Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
PROCESS MANAGEMENT WITH LOCATION IDENTIFICATION
Document Type and Number:
WIPO Patent Application WO/2019/145497
Kind Code:
A1
Abstract:
A method for determining and recording process data in a process checklist, where the process occurs in a specified area and process data includes information relating to one or more of a plurality of objects used in the process, or the location of a process task, and the calculated location of said objects, wherein each object or task location is provided with an ID tag for transmitting object information over a first communication protocol, said method comprising the following steps: generating a process checklist comprising a plurality of sequential process steps; said checklist includes details of at least one of a task or object for each step of the checklist, selecting a step of said process checklist; and identifying the task and/or object for said step; communicating object information about said task or object for a said step, between a mobile communication device and said ID tag for said task or object, using said first protocol, when said mobile device is within range of said ID tag to communicate over said first protocol; obtaining partial location data to use in calculating the location of said mobile device using a second communication protocol, and storing said device location data in said mobile device; wirelessly transmitting said object information and partial location data to a computer program that is remote from said mobile device; using said computer program to calculate the location of said mobile device from said partial location data; using the calculated location of said mobile device to determine the location of said object or said task for said step in said process checklist; recording said calculated location in said checklist; checking the performed step off the checklist when the step is completed.

Inventors:
HANDSAKER JOSEPH CHARLES (GB)
Application Number:
PCT/EP2019/051890
Publication Date:
August 01, 2019
Filing Date:
January 25, 2019
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ELEMENTS TECH PLATFORMS LIMITED (GB)
HANDSAKER JOSEPH CHARLES (GB)
International Classes:
H04W4/02; H04W4/029; H04W4/33; H04W4/35; H04W4/38; H04W4/80
Foreign References:
US20170351921A12017-12-07
US20160217411A12016-07-28
US20140282257A12014-09-18
US9420423B12016-08-16
Attorney, Agent or Firm:
TOLFTS, Pippa (GB)
Download PDF:
Claims:
Claims

1. A method for determining and recording process data in a process checklist, where the process occurs in a specified area and process data includes information relating to one or more of a plurality of objects used in the process, or the location of a process task, and the calculated location of said objects, wherein each object or task location is provided with an ID tag for transmitting object information over a first communication protocol,

said method comprising the following steps:

generating a process checklist comprising a plurality of sequential process steps; said checklist includes details of at least one of a task or object for each step of the checklist,

selecting a step of said process checklist; and identifying the task and/or object for said step;

communicating object information about said task or object for a said step, between a mobile communication device and said ID tag for said task or object, using said first protocol, when said mobile device is within range of said ID tag to communicate over said first protocol;

obtaining partial location data to use in calculating the location of said mobile device using a second communication protocol, and storing said device location data in said mobile device;

wirelessly transmitting said object information and partial location data to a computer program that is remote from said mobile device;

using said computer program to calculate the location of said mobile device from said partial location data;

using the calculated location of said mobile device to determine the location of said object or said task for said step in said process checklist;

recording said calculated location in said checklist;

checking the performed step off the checklist when the step is completed.

2. A method according to claim 1 wherein the steps of said method are repeated until all the steps in said checklist are complete.

3. A method according to any preceding claim wherein said first communication protocol is an NFC or RFID communication protocol.

4. A method according to any preceding claim wherein said second communication protocol is a Bluetooth or Bluetooth Low Energy (BLE) communication protocol.

5. A method according to any of claims 1 to 3 wherein said second communication protocol is a Wi-Fi communication protocol

6. A method according to any preceding claim wherein said partial location data for said mobile device is information from at least one Bluetooth or Bluetooth Low Energy Beacon.

7. A method according to claim 6 wherein said partial location data is used to identify proximity of the mobile device to the Bluetooth or Bluetooth Low Energy Beacon

8. A method according to claim 6 or claim 7 wherein said partial location data for said mobile device is information from at least three Bluetooth or Bluetooth Low Energy beacons located within said specified area.

9. A method according to any of claims 6 to 8 wherein the location of said beacons within said specified area is known.

10. A method according to any preceding claim wherein said location of said object is stored in a database within said computer program.

1 1 .A method according to claim 10 wherein said computer program is one or more of application software, system software or a cloud-based application.

