognize that many further combinations and permutations of the present invention are possible. Accordingly, the present invention is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims.
Claims (35)
Priority Applications (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/851,600 US7440620B1 (en) | 2004-05-21 | 2004-05-21 | Infrared safety systems and methods |
| EP05010799A EP1598792B1 (en) | 2004-05-21 | 2005-05-18 | Infrared safety systems and methods |
| CNA2005100837873A CN1755741A (en) | 2004-05-21 | 2005-05-20 | Infrared safety system and method |
| JP2005147581A JP2005339543A (en) | 2004-05-21 | 2005-05-20 | Infrared safety system and method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/851,600 US7440620B1 (en) | 2004-05-21 | 2004-05-21 | Infrared safety systems and methods |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20080240577A1 true US20080240577A1 (en) | 2008-10-02 |
| US7440620B1 US7440620B1 (en) | 2008-10-21 |
Family
ID=34936661
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US10/851,600 Active 2026-08-18 US7440620B1 (en) | 2004-05-21 | 2004-05-21 | Infrared safety systems and methods |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US7440620B1 (en) |
| EP (1) | EP1598792B1 (en) |
| JP (1) | JP2005339543A (en) |
| CN (1) | CN1755741A (en) |
Cited By (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100057244A1 (en) * | 2006-09-04 | 2010-03-04 | Robert Bosch Gmbh | Machine tool monitoring device |
| US20100066983A1 (en) * | 2008-06-17 | 2010-03-18 | Jun Edward K Y | Methods and systems related to a projection surface |
| US20100300256A1 (en) * | 2007-09-20 | 2010-12-02 | Andreas Loewe | Machine tool safety device |
| US20110167970A1 (en) * | 2007-12-21 | 2011-07-14 | Robert Bosch Gmbh | Machine tool device |
| US8311661B2 (en) * | 2006-09-04 | 2012-11-13 | Robert Bosch Gmbh | Machine tool use situation monitoring device using reflected signal |
| WO2013119822A1 (en) * | 2012-02-10 | 2013-08-15 | Visualant, Inc. | Area surveillance systems and methods |
| US20140063239A1 (en) * | 2012-02-10 | 2014-03-06 | Visualant, Inc. | Area surveillance systems and methods |
| CN105785706A (en) * | 2016-05-20 | 2016-07-20 | 中山市厚源电子科技有限公司 | A naked-eye 3D imaging device using phantom imaging film |
| US20160319989A1 (en) * | 2013-12-24 | 2016-11-03 | Robert Bosch Gmbh | Power Tool with Ultrasonic Sensor for Sensing Contact between an Implement and an Object |
| US20180233008A1 (en) * | 2014-09-17 | 2018-08-16 | Van Ginderen License And Finance B.V. | A method guarding an object or area, a guarding unit and a computer program product |
| WO2019005916A1 (en) * | 2017-06-28 | 2019-01-03 | Schneider Electric It Corporation | Systems and methods of intrusion detection for rack enclosures |
| US10482322B2 (en) | 2017-05-17 | 2019-11-19 | Fanuc Corporation | Monitor apparatus for monitoring spatial region set by dividing monitor region |
| US20200027324A1 (en) * | 2017-12-06 | 2020-01-23 | Illinois Tool Works Inc. | Method of increasing detection zone of a shadow-based video intrusion detection system |
| US11061989B2 (en) * | 2018-09-28 | 2021-07-13 | Sick Ag | Method and apparatus for checking a configuration parameter value |
Families Citing this family (38)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2005324297A (en) * | 2004-05-17 | 2005-11-24 | Matsushita Electric Ind Co Ltd | robot |
| KR100630842B1 (en) * | 2005-06-08 | 2006-10-02 | 주식회사 현대오토넷 | Vehicle posture identification system and its method using stereo image matching |
| US8081304B2 (en) | 2006-07-31 | 2011-12-20 | Visualant, Inc. | Method, apparatus, and article to facilitate evaluation of objects using electromagnetic energy |
