CONTACTLESS SAFEGUARDING AT A COOPERATION ZONE OF A MACHINE

20250073932 ยท 2025-03-06

    Inventors

    Cpc classification

    International classification

    Abstract

    A method for a contactless safeguarding at a cooperation zone of a machine is provided wherein an access zone for a worker is arranged at a first side of the cooperation zone and a working zone of the machine is arranged at a second side, wherein a plurality of protected fields configured in the environment of the cooperation zone are monitored for protected field intrusions by at least one optoelectronic sensor and at least two of the protected fields 38) are arranged in a first sequence starting from the first side such that a worker sequentially intrudes into these protected fields when approaching the cooperation zone, and wherein the protected field intrusions are evaluated to safeguard the machine in the case of an unpermitted combination of protected field intrusions. In this respect, at least two of the protected fields are arranged in a second sequence starting from the second side such that the machine sequentially intrudes in these protected fields when approaching the cooperation zone.

    Claims

    1. A method for contactless safeguarding at a cooperation zone of a machine, wherein an access zone for a worker is arranged at a first side of the cooperation zone and a working zone of the machine is arranged at a second side different from the first side, wherein a plurality of protected fields configured in the environment of the cooperation zone are monitored for protected field intrusions by at least one optoelectronic sensor and at least two of the protected fields are arranged in a first sequence starting from the first side such that a worker sequentially intrudes into these protected fields when approaching the cooperation zone, wherein the protected field intrusions are evaluated to safeguard the machine in the case of an unpermitted combination of protected field intrusions, and wherein at least two of the protected fields are arranged in a second sequence starting from the second side such that the machine sequentially intrudes in these protected fields when approaching the cooperation zone.

    2. The method in accordance with claim 1, wherein the machine comprises at least one robot.

    3. The method in accordance with claim 1, wherein the optoelectronic sensor is a 3D sensor; and wherein the protected fields are three-dimensional protected fields.

    4. The method in accordance with claim 3, wherein the optoelectronic sensor is a time of flight camera.

    5. The method in accordance with claim 1, wherein at least two optoelectronic sensors each monitor some of the protected fields; and wherein at least one protected field is monitored by both optoelectronic sensors and is therefore monitored at an elevated safety level.

    6. The method in accordance with claim 5, wherein one protected field comprises the cooperation zone and this protected field is monitored by both optoelectronic sensors.

    7. The method in accordance with claim 1, wherein it is considered a permitted combination of protected field intrusions when protected fields of the first sequence and/or of the second sequence are infringed sequentially from the outside to the inside, with inside designating the cooperation zone, but with a minimum number of protected fields without a protected field intrusion remaining between protected fields of the two sequences here.

    8. The method in accordance with claim 7, wherein, when a protected field of the first sequence is infringed, the machine may no longer intrude into a protected field associated with the first sequence corresponding to the minimum number and the machine retreats therefrom provided that it already intrudes into the associated protected field.

    9. The method in accordance with claim 7, wherein the machine continues to work without any restriction of its work speed on observing a minimum number of two.

    10. The method in accordance with claim 7, wherein the worker receives a warning not to further approach the cooperation zone on observing only a minimum number of one.

    11. The method in accordance with claim 7, wherein the machine is safeguarded when a minimum number has not been observed.

    12. The method in accordance with claim 7, wherein the machine restarts automatically as soon as the minimum number has been reestablished or a protected field is no longer infringed.

    13. The method in accordance with claim 1, wherein, for the evaluation of the protected field intrusions and the measures therefore to be taken with respect to the machine, a finite state machine is used whose transitions are determined by an additional intrusion into a protected field of a sequence or the ending of an intrusion into the protected field of a sequence is determined; and wherein the measures are a moving of the machine away from the cooperation zone in the second direction, a prohibition of intrusions into a protected field by the machine, and/or the canceling of a prohibition of intrusions into a protected field.