12. A method according to any preceding claims wherein the objects are passive objects.

13. A method according to claim 9 wherein said passive objects are tools.

14. A method according to claim 9 wherein said passive objects are identification cards for workers.

15. A method according to any preceding claim wherein said specified area is an enclosed area.

16. A method according to claim 15 wherein said enclosed area is a factory, shop floor or a workshop.

17. A method according to any preceding claim wherein the ID tag for said object is permanently secured to said object.

18. A method according to any of claims 1 -16 wherein said ID tag can be removed from said object.

19. A method according to any preceding claim where said object is one or more of a component used in the process, a worker working on the process, or a machine used in the process

20. A method according to any preceding claim where said process data further comprises temporal information on when the process step started and when the process step ended.

21 . A method according to any preceding claim wherein said location information includes details of the location of the item during the process step, and any location changes that may occur during the step.

22. A method according to any preceding claim wherein the process is one or more of a manufacturing process, a scientific process or a testing process.

23. A method according to any preceding claim wherein the identification protocol ID is an NFC tag, card or sticker.

24. A method according to any preceding claim wherein the process checklist is stored in a server that is external to the monitoring device.

25. A method according to any of claims 1 to 23 wherein said process checklist is stored in said mobile device.

26. A method according to any preceding claim wherein each object has a different identification protocol ID.

27. A method according to any preceding claim wherein said mobile device can obtain the time, location and identification protocol information when the mobile device is within 5 metres of the monitored item.

Description:
Process management with location identification

Field of the Invention

This application relates to a process management system using an identification protocol bases on short-range wireless communications protocol, such as NFC; and a wireless communications protocol such as Bluetooth Low Energy. In the process management system the location of each step and/or item used in the process is automatically determined and recorded.

Background

Processes and Checklists

A process describes a series of sub-divisions such as actions, steps or operations that are performed sequentially to produce an output. The manufacturing industry relies on the strict and repeatable performance of processes to create products for their customers. Yet, processes can vary wildly in time to complete, complexity, number of steps, and number of inputs amongst a host of other factors. This means that the success of a process can also vary based on the individual and combined performance of tasks. Because of this, it is preferential to record details relating to a process and the constituent steps of the process. Furthermore, in manufacturing processes that create products to ISO standards it is vital to document the manufacturing process, to provide evidence that certain procedures and tests have been performed to the required ISO standard.

Processes can be recorded in a number of ways, from the most basic recording of a process through handwritten dockets; through to fully instrumented manufacturing lines that automatically digitise and record every aspect of a process. Though a fully instrumented manufacturing line may appear to be the gold standard for recording a process, the cost and disruption required to install such instruments makes it a prohibitive option for smaller manufacturers. One method of recording a process is by creating a list of tasks to be performed (a checklist), prescribing the constituent features required to perform each part of a process. Such features may include the required tools and equipment, required components and materials, required training, and target output. Nixon (US20140282257A1 ) describes a method whereby such a system is implemented in a process control environment, with said checklist displayed on a user interface device such as a mobile phone and tasks are checked off, or completed, manually by the operator.

However, in an environment whereby staff are expected to wear gloves for safety purposes, manually‘checking off’ items on a digitally held checklist can become a cumbersome and slow task, requiring users to take off gloves to operate a touch sensitive digital screen. An alternative to this process is to automate the‘checking off procedure by using an identification medium such as Radio Frequency Identification (RFID), bar codes, and matrix bar codes (such as QR codes) to trigger an item within a checklist. Thus providing a means by which items on a digital checklist can be completed by users wearing appropriate Personal Protective Equipment in a factory in environment.

Identification Protocols

In the adjacent field of asset tracking, manufacturers utilise identification protocols to track the movement of assets around a factory, and across a supply chain. Bar codes provide a basic method of asset tracking, whereby users scan a printed bar code with a bar code scanner, identifying a unique identification code corresponding to a record for said asset in a database. Information about the interaction is then logged, and in some cases, information relating to the asset is provided to the user (US20130240621 A1 ; US7258266B1 ; US20130032634A1 ). This allows users to ‘check’ items to record their location or timestamp in a process such as a supply chain.

RFID has provided an improved method of asset tracking, by providing a further automated system whereby RFID tags can be identified by RFID scanners at a proximity of up to 12m, allowing assets to be tracked across a facility and across a supply chain (US7504949B1 ; US746623B2). Flowever, whilst RFID and bar codes (including matrix bar codes) provide a cheap method of identifying who last contacted the asset, and in some cases where the asset was last contacted; all three options require a separate printer to write the identification medium, to the technology required to read the technology.

One type of RFID called Near Field Communication (NFC), provides an alternative to technologies such as bar codes and standard active and passive RFID, as it can be read, written and rewritten using a standard mobile telecommunications device. It is an ultra-close proximity protocol, which because of the limitations in range to less than 100mm, is considered more secure than other wireless communications, and is therefore a very popular method of peer-to-peer information transfer. For example, for transferring data between objects and devices.

