![]() Tools and procedures for machining a workpiece
专利摘要:
A tool (1; 2; 3) and a method for machining a workpiece are provided. The tool (1; 2; 3) comprises a tool element (10) for machining a workpiece, and a release device (12) for releasing the functions of the tool (1; 2; 3) depending on a detection result of a detection device (11; 11A, 20), which serves to detect a predetermined authentication code (50; 60) for a user of the tool (1; 2; 3). 1 公开号:SE1550728A1 申请号:SE1550728 申请日:2015-06-04 公开日:2015-12-14 发明作者:Andreas Kroetz 申请人:Bosch Gmbh Robert; IPC主号:
专利说明:
only a pre-selected function number and type for all users. As a result, safer work with the tool and a higher quality of production is possible. Depending on the desire, it is also possible to set the functions of the tool depending on the workpiece intended for machining and / or on the user. Consequently, with the tool, the user authorization is configurable depending on the user and / or on a tool and, in addition, can be quickly adapted by detection with the detection device, for example by scanning. As a result, user permissions for several users may vary. In addition, user privileges can be changed quickly and easily, so that the tool constitutes a very flexible adaptable system. Consequently, the tool can direct the individual user to specific permissions / possibilities for use via a release device or in other words via a general user interface (GUI). The object is solved in addition by a method for machining a workpiece according to claim 10. The method achieves the same advantages as those mentioned above with respect to the tool. Further possible implementations of the invention also include not explicitly mentioned combinations of the criteria or embodiments described above or in the following with respect to the exemplary embodiments. The person skilled in the art also adds individual aspects such as improvements or additions to the current basic form of the invention. The invention is described in more detail below with reference to the accompanying drawings and with the aid of the exemplary embodiments. They show: Fig. 1 a schematic block connection diagram of a tool according to a first embodiment; Fig. 2 is a flow chart of a method for machining a workpiece according to the first embodiment; Fig. 3 is a schematic block circuit diagram of a tool according to a second embodiment; and Fig. 4 is a schematic block circuit diagram of a tool according to a third embodiment. In the figures, identical or function-like elements, unless otherwise indicated, are provided with the same reference numerals. Fig. 1 schematically shows a tool 1 with a detection device 11, a release device 12, a storage device 13, a locking device 14 and a display device 15. The tool 1 can be a screw tool or a riveting tool or a punching tool or a welding tool. However, other types of machining are also complementary or alternatively possible with the tool 1. In addition, the tool 1 can be a wired or battery-powered tool, in particular a battery-powered screwdriver / drill. With the detection device 11, a predetermined authentication code 50 can be detected, which is for example provided on a user ID or the like for a user of the tool 1. The authentication code 50 contains information about the user of the tool 1. Examples of such information are if the user is at all entitled to use tool 1 and / or which functions of tool 1 the user may and may not use. The information regarding the authentication code 50 can be used by the release device 12, to determine whether the user, whose authentication code 50 has been detected with the detection device 11, is entitled to use the tool 1 or not. For this purpose, the release device 12 can use access information 130, which is stored in the storage device 13, and interconnect it with the information in the detected authentication code 50. The display device 15 can in all cases indicate the authentication code 50 and / or a result to which the release device 12 arrives. Depending on the result, the release device 12 releases the tool 1 to the user, so that the user can use the released functions of the tool 1 for a machining of a workpiece. Thereafter, the user can again lock the tool 1 for a use by means of the locking device 14. The above-described function of the tool 1 in Fig. 2 is more precisely illustrated in a flow chart. According to Fig. 2, in a method for machining a workpiece with the tool 1, only at a step S1 the access eligibility information 130 is stored in the storage device 13. In this case, information for all possible users of the tool 1 can be stored. As a rule, this step is carried out only by the corresponding authorized and trained operators. Then the flow proceeds to a step S2. At step S2, the user uses the detection device 11, to read the authentication code 50. For this purpose, the detection device 11 can be, for example, an optical reader, such as a scanner. However, the detection device 11 can also be an acoustic detection device with, for example, a voice identification function or some other detection device. Then the flow proceeds to a step S3. At step S3, the release device 12 compares the loaded authentication code 50 with the access information 130 in the storage device 13. The resultant comparison in that the user, which is assigned the authentication code 50, may use the tool 1 or at least one of its functions, the flow proceeds to a step S4. Otherwise, the flow proceeds to a step S7. At step S4, the release device releases at least some of the functions of the tool 1. Then the flow proceeds to a