    14. The method in accordance with claim 1, wherein the first sequence comprises, from the outside to the inside with respect to the cooperation zone, a first protected field , a second protected field , and a third protected field , the cooperation zone is monitored by a fourth protected field and the second sequence, starting from the inside to the outside of the cooperation zone, comprises a fifth protected field and a sixth protected field .

    15. The method in accordance with claim 1, wherein two optoelectronic sensors monitor five protected fields W, A, B, C, D, namely the one optoelectronic sensor in the access zone monitors an outer first protected field W, a second protected field A enclosing the zone between the first protected field W and the cooperation zone, and a fourth protected field C adjoining in the working zone and comprising the cooperation zone and the other optoelectronic sensor in the working zone monitors an outer fifth protected field D and a third protected field B comprising the cooperation zone and projecting into the access zone.

    16. The method in accordance with claim 15, wherein the monitoring processes of the two sensors overlap at least in the fourth protected field C so that a higher safety level is reached here.

    17. The method in accordance with claim 15, wherein the first protected field W is monitored as a functional first protected field , the second protected field A without the third protected field B as a second functional protected field , the third protected field B without the fourth protected field C as a functional third protected field , an overlap zone of the third protected field B with the fourth protected field C as a functional fourth protected field , the fourth protected field C without the third protected field B as a functional fifth protected field , and the fifth protected field D without the fourth protected field C as a sixth protected field .

    18. A monitoring device for contactless safeguarding at a cooperation zone of a machine, wherein an access zone for a worker is arranged at a first side of the cooperation zone and a working zone of the machine is arranged at a second side different from the first side, wherein the monitoring device has at least one safe optoelectronic sensor having a light receiver for generating a received signal and has a control and evaluation unit that is configured to monitor a plurality of protected fields configured in the environment of the cooperation zone for protected field intrusions with reference to the received signal, wherein the protected fields are configured such that at least two of the protected fields are arranged in a first sequence starting from the first side such that a worker sequentially intrudes into these protected fields when approaching the cooperation zone, and wherein the control and evaluation unit is configured to evaluate the protected field intrusions to safeguard the machine in the case of an unpermitted combination of protected field intrusions, and wherein the protected fields are configured such that at least two of the protected fields are arranged in a second sequence starting from the second side such that the machine sequentially intrudes in these protected fields when approaching the cooperation zone.

    19. The monitoring device in accordance with claim 18, wherein the machine comprises at least one robot.

    20. The monitoring device in accordance with claim 18, wherein the safe optoelectronic sensor is a 3D camera.

    Description

    [0036] The invention will be explained in more detail in the following also with respect to further features and advantages by way of example and with reference to embodiments and to the enclosed drawing. The Figures of the drawing show in:

    [0037] FIG. 1 a schematic block diagram of a 3D time of flight camera;

    [0038] FIG. 2 a schematic representation of a monitoring device having two cameras and a safety controller;

    [0039] FIG. 3 a schematic representation of protected field configuration of a first camera;

    [0040] FIG. 4 a schematic representation of a protected field configuration of a second camera;

    [0041] FIG. 5 a schematic representation of the combined protected field configuration of both cameras in accordance with FIGS. 3 and 4;

    [0042] FIG. 6 an alternative representation of the protected field configuration of the first camera in accordance with FIG. 3 from a plan view;

    [0043] FIG. 7 an alternative representation of the protected field configuration of the second camera in accordance with FIG. 4 from a plan view;

    [0044] FIG. 8 an alternative representation of the combined protected field configuration of both cameras in accordance with FIG. 5 from a plan view;

    [0045] FIG. 9 a representation similar to FIG. 8 in which the protected fields actually monitored by the cameras are combined by a common evaluation to form more finely defined functional protected fields;

    [0046] FIG. 10 a schematic representation of an exemplary approach situation of a worker still at a greater distance from the machine to be safeguarded that can simultaneously be understood as an exemplary state of a finite state machine;

    [0047] FIG. 11 a schematic representation of the approach situation of a worker now at a small distance from the machine to be safeguarded that can simultaneously be understood as a further exemplary state of the finite state machine;

    [0048] FIG. 12 a schematic representation of the approach situation of a worker now completely without a defined distance from the machine to be safeguarded that can simultaneously be understood as a further exemplary state of the finite state machine; and

    [0049] FIG. 13 an overview representation of the finite state machine from which three states are illustrated by way of example in FIGS. 10 to 12.