| AU2007332145A1 (en) * | 2006-12-11 | 2008-06-19 | Conseng Pty Ltd | Monitoring system |
| DE102007036129B3 (en) * | 2007-08-01 | 2008-09-25 | Sick Ag | Device and method for the three-dimensional monitoring of a spatial area with at least two image sensors |
| DE102007045528A1 (en) * | 2007-09-24 | 2009-04-23 | Siemens Ag | Medical diagnostic and / or therapy system and method for visualizing monitoring areas in a medical diagnostic and / or therapy system |
| EP2318804B1 (en) * | 2008-04-17 | 2017-03-29 | Shilat Optronics Ltd | Intrusion warning system |
| US8639527B2 (en) | 2008-04-30 | 2014-01-28 | Ecolab Usa Inc. | Validated healthcare cleaning and sanitizing practices |
| JP5539964B2 (en) | 2008-04-30 | 2014-07-02 | エコラボ インコーポレイティド | Effective medical institution cleaning and disinfection |
| WO2010002237A2 (en) * | 2008-06-30 | 2010-01-07 | Mimos Berhad | Intrusion detection using parallax information |
| WO2010143092A2 (en) | 2009-06-12 | 2010-12-16 | Ecolab Usa Inc. | Hand hygiene compliance monitoring |
| USRE48951E1 (en) | 2015-08-05 | 2022-03-01 | Ecolab Usa Inc. | Hand hygiene compliance monitoring |
| DE102009031732B3 (en) * | 2009-07-04 | 2010-11-25 | Sick Ag | Distance measuring optoelectronic sensor e.g. laser scanner, for monitoring operating area, has illumination unit activated with increased power, when no impermissible object contact is recognized |
| CN101794064B (en) * | 2009-12-21 | 2012-01-11 | 深圳雅图数字视频技术有限公司 | Projection development device and control method thereof |
| US8427324B2 (en) | 2010-07-30 | 2013-04-23 | General Electric Company | Method and system for detecting a fallen person using a range imaging device |
| US20120106778A1 (en) * | 2010-10-28 | 2012-05-03 | General Electric Company | System and method for monitoring location of persons and objects |
| US20140210620A1 (en) | 2013-01-25 | 2014-07-31 | Ultraclenz Llc | Wireless communication for dispenser beacons |
| US8421624B2 (en) * | 2011-05-09 | 2013-04-16 | Tau-Jeng Hsu | Home security system |
| CN102542715A (en) * | 2011-12-21 | 2012-07-04 | 西安石油大学 | Intelligent alarm device for personnel intrusion based on optical coding technology |
| WO2013119824A1 (en) | 2012-02-10 | 2013-08-15 | Visualant, Inc. | Systems, methods and articles related to machine-readable indicia and symbols |
| US9316581B2 (en) | 2013-02-04 | 2016-04-19 | Visualant, Inc. | Method, apparatus, and article to facilitate evaluation of substances using electromagnetic energy |
| US9041920B2 (en) | 2013-02-21 | 2015-05-26 | Visualant, Inc. | Device for evaluation of fluids using electromagnetic energy |
| US9664610B2 (en) | 2013-03-12 | 2017-05-30 | Visualant, Inc. | Systems for fluid analysis using electromagnetic energy that is reflected a number of times through a fluid contained within a reflective chamber |
| US9256944B2 (en) * | 2014-05-19 | 2016-02-09 | Rockwell Automation Technologies, Inc. | Integration of optical area monitoring with industrial machine control |
| US9435635B1 (en) * | 2015-02-27 | 2016-09-06 | Ge Aviation Systems Llc | System and methods of detecting an intruding object in a relative navigation system |
| US10043288B2 (en) | 2015-11-10 | 2018-08-07 | Honeywell International Inc. | Methods for monitoring combustion process equipment |
| DE102015224309A1 (en) * | 2015-12-04 | 2017-06-08 | Kuka Roboter Gmbh | Representation of variable protective fields |
| CH712366A1 (en) * | 2016-04-15 | 2017-10-31 | Rieter Ag Maschf | Method of operating a bale opener and bale opener. |