step S5. At step S5, the tool 1 is now aligned so that the user can use the tool 1 for machining a workpiece. For example, if the tool 1 is a welding tool, an apprentice or auxiliary worker can only perform spot welding with the tool 1, while a foreman or journeyman can also perform a weld with the tool 1. After finishing the workpiece with the tool 1, the flow continues to a step S6. At step S6, the user can lock the tool 1, so that no other user can use the tool 1, without having read his authentication code 50. The locking can take place, for example, by disconnecting the tool 1, so that the locking device 14 is a disconnector of the tool 1. However, the blocking device 14 can also be realized by an input to the display device 15. Alternatively or additionally, the blocking can also be realized by a timer, which causes the tool 1 to be blocked after a predetermined period of non-use. Then the flow returns to step S2. At step S7, the functions of the tool 1 remain blocked, as the user is not entitled to use the tool 1 on the basis of the detected authentication code 50. This can be indicated to the user by means of the display device 15. Thereafter, the flow likewise returns to step S2. The procedure is completed when tool 1 is disconnected. It should be mentioned here that step S1 can also be performed by a manufacturer of the tool or by a central place for management of the tool 1. Thus, step S1 can also be skipped or, if necessary, only performed when a corresponding function for storing the access information is requested. Consequently, the user can also be directed by scanning a code or the authentication code to specific rights in the GUI to the tool or to the control system (WebGUI or control program). Fig. 3 shows a tool 2 according to a second embodiment. Here, the detection device 20 and the storage device 30 are arranged externally from the tool 2. In this way, the release device 12 in the present exemplary embodiment communicates in all cases with the external detection device 20 and the external storage device 30 via corresponding communication lines 41, 42. The storage device 30 can in this case, for example, be arranged on a central counter of an operation in which the tool 2 finds use. However, the storage device 30 can also be connected to the release device 12 via the internet. Otherwise, the function of the tool 2 according to the present embodiment is the same as the function of the tool 1 according to the first embodiment. Fig. 4 shows a tool 3 according to a third embodiment. The tool 3 has a detection device 11A, which is designed as a service surface, via which the user of the tool 3 can enter a username and / or a password as a predetermined authentication code 60. Otherwise, the function of the tool 2 according to the present embodiment is the same as the function of the tool 1 according to the first the working example. It is thereby also possible to effect a setting of the functions of the tool 3 according to the third embodiment depending on the current user. For this purpose, the detection device 11A can, for example, have a keyboard and / or a touch-sensitive screen. In the case of a touch screen, the display device 15 may also be omitted. However, depending on the design of the detection device 11A, the registration of username and / or a password tends to be more time consuming and thus more difficult than the solutions according to the first and second embodiments. All the above-described designs of the tool 1, 2, 3 and its method can be used separately or in all possible combinations. In particular, all the criteria and / or functions in the embodiments described above can be combined arbitrarily. In addition, the following modifications in particular are conceivable. The parts shown in the figures are schematically represented and may in the exact design deviate from the shapes shown in the figures, as long as their functions described above are guaranteed. In addition to the tools 1, 2, 3 described above, the tool can also have an external storage device 30 and an internal detection device 11, 11A or an internal storage device 13 and an external detection device 20. The authentication code 50 may be a one-dimensional, two-dimensional or three-dimensional code. For example, the authentication code 50 may be a one-dimensional bar code. In the second and third dimensions, color and depth can also be added. The authentication code 50 can also only, for example, be realized with one color. However, the authentication code 50 may be complementary or alternatively be a code based on a QR code ("Quick Response Code", whereby the "QR code" is protected as a mark) or be its further development, etc. All the mentioned codes can also be combined with numbers and / or letters. Any other variants are also possible, as long as the authentication code 50 contains information about the user that can be detected by the detection device 11, 20. As previously described, the right to use the tool 1, 2, 3 can be granted depending on the hierarchy, such as worker, foreman / foreman, etc. In this case, for example, the worker may not have any authority to use the tool 1, 2, 3, the processor limited authority, and the foreman: all rights. Any arbitrary grant granted to the prevailing situation and the tool 1, 2, 3 is possible. If the functions of the tool 1, 2, 3 are to be supplemented or alternatively set depending on the workpiece intended for machining, a corresponding predetermined authentication code 50 may also be present on the workpiece intended for machining and must be read in before machining.