    [0050] FIG. 1 shows a schematic block diagram of a camera 10 that is preferably configured as a 3D time of flight camera and that will be described as representative for an optoelectronic sensor that can be used in connection with the invention. An illumination unit 12 transmits transmitted light 16 modulated by a transmission optics 14 into a monitored zone 18. LEDs or lasers in the form of edge emitters or VSCELs can be considered as the light source. The illumination unit 12 is controllable such that the amplitude of the transmitted light 16 is modulated at a frequency typically in the range of 1 MHz to 1000 MHz The modulation is, for example, sinusoidal or rectangular, at least a periodic modulation. A limited unambiguity range of the distance measurement is produced by the frequency so that small modulation frequencies are required for large ranges of the camera 10. Alternatively, measurements are carried out at two to three or more modulation frequencies to increase the unambiguity range in a combination of measurements.

    [0051] When the transmitted light 16 is incident on an object or a person 20 in the monitored zone 18, a portion of the received light 22 is reflected back to the camera 10 and is guided there through a reception optics 24, for example a single lens or a reception objective, onto an image sensor 26. The image sensor 26 has a plurality of reception elements or reception pixels 26a arranged to form a matrix or a row, for example. The resolution of the image sensor 26 can extend from two or some few up to thousands or millions of reception pixels 26a. A demodulation corresponding to a lock-in process takes place therein. A plurality of scan values from which ultimately the phase shift between the transmitted light 16 and the received light 22, and thus the time of flight, can be measured are generated by repeated detection with a modulation of the transmitted light 16 respectively slightly displaced over the repetitions. The pixel arrangement is typically a matrix so that a lateral spatial resolution results in an X direction and in a Y direction, which is supplemented by the Z direction of the distance measurement to form the three-dimensional image data. This 3D detection is preferably meant when a 3D camera, a 3D time of flight camera, or three-dimensional image data are spoken of. In principle, however, different pixel arrangements are also conceivable; for instance, a pixel row that is selected in a matrix or that forms the whole image sensor of a line scan camera.

    [0052] A plurality of protected fields can be configured in a control and evaluation unit 28. A protected field is defined by geometrical specifications for a partial zone of the monitored zone 18 that are configured or are fed in via an interface 30, for example in a CAD program or in any other manner by means of the control and evaluation unit 28. The protected fields are monitored for object intrusions and, on a protected field intrusion, a safe output signal is output at a safe output 32, 34. A plurality of safe outputs 32, 34 are preferably provided per protected field or the output signal encodes the protected fields respectively impacted by intrusions at a single safe output. The camera 10 and in particular the protected field evaluation together with the output signals are preferably safe in the sense defined in the introduction.

    [0053] The described 3D camera 10, in particular a TOF camera, is particularly suitable for the safeguarding in accordance with the invention. Other sensors are, however, also possible, in particular a safety laser scanner. Certain restrictions then possibly have to be accepted, for example by conditions on the application geometry.

    [0054] FIG. 2 shows a schematic representation of a monitoring device having two cameras 10a-b, each connected to a safety controller 36. The combination of a plurality of cameras 10a-b is particularly advantageous; the invention can, however, also be implemented with only one camera 10a-b. Only an elevated safety level in protected fields monitored in an overlapping manner, which will be looked at later, is not achievable with only one camera 10a-b. The safety controller 36 permits a higher ranking evaluation of the protected field intrusions that are reported by the individual cameras 10a-b. If a hazard is recognized here, a safety related signal is output to a monitored machine or to a robot. The machine or robot thereupon becomes slower or diverges to worksteps that can at least not be a hazard with this recognized object movement and the machine is only switched to a safe state in case of an emergency. High availability and productivity are thus achieved overall. The specific monitoring in accordance with the invention will be explained in more detail in the following with reference to FIGS. 3 to 13.