| DE102016118758B4 (en) * | 2016-10-04 | 2025-10-09 | Sick Ag | Optoelectronic sensor and method for optically detecting a surveillance area |
| CN110383355B (en) | 2017-03-07 | 2021-08-27 | 埃科莱布美国股份有限公司 | Monitoring module for hand hygiene dispenser |
| US10619107B2 (en) | 2017-06-22 | 2020-04-14 | Honeywell International Inc. | Heater coil |
| US10529219B2 (en) | 2017-11-10 | 2020-01-07 | Ecolab Usa Inc. | Hand hygiene compliance monitoring |
| JP7435988B2 (en) | 2018-12-17 | 2024-02-21 | 日本電気通信システム株式会社 | Area presentation system, area presentation method and program |
| EP3900307A1 (en) | 2018-12-20 | 2021-10-27 | Ecolab USA, Inc. | Adaptive route, bi-directional network communication |
| US11927488B2 (en) * | 2019-01-03 | 2024-03-12 | Chia-Ling Chen | Thermal detection system capable of providing early warning and related products |
| IT201900021108A1 (en) * | 2019-11-13 | 2021-05-13 | Gamma System S R L | Safety system for an industrial machinery |
| US11823559B2 (en) | 2019-12-16 | 2023-11-21 | Motorola Solutions, Inc. | Method and system to project guidance to building occupants during an emergency situation |
| US12128852B2 (en) * | 2022-04-20 | 2024-10-29 | Caterpillar Sarl | System and method for maintaining a power source for continuous machine security monitoring |
Citations (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4196425A (en) * | 1978-07-10 | 1980-04-01 | by said David S. Weekly said Clyde E. Williams | Patient activity monitoring system |
| US5066950A (en) * | 1988-04-27 | 1991-11-19 | Driver Safety Systems Ltd. | Traffic safety monitoring apparatus |
| US5164707A (en) * | 1990-02-28 | 1992-11-17 | Cabot Safety Corporation | Detection system for safety equipment |
| US5334972A (en) * | 1990-07-11 | 1994-08-02 | Optex Co., Ltd. | Infrared intruder-detection system |
| US5406073A (en) * | 1993-01-25 | 1995-04-11 | Phoenix Controls Corporation | System for detecting a movable entity within a selected space |
| US5446548A (en) * | 1993-10-08 | 1995-08-29 | Siemens Medical Systems, Inc. | Patient positioning and monitoring system |
| US6297844B1 (en) * | 1999-11-24 | 2001-10-02 | Cognex Corporation | Video safety curtain |
| US6370260B1 (en) * | 1999-09-03 | 2002-04-09 | Honeywell International Inc. | Near-IR human detector |
| US6720874B2 (en) * | 2000-09-29 | 2004-04-13 | Ids Systems, Inc. | Portal intrusion detection apparatus and method |
| US6806811B1 (en) * | 2002-03-27 | 2004-10-19 | Blaine C. Readler | Infra-red perimeter alarm |
| US6841780B2 (en) * | 2001-01-19 | 2005-01-11 | Honeywell International Inc. | Method and apparatus for detecting objects |
| US6998982B2 (en) * | 2002-12-06 | 2006-02-14 | Optex Co., Ltd. | Anti-thief security sensor assembly with variable amount of emitted infrared beam |
| US7084761B2 (en) * | 2001-12-19 | 2006-08-01 | Hitachi, Ltd. | Security system |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPS59193382A (en) * | 1983-04-18 | 1984-11-01 | Sogo Keibi Hoshiyou Kk | Detecting apparatus for invader |
| JPH02182093A (en) * | 1989-01-07 | 1990-07-16 | Mitsubishi Electric Corp | monitoring device |
| JPH0431996A (en) * | 1990-05-28 | 1992-02-04 | Matsushita Electric Works Ltd | Image recognition type burgler sensor |
| JP2000036084A (en) * | 1998-07-16 | 2000-02-02 | Hyper Electronics:Kk | Entering object monitoring device |
| GB2366862B (en) | 2000-09-14 | 2004-09-22 | Autoliv Dev | Improvements in or relating to a camera arrangement |
| JP2003099861A (en) * | 2001-09-26 | 2003-04-04 | Kumahira Safe Co Inc | Human body detecting device and room entering leaving control system |
-
2004
- 2004-05-21 US US10/851,600 patent/US7440620B1/en active Active
-
2005