权利要求:
Claims (10) [1] A tool (1; 2; 3), having a tool element (10) for machining a workpiece, and a release device (12) for releasing functions of the tool (1; 2; 3) depending on a detection result of a detection device ( 11; 11A, 20), which serves to detect a predetermined authentication code (50; 60) for a user of the tool (1; 2; 3) - [2] The tool (1; 2) according to claim 1, wherein the authentication code (50) is a one-dimensional or two-dimensional or three-dimensional code, which can be scanned and read by an optical scanner as a detection device (11; 20). [3] A tool (3) according to claim 1 or 2, wherein the authentication code (60) comprises a username and / or password, which is detectable by the detection device (11A). [4] A tool (1; 2; 3) according to any one of the preceding claims, wherein the detection device (11; 11A) is part of the tool (1; 3) or is an external which can be connected to the tool (2) via a communication connection (41, 42). detection device (20). [5] A tool (1; 2; 3) according to any one of the preceding claims, wherein the release device (12) for releasing the functions of the tool (1; 2; 3) is assigned to the authentication code (50; detected by the detection device (11; 11A; 20); 60) corresponding to the access entitlement information (130) via an access authorization for the tool (1; 2; 3), and wherein the access entitlement information (130) is stored in a storage device (13), which is arranged at the tool (1; 3) and / or externally from the tool (2). [6] A tool (1; 2; 3) according to any one of the preceding claims, wherein the release device (12) releases the functions of the tool (1; 2; 3) depending on the position of the user of the tool (1; 2: 3) in the operation, where the user is active. [7] A tool (1; 2; 3) according to any one of the preceding claims, further comprising a locking device (14) for locking the functions of the tool (1; 2; 3) after a release through the release device (12), when the user has finished his work with the tool (1; 2; 3). [8] A tool (1; 2; 3) according to any one of the preceding claims, wherein the tool (1; 2; 3) is a screw tool or a riveting tool or a punching tool or welding tool. [9] A tool (1; 2; 3) according to any one of the preceding claims, wherein the tool (1; 2; 3) is a battered tool. [10] Method for machining a workpiece with a tool element (10) belonging to the tool (1; 2; 3) with the steps of detection (S2), with a detection device (11; 11A; 20), of a predetermined authentication code (50) for a user of the tool (1; 2; 3), and release (S4), with a release device (12), of the functions of the tool (1; 2; 3) depending on a detection result of the detection device (11; 11A; 20).
类似技术:
公开号 | 公开日 | 专利标题 US10574663B2|2020-02-25|Method for operating a field device JP5941089B2|2016-06-29|Robot system that distinguishes workers by biometric authentication KR101915796B1|2018-11-07|Image-based key exchange CN104156657B|2018-04-10|The data inputting method of terminal, the message input device of terminal and terminal SE1550728A1|2015-12-14|Tools and procedures for machining a workpiece JP6457471B2|2019-01-23|Operator identification system US20150215321A1|2015-07-30|Authorising A User By Means of a Portable Communications Terminal CN104782076A|2015-07-15|Use of puf for checking authentication, in particular for protecting against unauthorized access to function of ic or control device CN105139205A|2015-12-09|Payment verification method, terminal and server JP6518566B2|2019-05-22|Approval method, approval system, approval server, and program CN107683402B|2020-10-09|System and method for intelligently coupling and connecting a mobile terminal device to a coordinate measuring device US9107065B2|2015-08-11|Secure information transfer via bar codes US20130191909A1|2013-07-25|Industrial Automation System and Method for Safeguarding the System JP6342925B2|2018-06-13|Injection molding cell and injection molding cell management system US10114961B2|2018-10-30|Operator system for a process control system JP6250881B2|2017-12-20|Control device with operation right control function JP6421988B2|2018-11-14|Image forming apparatus JP2013186739A|2013-09-19|Facility control system JPWO2019116493A1|2020-12-03|Information processing systems, nodes, authentication methods, and programs for them JP2016085669A|2016-05-19|Numerical control device for detecting installation place by using ip address CN106470108A|2017-03-01|A kind of method and device of the password generating object event KR101847511B1|2018-04-11|Electric tool recognizing predetermined worker CN106534163B|2020-03-24|Detection method of receiver WO2017015854A1|2017-02-02|Control method and device JP2011090588A|2011-05-06|Security system having id registration management function and id registration management method in security system
同族专利:
公开号 | 公开日 SE543717C2|2021-06-29| DE102014211296A1|2015-12-17|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 DE4410897A1|1994-03-29|1995-10-05|Bosch Gmbh Robert|Power tool with codable commissioning| DE10233504A1|2002-07-24|2004-02-05|Marquardt Gmbh|Power tool locking device e.g. for drill, to prevent unauthorized use, comprises transceivers within the tool and a tool operating element, such that the tool can only be used when the correct authorizing signal is received by the tool| AT501688B1|2005-04-08|2008-02-15|Keba Ag|METHOD AND DEVICE FOR THE SAFE, UNLIMITED AND EXCLUSIVE ALLOCATION OF COMMAND POWER FOR A CONTROLLER TO A CONTROLLABLE TECHNICAL EQUIPMENT| DE102007041768B4|2007-09-04|2010-03-04|Deckel Maho Pfronten Gmbh|System for controlling access to a machine tool| DE102010039106A1|2010-08-10|2012-02-16|Hilti Aktiengesellschaft|Hand tool with anti-theft device| DE102010053584A1|2010-12-06|2012-06-06|Andreas Stihl Ag & Co. Kg|Usage lock for a hand-held implement| JP5838338B2|2012-03-12|2016-01-06|パナソニックIpマネジメント株式会社|Power tool and power tool authentication device|DE102018111652A1|2018-05-15|2019-11-21|STAHLWILLE Eduard Wille GmbH & Co. KG|Tool and method for operating a tool| WO2021127347A1|2019-12-18|2021-06-24|Milwaukee Electric Tool Corporation|Out-of-band point of sale activation for electronic power tool devices|
法律状态:
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 DE102014211296.6A|DE102014211296A1|2014-06-13|2014-06-13|TOOL AND METHOD FOR WORKING A WORKPIECE| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|