    [0055] The distribution of the evaluation over internal and external control and evaluation units 28 of the cameras 10a-b for recognizing protected field intrusions and for a higher ranking evaluation of the protected field intrusions in the safety controller 36 is particularly advantageous. A very simple logic, for example in the form of a finite state machine that does not make any high hardware demands, is sufficient in the safety controller. The invention is, however, not restricted to a specific association of the evaluation functionality to specific hardware modules, but can rather be distributed as desired over external and internal, including the extreme cases in which no separate evaluation at all takes place in the cameras 10a-b, or conversely at least one of the cameras 10a-b integrates the functionality of the safety controller. Examples for an internal processing unit are digital processing modules such as a microprocessor or a CPU (central processing unit), an FPGA (field programmable gate array), a DSP (digital signal processor), an ASIC (application specific integrated circuit), an Al processor, an NPU (neural processing unit), a GPU (graphics processing unit), a VPU (video processing unit), or the like. An external processing unit can, in addition to the already mentioned safety controller 36, be a computer of any desired kind, including notebooks, smartphones or tablets, equally a local network, an edge device, or a cloud.

    [0056] FIGS. 3 and 4 show a schematic representation of an exemplary configuration of protected fields 38 for safeguarding a machine 40, shown as a robot by way of representation, of the first camera 10a or of the second camera 10b. FIG. 5 is an associated combined view of the superposed protected field configuration of both cameras 10a-b. FIGS. 6 and 7 show the individual protected field configurations of FIGS. 3 and 4 again alternatively from a plan view, correspondingly FIG. 8 shows the combined protected field configuration of FIG. 5 in a plan view.

    [0057] The protected fields 38 are shown in section in FIGS. 3 to 5 and have an additional depth extent that can be seen from the plan view of FIGS. 6 to 8. They are therefore spatial three-dimensional protected fields. The machine 40 is located in a mechanically safeguarded working zone 42, for example in a robot cell, inaccessible to persons. A worker 46, only shown in FIGS. 6 to 8, can enter a cooperation zone 48 via an access zone 44 safeguarded by the protected fields 38 to there, for example, to feed a workpiece or material to the machine 40 or to accept it.

    [0058] The first camera 10a monitors three protected fields W, A, C that are arranged in a row in a connection direction between the machine 40 and the approaching worker 46. The protected field W may only be a warning field that therefore like a protected field recognizes object intrusions and permits corresponding responses, that is does not have any actual safety function unlike a protected field. In the example shown, the robot cannot even physically reach the warning field W so that no protective function is required here. The second camera 10b correspondingly monitors two consecutive protected fields B and D. The geometry of the protected fields 38 is somewhat more complex to adapt to the spatial circumstances, for instance with a cutout 50 in the environment of the cooperation zone 48. A common protected field sequence W, A, B, C, D is produced in the combined protected field monitoring. This sequence and the contribution of the individual cameras 10a-b can be understood again in a symbolic overview 52 of FIGS. 6 to 8 only added for explanation.

    [0059] The protected fields W, A, B, C, D are simultaneously active. There are zones here in which protected fields are superposed on one another and in which a higher safety level can therefore be reached. Such a zone is characterized by a dashed line 54 in FIG. 8. A protected field monitoring with safety level PLd is implemented, for example, by superposition with two cameras 10a-b of safety level PLc. The protected fields form a first sequence at the worker side and a second sequence at the machine side. On an approach of the worker 46, a sequence WABCD is expected; conversely on an approach of the machine 40, a sequence DCBAW is expected, with a respective overlap beyond the cooperation zone 48 not being permitted and with the machine 40, for example, not being able to reach protected field W at all. The safety controller 36 checks such conditions on the combination of the present protected field infringements that will presently be refined. It allows the machine 40 to continue work undiminished as long as the combination of the protected field intrusions is not critical at all, provides instructions to a machine controller of the machine 40 in somewhat more critical situations to anticipate a real hazardous situation by prohibitions of certain movements or by a withdrawal of the machine 40, or triggers a safeguarding of the machine 40 where necessary.