- 2005-05-18 EP EP05010799A patent/EP1598792B1/en not_active Ceased
- 2005-05-20 JP JP2005147581A patent/JP2005339543A/en active Pending
- 2005-05-20 CN CNA2005100837873A patent/CN1755741A/en active Pending
Patent Citations (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4196425A (en) * | 1978-07-10 | 1980-04-01 | by said David S. Weekly said Clyde E. Williams | Patient activity monitoring system |
| US5066950A (en) * | 1988-04-27 | 1991-11-19 | Driver Safety Systems Ltd. | Traffic safety monitoring apparatus |
| US5164707A (en) * | 1990-02-28 | 1992-11-17 | Cabot Safety Corporation | Detection system for safety equipment |
| US5334972A (en) * | 1990-07-11 | 1994-08-02 | Optex Co., Ltd. | Infrared intruder-detection system |
| US5406073A (en) * | 1993-01-25 | 1995-04-11 | Phoenix Controls Corporation | System for detecting a movable entity within a selected space |
| US5446548A (en) * | 1993-10-08 | 1995-08-29 | Siemens Medical Systems, Inc. | Patient positioning and monitoring system |
| US6370260B1 (en) * | 1999-09-03 | 2002-04-09 | Honeywell International Inc. | Near-IR human detector |
| US6297844B1 (en) * | 1999-11-24 | 2001-10-02 | Cognex Corporation | Video safety curtain |
| US6720874B2 (en) * | 2000-09-29 | 2004-04-13 | Ids Systems, Inc. | Portal intrusion detection apparatus and method |
| US6841780B2 (en) * | 2001-01-19 | 2005-01-11 | Honeywell International Inc. | Method and apparatus for detecting objects |
| US7084761B2 (en) * | 2001-12-19 | 2006-08-01 | Hitachi, Ltd. | Security system |
| US6806811B1 (en) * | 2002-03-27 | 2004-10-19 | Blaine C. Readler | Infra-red perimeter alarm |
| US6998982B2 (en) * | 2002-12-06 | 2006-02-14 | Optex Co., Ltd. | Anti-thief security sensor assembly with variable amount of emitted infrared beam |
Cited By (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100057244A1 (en) * | 2006-09-04 | 2010-03-04 | Robert Bosch Gmbh | Machine tool monitoring device |
| US8311661B2 (en) * | 2006-09-04 | 2012-11-13 | Robert Bosch Gmbh | Machine tool use situation monitoring device using reflected signal |
| US8386067B2 (en) * | 2006-09-04 | 2013-02-26 | Robert Bosch Gmbh | Machine tool monitoring device |
| US20100300256A1 (en) * | 2007-09-20 | 2010-12-02 | Andreas Loewe | Machine tool safety device |
| US20110167970A1 (en) * | 2007-12-21 | 2011-07-14 | Robert Bosch Gmbh | Machine tool device |
| US8948903B2 (en) * | 2007-12-21 | 2015-02-03 | Robert Bosch Gmbh | Machine tool device having a computing unit adapted to distinguish at least two motions |
| US20100066983A1 (en) * | 2008-06-17 | 2010-03-18 | Jun Edward K Y | Methods and systems related to a projection surface |
| WO2013119822A1 (en) * | 2012-02-10 | 2013-08-15 | Visualant, Inc. | Area surveillance systems and methods |
| US20140063239A1 (en) * | 2012-02-10 | 2014-03-06 | Visualant, Inc. | Area surveillance systems and methods |
| US20160319989A1 (en) * | 2013-12-24 | 2016-11-03 | Robert Bosch Gmbh | Power Tool with Ultrasonic Sensor for Sensing Contact between an Implement and an Object |
| US10330258B2 (en) * | 2013-12-24 | 2019-06-25 | Robert Bosch Tool Corporation | Power tool with ultrasonic sensor for sensing contact between an implement and an object |
| US20180233008A1 (en) * | 2014-09-17 | 2018-08-16 | Van Ginderen License And Finance B.V. | A method guarding an object or area, a guarding unit and a computer program product |
| CN105785706A (en) * | 2016-05-20 | 2016-07-20 | 中山市厚源电子科技有限公司 | A naked-eye 3D imaging device using phantom imaging film |
| US10482322B2 (en) | 2017-05-17 | 2019-11-19 | Fanuc Corporation | Monitor apparatus for monitoring spatial region set by dividing monitor region |