NFC can be performed between two active devices, or between an active device and a passive device; whereby an active device is described as a device that has the ability to create an electromagnetic signal, and a passive device has the ability to be connected to by an active device and looping an external electromagnetic signal, but is incapable of creating a signal itself.

One of the main uses of NFC is to transmit data from a passive device to an active device; a process best exampled through contactless payments, whereby an active device such as a payment terminal interacts with a credit or debit card through an electromagnetic signal being created by the payment terminal, which is then looped via the credit or debit card, thus providing information to the payment terminal. This process can also be utilised in other industries and use cases, whereby objects can be identified and information relating to them retrieved, by an active device such as a fixed terminal or a portable smart device like a mobile phone.

Because of the described security benefits and ability to read and write with one device, NFC has been used as an alternative medium for asset tracking (US20130190897A1 ; GB2550326A; CN105225044A; CN20331 1224U), providing a more secure and less corruptible method of accessing data from an item to a reader device.

Process Tracking using Identification Protocols

Data relating to an item can be identified through the interaction between a user device and an NFC tag integrated within a given item (US9258033B2). Said interaction can provide an identification code, and a timestamp for the interaction between the tag and smart device, that could be added to a process history or timeline.

Using a similar process, NFC tags can be used to add events to the history of an item (WO2012100009A1 ; US7259675B2; US20030023408A1 ), thus providing a detailed description of a process. This method however, requires specific tags to carry information relating to a specific event that may or may not have a specific geo-location (W02012100009A1 ), or may require additional input from a reader/writer device to create an event (US7259675B2; US20030023408A1 ).

One potential use of NFC and other identification protocols may be to attach information to an item in a list. Whereby an identification protocol communicates with a mobile device, causing an item on a checklist to be completed, whilst simultaneously downloading data from the identification protocol to be attached to said item being completed. This may be used to attach a user, as identified by ID card; a tool or piece of equipment; or location; to the performance of a task.

For a pre-defined process such as a manufacturing process, the process can be prescribed as a series of sequential items to be performed. Furthermore, said items make up a checklist. This allows an automation of the logging of a process and it’s constituent events, by the utilisation of an identification protocol interaction such as an NFC interaction, to trigger the checking off events on a prescribed checklist. Thus providing a semi-automated method of checking off sequential items from a checklist held digitally. For a process consisting of sequential items, sequential interactions between an identification medium and a smart device could also be used to trigger the start and end of a given step. In the example of an individual step of a manufacturing process, the start of said step may be triggered by the interaction between an identification protocol such as an NFC tag placed on an ID badge, and a read device such as an NFC capable mobile phone; subsequently, the end of said step may similarly be triggered by the interaction between an identification medium, and a read device.

In factories with a multitude of similarly functioning machines and areas of activity, understanding the location of where activities were performed, and where tools and equipment were used can add further insight to users of the system and management who may be monitoring and controlling manufacturing operations. Whilst geo- positional data can be gained from a Global Positioning Signal (GPS) or a similar wireless signal with geo-positional properties, GPS is relatively inaccurate and it’s signal can be blocked within large industrial facilities that utilise large amounts of metal and other signal-blocking materials in their construction. Furthermore, it’s signals provide units with relation to global co-ordinates rather than the local co-ordinates of a building or indoor environment. Therefore, another method for calculating the geographical location of a device and it’s user in indoor conditions would provide a more suitable and usable picture of location.

Indoor Location Systems

Wireless signal strength reduces predictably according to distance from the origin of the signal. Thus using a simple calculation, wireless signal strength can be used to estimate the distance between two transceivers. This method, known as Received Strength Signal Indicator (RSSI), can be used to identify the proximity of a device to a transceiver. Furthermore, if the proximity of a device to three of more transceivers is known, the calculated distances can be triangulated to identify the location of the device with respect to a local co-ordinate system.

Kerai (WO2016075359) describes a method by which a device receives messages from a minimum of three Bluetooth Low Energy devices, and calculates the position of the device based upon the triangulation of the radio signal strength of each BLE device and the known positions of the BLE devices, and transmitting it’s location via BLE to an external device. However, this invention does not describe how this process could be used as the proxy location for the performance of a task or activity.

Annamalai et al. (US20120246074) describes a method for capturing the location of devices without geo-positioning capabilities, whereby the location of said device is inferred from the known location of a fixed terminal, when in proximity. This however requires a fixed terminal to provide the location, which limits the feasible application of this process to a system of movable devices and objects.

Tysowski (US8750793 and US20120094597) describes a method whereby the location of an NFC tag is inferred from the known location of a portable mobile device when it is in proximity of the tag, and the ID and location sent to a database by the active device. The method describes the use of GPS as the primary means of geo- positioning, which whilst GPS and similar geo-locating technologies are suitable in most use cases and environments, in some indoor environments such as industrial facilities and factories, external equipment and buildings themselves can distort the signal properties, and thus affect the accuracy of the calculated geographical positioning. Furthermore, whilst this method may also be able to provide information relating to the geographical location of NFC tags. It does not describe a method by which to identify geographical location, such as through the triangulation of BLE signals. A simple description of geographical location without context to the environment, such as proximity to known points, limits the information that can be provided to the system, and thus prevents further information being derived from the output, such as the proximity of the device to individual BLE beacons, which itself may be useful.

By combining the use of an identification protocol with the calculation of location upon data transfer, there is provided a digital checklist system, with automated data collection and storage of detailed information. According to the invention there is provided a method for determining and recording process data in a process checklist, where the process occurs in a specified area and process data includes information relating to one or more of a plurality of objects used in the process, or the location of a process task and the calculated location of said objects, wherein each object or task location is provided with an ID tag for transmitting object information over a first communication protocol, said method comprising the following steps: generating a process checklist comprising a plurality of sequential process steps; said checklist includes details of at least one of a task or object for each step of the checklist, selecting a step of said process checklist; and identifying the task and/or object for said step; communicating object information about said task or object for a said step, between a mobile communication device and said ID tag for said task or object, using said first protocol, when said mobile device is within range of said ID tag to communicate over said first protocol; obtaining partial location data to use in calculating the location of said mobile device using a second communication protocol, and storing said device location data in said mobile device; wirelessly transmitting said partial location data and said location information to a computer program that is remote from said mobile device; using said computer program to calculate the location of said mobile device from said partial location data; using the calculated location of said mobile device to determine the location of said object or said task for said step in said process checklist; recording said calculated location in said checklist; checking the performed step off the checklist when the step is completed.

In a preferred embodiment of the invention, the steps of said method are repeated until all the steps in said checklist are complete.

Preferably, the first communication protocol is an NFC or RFID communication protocol. Further preferably, said second communication protocol is a Bluetooth or Bluetooth Low Energy (BLE) communication protocol.

In an embodiment of the invention the second communication protocol is a Wi-Fi communication protocol

Preferably, said partial location data for said mobile device is information from at least one Bluetooth or Bluetooth Low Energy Beacon. In a further preferred example of the invention, said partial location data is used to identify proximity of the mobile device to the Bluetooth or Bluetooth Low Energy Beacon. Still further preferably, said partial location data for said mobile device is information from at least three Bluetooth or Bluetooth Low Energy beacons located within said specified area.

In an example of the invention, the location of said beacons within said specified area is known. Preferably, said location of said object is stored in a database within said computer program.

In an example of the invention, the computer program is one or more of application software, system software or a cloud-based application.

In a preferred embodiment of the invention the objects are passive objects. Preferably, the passive objects are identification cards or tools.

In a preferred embodiment of the invention the specified area is an enclosed area, further preferably it is factory, shop floor or a workshop.

In an embodiment of the invention the ID tag for said object is permanently secured to said object. Alternatively, the ID tag can be removed from said object.

Preferably, the object is one or more of a component used in the process, an Identification card relating to a worker working on the process, or a machine used in the process

In an embodiment of the invention the process data further comprises temporal information on when the process step started and when the process step ended.

Preferably, the location information includes details of the location of the item during the process step, and any location changes that may occur during the step.

In a preferred example of the invention, the process is one or more of a manufacturing process, a scientific process or a testing process.

Preferably, the identification protocol ID is an NFC tag, card or sticker.

Preferably, the process checklist is stored in a server that is external to the monitoring device. Alternatively, the process checklist is stored in said mobile device.

In an embodiment of the invention each object has a different identification protocol ID. Preferably, the mobile device can obtain the time, location and identification protocol information when the mobile device is within 5 metres of the monitored item.

Description of Figures

Fig.1 is a schematic block diagram of the database and communication units;

Fig.2 is a flow chart showing the steps of the preferred method

Fig.3 is a schematic illustration of three transceivers and a mobile device

Fig. 4 is a schematic illustration of four transceivers and a mobile device

Detailed Description

Figure 1 shows the interactions made between a database 100, mobile device 1 10, short range wireless signal (SRWS) modules 120 and long range wireless signal (LRWS) devices 130, in the capture of object and location data.

A database 100 contains one or more checklists 160 which are made up of two or more items 162, 163, whereby an item may be an action to be completed. Typically the checklist will be used as a checklist for all of the steps in a process, and will include various different sorts of information. Preferably, this may include one or more of details of the objects, tasks, and locations for each step in the process. The database 100 may refer to a software program enabling the collection, modification and calculation of data contained within it; or it may be within a software program enabling the collection, modification and calculation of data contained within it. The database 100 may be held on a computer, a server, or similar hardware enabling the storage and transmission of data (not shown). Items 162, 163 within the checklist 160 preferably contain pre-written data 164. Prewritten item data 164 relates to at least the name of the item. Item data may also include an item code, or an item number. Item data may include a description of the item. Items within a list may relate to actions to be performed by a user. Items within a list may relate to objects to be used during an action, and may include location and temporal information. The items 162, 163 may also include SRWS data 125, LRWS data 135 and processed data 170. Within a specified environment, such as an indoor environment that may be a factory or other industrial environment, or warehouse, or shopping facility or an outdoor environment such as a work yard or other outdoor area is a mobile communication device 1 10 such as a mobile phone, tablet or similarly enabled smart communication device, for use by a subject who is performing tasks making up the process checklist 160. In an example of the invention the communication device 1 10 typically comprises at least one transceiver 1 12, but in some cases it may be provide with multiple transceivers-for example the figure shows three, enabling the mobile device 1 10 to wirelessly communicate with the database 100; obtain short range wireless signal (SRWS) data 125 via a first communication protocol; and obtain long range wireless signal (LRWS) data 135 via a second communication protocol. The database 100 and mobile device 1 10 may communicate by a communication protocol using wireless signals such as WiFi; a mobile internet signal such as 2G, 3G, 4G, 5G or a future iteration; Bluetooth or another wireless data transmission signal. The mobile device 1 10 may obtain SRWS and communicate with a Radio Frequency Identification based system, which may be either an active or passive system, or an ultra-close proximity RFID system such as Near Field Communication (NFC) by the same transceiver or a separate transceiver. LRWS data may be obtained by the same transceiver or a separate transceiver, and may capture signals from Bluetooth, including Bluetooth Low Energy; WiFi; a mobile internet signal such as 2G, 3G, 4G, 5G or a future iteration; or another wireless data transmission signal.

In an example of the invention, the specified environment for the process preferably contains a plurality of objects or devices that are provided with a SRWS module 120. The objects may be passive (such as tools) or active. The SRWS module 120 may be an NFC sensor, which is either integrated within the objects themselves, so is not removable from the object, or is attached to the object as a detachable ID tag, by adhesive or other means (hook and loop fixing for example) so that the ID tag can be easily removed and positioned on another object if required. Each SRWS module 120 includes data such as but not limited to a code or name for the object, that may be described directly, or said code may refer to a record within the database, or an additional external database. The objects may be ID cards relating to members of staff, or passive objects such as tools in a workshop, or items in a factory such as products being manufactured or modified in some way.

Within the specified environment, in an example of the invention, a plurality of LRWS transceivers 130, such as Bluetooth Low Energy (BLE) beacons capable of producing wireless data signals such as BLE signals, are positioned in various locations across the environment; generally, the location of each beacon is well known and recorded as information about the environment. In figure 3, four such beacons 300 are shown, but there may be any number of two or more beacons. The beacons will be located at known points in the environment. The beacons may be randomly positioned, for example in areas of the environment where it is easy to position the beacon, or positioned at regular intervals in the environment.

As described above, the specified area is typically an enclosed area, such as a factory, shop floor or a workshop. Alternatively, the area may be a medical facility, such as a hospital, a museum or a visitor centre that displays a variety of moveable objects. More generally the environment may be one in which one or more users interact with one or more objects, and it is of interest for users and/or managers of the environment to understand where and when an object has been interacted with, and who by.

In a first step, the mobile device 100 is passed within a proximity of 100mm or less of the object, typically the distance between the mobile device and the object will be 20mm or less. When the SRWS module 120 and the mobile device 1 10 are within this range, communication across a specified short-range protocol between the object and the mobile device 1 10 is possible. The SRWS transceiver 1 12 within the device 1 10 establishes a communication with the SRWS module 120 of the object thus facilitating a data exchange between the SRWS module 120 of the object and the mobile device 1 10. The information from the object, in the form of SRWS data 125, is captured by the mobile device 1 10 during this communication. SRWS data may be data about the Object such as direct information relating to the object such as a name or description, which may be provided directly, or as a code corresponding to a data entry in a database 100. Simultaneously, LRWS data 135 is captured by the LRWS transceiver 1 12 from two or more external LRWS devices 130 placed about the environment.

In a second step, the SRWS data 125 and LRWS data 135 captured by the mobile device 1 10 is transmitted across a wireless network, to the database 100 and attached to the open item 163 in the checklist 160.

The third step of the method is performed within the database 100. Typically this is remote from an operational area 180. For example, operational area 180 may be a particular floor in a factory environment, and the computer program may be provided in computers on a different floor or other region of the factory. This means that smaller data packets can be sent to the computer program from the mobile device 1 10, and that data remains in the original form it was provided in, this then allows the data to be used in additional processes after capture, and not limited merely to use for location calculations. However, in some embodiments of the invention, the database may be within the operational area 180.

Two steps of data processing are performed on the LRWS data to create usable proximity and location data from the raw signal data. In the first step of data processing the individual signals are processed, to identify/estimate the distance between the mobile device and individual transceivers. One such process may be through the calculation of Radio Signal Strength Inference (RSSI) whereby the signal strength is known to reduce according to distance from the origin of the signal, and thus can be used to estimate distance between two transceivers. The second process subsequently calculates the geo-position of the primary device, displayed as local co- ordinates, or similar geo-positioning measure, based upon the combination of the known proximity distances from individual LRWS devices and their known location within an area. One such method is to perform a method of triangulation, from the individual distances between the LRWS transceivers and the mobile device, and using the known positions of the LRWS transceivers. The local co-ordinates of the object are then inferred from the known co-ordinates of the mobile device, at the point of SRS data transfer. A final step of data storage is performed within the computer program, whereby the processed location data is attached to the open item, including but not limited to: location data including the proximities between the device and individual wireless devices; the local co-ordinates of the mobile device upon NFC data transfer, and the local co-ordinates of the object upon NFC data transfer with respect to the local co- ordinate system; as well as further contextual data such as a timestamp.

For a standard manufacturing or scientific process that has multiple steps in the process, these stages will be repeated from each step of the process until the process is complete.

Fig 2 is a flow chart 200 showing the steps involved in a preferred embodiment of the process of the invention. At 202 is an interaction between mobile device 1 10 and SRWS Module 120. This is followed by 204 SRWS data transferred to mobile device. The method then proceeds to 206 are wireless data signals detected. If true, pass to step 208, wireless data captured by the mobile device 1 10. If false, proceed to step 210, captured data sent from mobile device 1 10 to database 100, also step 208 proceeds to step 210. Next pass to 212 Captured data stored to open item 162 in list 164. Next at 214, LRWS data is captured. If 214 is true, then 216 where LRWS data processed to create location data, followed by 218, location data saved to open item 162 in list 160. This passes on to step 220, also If false at step 214 pass to 220, open item identified as completed and closed. The final step is 222. Checklist 160 opens next sequential item 162 in the list 160. Preferably, these steps will repeat until the entire process has been completed. However, in some instances of the invention, the process may only complete a selection of the steps of the entire process.

Use Case Example

In the example of turbine blade manufacture by wax loss process, the manufacturing process typically consists of over one hundred steps, which are performed across multiple distinct phases. Each turbine blade interacts with a plurality of contributors, equipment, and added components and materials, making the tracking of this process complex and time consuming. This is an example of where the process checklist of the subject invention would be very useful.

A manufacturer may therefore be interested to record which workers have performed which tasks, in which part of the factory. In this way, the manufacturer is able to build up a record of all of the steps in the process to provide a complete checklist of the manufacturing process. Therefore, in a preferred example of the invention, ID cards contain an NFC module 120, containing object information which relates to the holder of the ID card, such as their name or other suitable identifying information. Upon performance of the open step 163 with the checklist 160, the user places the ID card within proximity of the mobile device 1 10, causing the SRWS data held on the ID card to be transferred to the mobile device 1 10; simultaneously causing the capture of LRWS data; and both the SRWS data 125 and LRWS data 135 are communicated to the database 100 where they are attached to the open item 163 of checklist 160.

The LRWS data 135 is subsequently processed using RSSI methods to calculate individual proximities to LRWS devices, and co-ordinates with respect to the local co- ordinate system. The processed data 170, including individual proximities and co- ordinates, are attached to the open item 163, and the item closed. In the preferred embodiment of the invention, when item 163 is closed, the sequential item in the checklist 160 is opened, and this repeats until all of the items 162, 163 in checklist 160 have been checked and completed, and the process is complete.

In an alternative of the same method, whereby LRWS data cannot be captured, the user places the ID card within proximity of the mobile device, causing the SRWS data to be transferred to the device. Where LRWS data cannot be captured, only SRWS is communicated to the database where it is attached to the open item. Furthermore, where LRWS data is are not available, no data is processed to identify locations and thus a recording of no data. Furthermore, no LRWS data 135 or processed location data 170 is recorded to the open item 163, the open item is closed, and the sequential item in the checklist 160 is opened. Short Range Protocol

Preferably, the first short-range wireless communication protocol used for this method is a protocol such as Radio Frequency Identification (RFID) or Near Field Communication (NFC). These protocols enable two objects or devices to communicate by bringing them within close proximity of one another. It is typically utilised to transfer small amounts of information from one object to another, such as an identifier or short code.

NFC is a subset within the family of Radio Frequency Identification (RFID) technologies, and is specifically a subdivision of high-frequency RFID, operating at a frequency of 13.56Mhz which restricts the read length of the signal. Flowever, because of the required proximity for communication, NFC has become a favoured method of secure peer-to-peer communication.

NFC information transfer occurs when two sensors, each containing an electromagnetic antenna are passed within a proximity small enough to establish an electromagnetic connection between the two sensors, which is less than 100mm and more typically less than 20mm.

NFC sensors can be programmed to cause a smart device to run a series of commands, such as open a web page or app. One such use is for NFC sensors to be attached to, or embedded within business cards; with the sensor running a command to open the website or social media page of the individual described on the business card. Another such use is for a NFC sensor to be attached to a given object; when a mobile device is passed within proximity of the sensor on the object, a command is communicated to cause the opening of a record relating to the object within a database.

An alternative embodiment may utilise a different form of RFID or short-range wireless communications protocol, which allows data to be transferred from an object or device to a device capable of actively capturing data.

Long Range Protocol

Examples of such Long Range Wireless Signals for the second communication protocol include but are not limited to, WiFi, cellular, Bluetooth and Bluetooth Low Energy (BLE). The second communications protocol can be used to identify the position of an object through the processing of signals from wireless communication devices.

One such use of the second protocol is for proximity sensing, whereby a mobile device establishes a connection with a wireless transceiver, and a signal between the devices and the transceiver is created and recorded. The proximity of the mobile device to the wireless transceiver is then estimated using the Radio Signal Strength Indication (RSSI) value from the signal.

Wireless signals between wireless transceivers and a mobile device, can also be utilised to identify the estimated location of a mobile device within an environment. Two-dimensional triangulation of three wireless signals, identifies the location of a device within an environment as being at the point intersected by three circles, whose radii corresponds to the estimated distance between three individual wireless transceivers and said device, as calculated using RSSI.

As displayed in Figure 3, three wireless transceivers 130 are fixed at known positions within a particular environment 300. Each wireless transceiver 130 produces a signal that is captured by a device 1 10; which can be subsequently analysed to identify an estimated proximity of the device 1 10 to each individual wireless transceiver 130. This distance of proximity is displayed as a radius Rx, from the individual wireless transceiver. The radii of the three wireless transceivers are then triangulated to calculate the position of the device within the known area.

Bluetooth Low Energy (BLE) is a wireless network protocol created by the Bluetooth Special Interest Group. It was created to produce a communications protocol with a similar range to standard Bluetooth, but with significantly reduced power consumption and cost. It uses the same antennae and frequency as the standard Bluetooth protocol, and is therefore increasingly being adopted by modern smart devices including phones and tablets.

Because of the reduced power consumption and cost, devices such as BLE beacons can produce a BLE signal for months, and even years, on a single battery cell. This allows developers and businesses to use BLE beacons as stationary and powered without the need for an external power-outlet; and therefore, makes them a suitable device for the capture of proximity and location as described above. To calculate the proximity of a mobile device to a BLE beacon, a connection is established between a mobile device with a given BLE beacon, and a signal is recorded. The proximity of the mobile device to the BLE beacon is then estimated using the Radio Signal Strength Indication (RSSI) value from the signal.

Furthermore, combined proximity of multiple BLE beacons to a mobile device can be used to identify the location of the mobile device through triangulation of the multiple signals.

In a system whereby more BLE signals are present than are required for triangulation, a plurality of BLE node selection processes can be performed. One option is to select the required number of BLE signals, using the beacons producing the strongest signals, and therefore the nodes most likely to provide a more accurate and reliable signal.

For example, as displayed in Figure 4, four BLE beacons 402, 404, 406, 408 and mobile device 1 10, are positioned within an environment 400. Each BLE beacon produces a signal that is captured by a device, then analysed to identify an estimated proximity of the device to each individual BLE beacon. This distance of proximity is displayed as a radius from the individual BLE beacon The three BLE beacons 402, 404, 406 producing the strongest signals are then selected, whilst the fourth BLE beacon 408 is unused. The three selected BLE beacon signals are then triangulated to identify the location of the mobile device 1 10.

Another option is to perform multiple triangulations using all possible combinations of beacons, and calculate the mean of the results of the individual triangulations; or the mean of the results falling within a multiple of standard deviations from the mean, to ensure anomalous values are discounted.

For example, as displayed in Figure 4, each BLE beacon 402,404,406,408 produces a signal that is captured by a device 1 10, then analysed to identify an estimated proximity of the device to each individual BLE beacon. This distance of proximity is displayed as a radius from the individual BLE beacon, Combinations of three BLE beacon signals are then triangulated to identify the location of the mobile device.

For example, for four beacons 402, 404, 406, 408 the combinations would be: - 402, 404, 406

- 402, 404, 408

- 402, 406, 408

- 404, 406, 408

The mean average of the co-ordinates from the individual triangulations are then calculated, and identified as the location of the mobile device within the known environment.

Another method of triangulation is in three dimensions using the RSSIs of four individual BLE Beacons. One such method described by Park et al (2016; DOI: 10.1 177/1550147716671720) improves location accuracy by 27.3% on previous methods.

Another method of identifying location, may be through the performance of the same method described above, using another wireless communications protocol such as WiFi or a cellular network, whereby an RSSI of the individual signals is similarly used to identify a proximity, and thus a triangulation of location from said proximities.

In the foregoing specification, the invention has been described with reference to specific examples of embodiments of the invention. It will, however, be evident that various modifications and changes may be made therein without departing from the scope of the invention as set forth in the appended claims and that the claims are not limited to the specific examples described above.

Those skilled in the art will recognize that the architectures depicted herein are merely exemplary, and that in fact many other architectures can be implemented which achieve the same functionality. Any arrangement of components to achieve the same functionality is effectively‘associated’ such that the desired functionality is achieved. Hence, any two components herein combined to achieve a particular functionality can be seen as‘associated with’ each other such that the desired functionality is achieved, irrespective of architectures or intermediary components. Likewise, any two components so associated can also be viewed as being ‘operably connected,’ or ‘operably coupled,’ to each other to achieve the desired functionality.

Furthermore, those skilled in the art will recognize that boundaries between the above described operations merely illustrative. The multiple operations may be combined into a single operation, a single operation may be distributed to additional operations and operations may be executed at least partially overlapping in time. Moreover, alternative embodiments may include multiple instances of a particular operation, and the order of operations may be altered in various other embodiments.

Also, the invention is not limited to physical devices or units implemented in non- programmable hardware but can also be applied in programmable devices or units able to perform the desired method by operating in accordance with suitable program code, such as minicomputers, personal computers, notepads, personal digital assistants, electronic games, cell phones and various other wireless devices, commonly denoted in this application as ‘mobile devices. However, other modifications, variations and alternatives are also possible. The specifications and drawings are, accordingly, to be regarded in an illustrative rather than in a restrictive sense.

In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word‘comprising’ does not exclude the presence of other elements or steps then those listed in a claim. Furthermore, the terms‘a’ or‘an,’ as used herein, are defined as one, or more than one. Also, the use of introductory phrases such as‘at least one’ and‘one or more’ in the claims should not be construed to imply that the introduction of another claim element by the indefinite articles‘a’ or ‘an’ limits any particular claim containing such introduced claim element to inventions containing only one such element, even when the same claim includes the introductory phrases‘one or more’ or‘at least one’ and indefinite articles such as‘a’ or‘an.’ The same holds true for the use of definite articles. Unless stated otherwise, terms such as‘first’ and‘second’ are used to arbitrarily distinguish between the elements such terms describe. Thus, these terms are not necessarily intended to indicate temporal or other prioritization of such elements. The mere fact that certain measures are recited in mutually different claims does not indicate that a combination of these measures cannot be used to advantage.