    [0060] FIG. 9 shows a representation similar to FIG. 8 in which the protected fields 38 actually monitored by the cameras 10a-b are combined by a common evaluation to form more finely defined functional protected fields. A functional protected field can equally be understood as a protected field; only its evaluation for protected field infringements is possibly only possible in combination of both cameras 10a-b by overlap conditions (AND) or exclusivity conditions (WITHOUT), with such conditions also being able to be linked. According to this principle, the six functional protected fields of FIG. 9 or even more functional protected fields can be generated. No further difference is made between protected fields and functional protected fields for the invention, apart from the fact that the maximum number of simultaneously monitorable protected fields of the camera 10a-b is made possible beyond their actual specification due to functional protected fields. In contrast, the original protected field intrusions WABCD are sufficient for the now following observations. FIG. 9 specifically shows by way of example a first functional protected field corresponding to the protected field W, a second functional protected field corresponding to the protected field A WITHOUT B, a third functional protected field corresponding to the protected field B WITHOUT C, a fourth functional protected field with the cooperation zone 48 as an overlap zone of the protected fields B AND C, a fifth functional protected field corresponding to the protected field C WITHOUT B, and a sixth functional protected field corresponding to the protected field D WITHOUT C.

    [0061] Whereas in FIG. 8 neither the machine 40 nor the worker intrude in any protected field 38 in an obviously non-critical manner, FIGS. 10 to 12 show an approach movement of the worker 46 in which, by way of example, the machine 40 already intrudes into the respective protected fields C and D from its side. The worker 46 has initially only intruded into the most extreme protected field W in the situation of FIG. 10. Since the machine 40 still observes a distance from the cooperation zone 48 at its side, the protected fields A and B are still free in the inner part of the common sequence that is assembled on both sides from the sequence at the worker side and at the machine side. This is also illustrated again in the symbolic overview 52 in which an x marks a projected field intrusion.

    [0062] A minimum number of two free protected fields between the machine 40 and the worker 46 is considered uncritical; the machine 40 can continue to work at an unreduced speed. However, the machine controller preferably receives the instruction to leave protected field B free, that is not to approach it further or even to withdraw from protected field C as a precaution in preparation for an expected continued approach of the worker 46. The machine controller itself is preferably not safe since a safe machine controller means a high effort and should not be simply predetermined at least in a safety application. There is therefore by all means the possibility that the machine 40 nevertheless intrudes into protected field B or does not release protected field C contrary to an instruction that may have taken place. The safety controller 36 in turn considers this as unpermitted since it had prohibited the dwelling in the respective protected field and can correspondingly respond with further instructions to the machine 40 or, where required, with a further safeguarding of the machine 40.

    [0063] In the situation of FIG. 11, the worker 46 has further approached and in this respect has also intruded in protected field A. The machine has not moved, it is to be assumed that it has not received any corresponding instruction to already release protected field C as a precaution. The buffer of free protected fields between the machine 40 and the worker 46 has shrunk to only a single protected field B. This minimum number of one free protected field does not mean any actual danger since the machine 40 and the worker 46 can still not come into contact and it is clear that both are located on their respective sides still separate from one another. However, a critical situation can now occur very quickly. The worker 46 therefore receives a warning, for example in the form of a now yellow light and no longer a green illuminated light as before. The machine receives the instruction to withdraw from protected field C. The warning to the worker 46 should tell him to give the machine 40 the time required for the withdrawal.

    [0064] In the situation of FIG. 12, the worker 46 has further approached and now also intrudes in protected field B. The machine 40 has, however, not yet released protected field C, either because the worker 46 has entered too fast or because the machine controller has not followed the instruction. An intrusion in all the protected fields is therefore now present, there is no longer any buffer of free protected fields between the machine 40 and the worker 46. This is admittedly not yet dangerous at all in the situation of FIG. 12 shown. The safety controller 36 can, however, no longer distinguish this; due to the lack of a buffer at free protected fields, the machine 40 and the worker 46 are at least potentially at the same location in their rough spatial resolution provided by the protected fields. The machine 40 is therefore safeguarded.

    [0065] The machine 40 can now possibly withdraw from protected field C and then also from protected field D in a creep mode harmless to persons. The worker 46 can equally move back either immediately or after its worksteps in the cooperation zone 48 have ended. A buffer of a minimum number of two free protected fields can now again be established between the machine 40 and the worker 46. In this situation or, as a precaution, the machine 40 can only restart when an even larger buffer has been produced or a protected field intrusion is no longer present. This is done manually, for example, by actuating a button that the worker 46 can only reach from the outside and after he has made sure that the working zone 42 is free. An automatic restart without a button or the like is preferably possible as soon as said condition on the buffer has been satisfied again. An additional trespass protection, for instance by means of radar or a further camera, is possibly required depending on the geometrical conditions and the specific protected field geometry and arrangement. This should prevent the worker 46 or a further person from moving into the working zone 42 while all the protected fields are anyway still infringed and the monitoring device is therefore effectively blind for this entry.

    [0066] The given minimum numbers for buffers of free protected fields are particularly advantageous; however, this can be deviated from, that is a higher minimum number can be required, in particular when longer sequences of more protected fields have been formed to, for example, form very fine-grain sequences.

    [0067] FIG. 13 shows an overview representation of a finite state machine by which the suitable measure can be associated with the possible combinations of protected field intrusions from which three states are illustrated by way of example in FIGS. 10 to 12. The states are ordered in the columns 1 to 6 with an increasing approach of the worker 46 and in the rows with an increasing approach of the machine 40 to the cooperation zone 48. Possible states 1a . . . 6a, 1b . . . 6d thereby result. Three of these states, namely 2c, 3c, and 4c have already been explained by way of example with reference to FIGS. 10 and 12 and are correspondingly marked by a symbol 56.

    [0068] The protected fields in which an intrusion has taken place are respectively marked by x in the states shown in a table. Three regions of the states can be distinguished, namely a minor diagonal 58 from the states 2d, 3c, 4b, and 5a, a first triangle 50 to the left above, and a second triangle 62 to the right below it. There are at least two free protected fields between the machine 40 and the worker 46 in the states within the first triangle 60 so that the machine 40 can continue to work in an unreduced manner. This has been described with reference to FIG. 10. In the states on the minor diagonal 58, there is only one free protected field as a buffer between the machine 40 and the worker 46 so that the worker 46 receives a warning so that the machine 40 can withdraw, as described with reference to FIG. 11. In the states in the second triangle 62, there is no buffer at all between the machine 40 and the worker 46 and the machine is therefore safeguarded as explained with reference to FIG. 12.

    [0069] The most important measure with respect to the states has thus already been named, namely whether safeguarding has to take place as within the second triangle 62, whether a warning should be given as on the minor diagonal 58, or whether the machine 40 can continue to work as within the first triangle 60. The vertical arrows in FIG. 13 symbolize further possible measures. Downward arrows stand for an approach to the cooperation zone 48 allowed and safeguarded to the machine 40. Dashed upward arrows signify the explained preferably withdrawal movement of the machine 40 on an approach of the worker 46. The withdrawal of the machine 40 or a corresponding entry prohibition relates to a respective protected field that is associated with the protected field that the worker 46 now enters. It is here a question of reestablishing the buffer of two free protected fields or of expanding the buffer to prepare for a further approach of the worker 46. The horizontal arrows do not symbolize any measures, but rather actions of the worker 46, namely his approach movement. As already mentioned, approach movements of the worker 46 are uncritical for states within the first triangle 60. With states of the minor diagonals 58, a further approach could trigger a safeguarding, for states in the second triangle 62, the safeguarding is triggered.