| WO2019005916A1 (en) * | 2017-06-28 | 2019-01-03 | Schneider Electric It Corporation | Systems and methods of intrusion detection for rack enclosures |
| CN111095370A (en) * | 2017-06-28 | 2020-05-01 | 施耐德电气It公司 | System and method for intrusion detection for rack-mounted chassis |
| US20200027324A1 (en) * | 2017-12-06 | 2020-01-23 | Illinois Tool Works Inc. | Method of increasing detection zone of a shadow-based video intrusion detection system |
| US10650646B2 (en) * | 2017-12-06 | 2020-05-12 | Illinois Tool Works Inc. | Method of increasing detection zone of a shadow-based video intrusion detection system |
| CN111727435A (en) * | 2017-12-06 | 2020-09-29 | 伊利诺斯工具制品有限公司 | Method for Enlarging Detection Area of Shadow-Based Video Intrusion Detection System |
| US11061989B2 (en) * | 2018-09-28 | 2021-07-13 | Sick Ag | Method and apparatus for checking a configuration parameter value |
Also Published As
| Publication number | Publication date |
|---|---|
| CN1755741A (en) | 2006-04-05 |
| EP1598792A1 (en) | 2005-11-23 |
| JP2005339543A (en) | 2005-12-08 |
| EP1598792B1 (en) | 2012-12-26 |
| US7440620B1 (en) | 2008-10-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7440620B1 (en) | Infrared safety systems and methods | |
| KR102786033B1 (en) | Monitoring device, industrial equipment, monitoring method, and computer program | |
| US7768549B2 (en) | Machine safety system with mutual exclusion zone | |
| US9596451B2 (en) | Device for monitoring at least one three-dimensional safety area | |
| JP6449263B2 (en) | Apparatus and method for protecting an automatically operating machine | |
| US7167575B1 (en) | Video safety detector with projected pattern | |
| US7924164B1 (en) | Method for sensing the presence of a human body part within a region of a machine tool | |
| US6469734B1 (en) | Video safety detector with shadow elimination | |
| US8988527B2 (en) | Method and apparatus for monitoring a three-dimensional spatial area | |
| US20160321900A1 (en) | System and method for monitoring and suppressing fire | |
| CN108958097B (en) | The monitoring arrangement that the area of space that segmentation monitor area obtains is monitored | |
| EP1249135A4 (en) | Video safety curtain | |
| JP2003222295A (en) | Method and device for controlling safety-related function of machine | |
| JP2006501487A (en) | Method and apparatus for protecting hazardous areas | |
| CN113739058B (en) | Optoelectronic safety sensor and method for safeguarding a machine | |
| JP5027273B2 (en) | Object detection sensor and security system | |
| JPH08160127A (en) | Target proximity detection method from moving body | |
| JP2011215772A (en) | Object detection sensor | |
| US20080055081A1 (en) | Access Control Apparatus | |
| US20220196844A1 (en) | System and Method For Preventing Collision | |
| JP3244554B2 (en) | Mobile body smoke detector | |
| JP5027272B2 (en) | Object detection sensor | |
| JP2025036161A (en) | Non-contact protection in machine collaborative working areas | |
| Kerezović et al. | Human safety in robot applications–review of safety trends | |
| KR20100078677A (en) | Monitoring method having a function of detering trespasser and apparatus thereof |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: ROCKWELL AUTOMATION B.V., NETHERLANDS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AARTSEN, FRANK ARTHUR;REEL/FRAME:015537/0839 Effective date: 20040521 |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| FPAY | Fee payment |
Year of fee payment: 4 |
|
| FPAY | Fee payment |
Year of fee payment: 8 |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |