description
stringlengths 2.59k
3.44M
| abstract
stringlengths 89
10.5k
| cpc
int64 0
2
|
---|---|---|
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application is a continuation of U.S. patent application Ser. No. 12/911,199, filed on Oct. 25, 2010, which is a continuation of International Application No. PCT/CN2009/074755, filed on Nov. 2, 2009. The International Application claims priority to Chinese Patent Application No. 200810217411.0, filed on Nov. 7, 2008. The afore-mentioned patent applications are hereby incorporated by reference in their entireties.
FIELD OF THE INVENTION
[0002] The present invention relates to a mobile communication technology, and in particular, to a technology for transferring multimedia sessions from a Circuit Switched (CS) network to a Packet Switched (PS) network.
BACKGROUND OF THE INVENTION
[0003] Currently, mobile communication networks are primarily CS networks, for example, Global System for Mobile communications (GSM) and Code Division Multiple Access (CDMA) networks. Operators have set up perfect and diverse service platforms based on CS networks. On such platforms, a Mobile Switching Center (MSC) is responsible for routing calls and executing service logics.
[0004] An IP Multimedia Subsystem (IMS) is a service network based on Internet Protocol (IP) switching. The IMS allows a User Equipment (UE) to access an IMS network through various PS access networks (such as an IP Connectivity Access Network (IP-CAN)) and carry out IMS multimedia services. That is, the IMS is a service platform built on the IP-CAN, and basically corresponds to the MSC of the CS network. Compared with the CS network, the IP-CAN provides higher bandwidth and supports richer services. The core of the IMS is the Call Session Control Function (CSCF) and various Application Servers (ASs). A Serving-CSCF (S-CSCF) is responsible for routing a call request to an appropriate AS when conditions are fulfilled, and the AS executes service logics.
[0005] Because the IMS is a megatrend, it is appropriate that the functions of the CS network service platform are transferred to the IMS network to unify the service platform and reduce the costs of developing and operating new services. The unification of service platforms is also known as an IMS Centralized Service (ICS).
[0006] Service Continuity (SC) deals with session continuity that appears when a user moves from one access network to another. That is, the access network can be changed without interrupting the session when the user moves.
[0007] An SC UE performs session transfer between access networks according to the following procedure: At the new access network, the UE sends a transfer request to a Service Centralization and Continuity Application Server (SCC AS), with a view to setting up a new access leg between the UE and the SCC AS in the new access network. After receiving the transfer request, the SCC AS associates a remote leg corresponding to the access leg of the old access network with the access leg of the new access network, and updates the remote leg and releases the access leg of the old access network at the same time. The remote leg refers to a call control path between the SCC AS and the peer UE. The access leg and the remote leg are defined in 3GPP TS23.237.
[0008] A Session Transfer Identifier (STI) is an identifier indicating initiation of session transfer. Generally, when a new access leg is set up between the UE and the SCC AS, the SCC AS allocates the STI dynamically. Each dynamic STI corresponds to a specific access leg uniquely. When the user wants to perform handover, if a dynamic STI exists in the UE, the UE sends a transfer request by using the dynamic STI as a called number. The SCC AS determines the old access leg which needs to be replaced by the new access leg according to the STI.
[0009] A static STI and a static Session Transfer Number (STN) are stored in each SC UE. When the UE has no dynamic STI, the static STI or STN is used as a called number to initiate transfer. The SC UE may be an ICS UE (UE capable of ICS) or non ICS UE (UE incapable of ICS). If the SC UE is a non ICS UE, when the UE sends a session request from the CS network, the dynamic STI allocated by the SCC AS to the new access leg cannot be transmitted to the UE. Therefore, only the static STI can be used when the UE initiates transfer from the CS network to the PS network. The STN can be used only if the SC UE is a non ICS UE and the transfer is initiated from the PS network to the CS network.
[0010] The STN, the static STI, and the dynamic STI are different in structure. The SCC AS can easily identify whether the user uses an STN, or a static STI, or a dynamic STI.
[0011] In the process of implementing the present invention, the inventor finds at least the following problems in the prior art:
[0012] When a non ICS UE moves from a CS network to a PS network, because no dynamic STI exists, only the static STI is available, and only one static STI is stored in the UE. When the non ICS UE has two multimedia sessions in the CS network, the non ICS UE can transfer only the CS session which is currently active, but is incapable of transferring the held session, for no more STI exists.
SUMMARY OF THE INVENTION
[0013] Embodiments of the present invention provide a method, UE, and server for multimedia session transfer so that two multimedia sessions of a non ICS UE can be transferred from a CS network to a PS network.
[0014] To fulfill the foregoing objectives, a method for multimedia session transfer in an embodiment of the present invention includes:
[0015] receiving a session transfer request sent by a UE, wherein the session transfer request carries a static STI;
[0016] determining that the UE requests to transfer an active CS session according to the static STI, executing a procedure for transferring the active CS session according to the session transfer request, and judging whether the UE has a held CS session;
[0017] if the UE has a held CS session, sending a dynamic STI allocated to the held CS session to the UE; and
[0018] receiving another session transfer request sent by the UE, wherein the other session transfer request carries the dynamic STI; and executing a procedure for transferring the held CS session according to the other session transfer request.
[0019] Another method for multimedia session transfer in an embodiment of the present invention includes:
[0020] receiving a session transfer request sent by a UE, wherein the session transfer request carries a static STI;
[0021] determining that the UE requests to transfer an active CS session according to the static STI, executing a procedure for transferring the active CS session according to the session transfer request, and judging whether the UE has a held CS session; and
[0022] if the UE has a held CS session, sending a call request to the UE to transfer the held CS session, and executing a procedure for transferring the held CS session.
[0023] Another method for multimedia session transfer in an embodiment of the present invention includes:
[0024] receiving a session transfer request sent by a UE, wherein the session transfer request carries a static STI;
[0025] determining that the UE requests to transfer an active Circuit Switched (CS) session according to the static STI, and executing a procedure for transferring the active CS session according to the session transfer request; and
[0026] receiving a session transfer request carrying the static STI and/or a Session Transfer Number (STN) from the UE; determining that the UE requests to transfer a held CS session according to the static STI and/or the STN, and executing a procedure for transferring the held CS session according to the request for transferring the held CS session.
[0027] A server for multimedia session transfer in an embodiment of the present invention includes:
[0028] a first module, adapted to: receive a session transfer request sent by a User Equipment (UE), wherein the session transfer request carries a static Session Transfer Identifier (STI); determine that the UE requests to transfer an active Circuit Switched (CS) session according to the static STI; execute a procedure for transferring the active CS session according to the session transfer request and judge whether the UE has a held CS session; and if so, send a trigger signal to a second module; and
[0029] the second module, adapted to: send a dynamic STI allocated to the held CS session to the UE after receiving the trigger signal sent by the first module; receive another session transfer request sent by the UE, wherein the session transfer request carries the dynamic STI; and execute a procedure for transferring the held CS session according to the other session transfer request.
[0030] Another server for multimedia session transfer in an embodiment of the present invention includes:
[0031] a first module, adapted to: receive a session transfer request sent by a User Equipment (UE), wherein the session transfer request carries a static Session Transfer Identifier (STI); determine that the UE requests to transfer an active Circuit Switched (CS) session according to the static STI; execute a procedure for transferring the active CS session according to the session transfer request and judge whether the UE has a held CS session; and if so, send a trigger signal to a second module; and
[0032] the second module, adapted to: send a call request to the UE after receiving the trigger signal sent by the first module, wherein the call request carries a dynamic STI; and execute a procedure for transferring the held CS session.
[0033] Another server for multimedia session transfer in an embodiment of the present invention includes:
[0034] a first module, adapted to: receive a session transfer request sent by a UE, wherein the session transfer request carries a STI; determine that the UE requests to transfer an active CS session according to the static STI; execute a procedure for transferring the active CS session according to the session transfer request; receive another session transfer request sent by the UE, wherein the session transfer request carries the static STI and/or a STN; judge whether the UE requests to transfer a held CS session according to the static STI and/or the STN; and if so, send a trigger signal to a second module; and
[0035] the second module, adapted to execute a procedure for transferring the held CS session according to the request for transferring the held CS session after receiving the trigger signal sent by the first module.
[0036] Another method for multimedia session transfer in an embodiment of the present invention includes:
[0037] sending a session transfer request that carries a static STI to a server;
[0038] receiving a response message from the server and executing a procedure for transferring a CS session that uses the static STI, and judging whether to send another CS session transfer request and execute a procedure for transferring another CS session according to the response message from the server.
[0039] Another method for multimedia session transfer in an embodiment of the present invention includes:
[0040] sending a session transfer request that carries a static STI to a server;
[0041] receiving a response message from the server, and executing a procedure for transferring a CS session that uses the static STI; and
[0042] receiving a CS session call request sent by the server and executing a procedure according to the CS session call request.
[0043] Another method for multimedia session transfer in an embodiment of the present invention includes:
[0044] sending a session transfer request that carries a static STI to a server;
[0045] receiving a response message from the server, and executing a procedure for transferring a CS session that uses the static STI; and
[0046] judging whether the UE has a held CS session; and if so, sending a session transfer request that carries the static STI and/or an STN.
[0047] A UE for multimedia session transfer in an embodiment of the present invention includes:
[0048] a detecting module, adapted to: detect coverage conditions of a CS network and a PS network at a current location of the UE when the UE is in a conversation, and send a trigger signal to a a transferring module when finding that the current location of the UE is covered by the PS network other than the CS network; and
[0049] the transferring module, adapted to: send a CS session transfer request that carries a static Session Transfer Identifier (STI) to a server after receiving the trigger signal from the detecting module, receive a response message from the server, execute a procedure corresponding to the CS session transfer request that carries the static STI, and judge whether to send another CS session transfer request according to the response message from the server, and execute a procedure corresponding to the other CS session transfer request.
[0050] Another UE for multimedia session transfer in an embodiment of the present invention includes:
[0051] a detecting module, adapted to: detect coverage conditions of a CS network and a PS network at a current location of the UE when the UE is in a conversation, and send a trigger signal to a transferring module when finding that the current location of the UE is covered by the PS network other than the CS network; and
[0052] the transferring module, adapted to: send a CS session transfer request that carries a static STI to a server after receiving the trigger signal from the detecting module, receive a response message from the server, execute a procedure corresponding to the CS session transfer request that carries the static STI, and receive a CS session call request sent by the server and execute a procedure according to the CS session call request.
[0053] Another UE for multimedia session transfer in an embodiment of the present invention includes:
[0054] a detecting module, adapted to: detect coverage conditions of a CS network and a PS network at a current location of the UE when the UE is in a conversation, and send a trigger signal to a transferring module when finding that the current location of the UE is covered by the PS network other than the CS network; and
[0055] a transferring module, adapted to: send a CS session transfer request that carries a static STI to a server after receiving the trigger signal from the detecting module, receive a response message from the server, execute a procedure corresponding to the CS session transfer request that carries the static STI, and judge whether any CS session is held; and if so, send a request again for transferring the held CS session that uses the static STI and/or a STN and execute a procedure for transferring the held CS session.
[0056] The method, UE, and server for multimedia session transfer in the embodiments of the present invention fulfill the objective of transferring two multimedia sessions of a non ICS UE from a CS network to a PS network.
BRIEF DESCRIPTION OF THE DRAWINGS
[0057] To make the technical solution under the present invention clearer, the following outlines the accompanying drawings involved in the description of the embodiments of the present invention. Apparently, the accompanying drawings outlined below are exemplary only and not exhaustive, and persons of ordinary skill in the art can derive other drawings from such accompanying drawings without any creative effort.
[0058] FIGS. 1A and 1B are flowcharts of a method provided in embodiment one of the present invention;
[0059] FIGS. 2A and 2B are flowcharts of a method provided in embodiment two of the present invention;
[0060] FIGS. 3A and 3B are flowcharts of a method provided in embodiment three of the present invention;
[0061] FIG. 4 shows a UE provided in embodiment four of the present invention;
[0062] FIG. 5 shows a UE provided in embodiment five of the present invention;
[0063] FIG. 6 shows a UE provided in embodiment six of the present invention;
[0064] FIG. 7 shows a server provided in embodiment seven of the present invention;
[0065] FIG. 8 shows a server provided in embodiment eight of the present invention; and
[0066] FIG. 9 shows a server provided in embodiment nine of the present invention.
DETAILED DESCRIPTION OF THE EMBODIMENTS
[0067] To make the technical solution, objectives and merits of the present invention clearer, the following describes nine embodiments of the present invention in more detail with reference to accompanying drawings.
[0068] The first embodiment is a method for multimedia session transfer, which includes the following steps:
[0069] As shown in FIG. 1 , UE-A has a CS session with UE-B and UE-C respectively, and the session between UE-A and UE-B is active, and the session between UE-A and UE-C is held. When UE-A moves to an area covered by the PS network other than the CS network, UE-A initiates a procedure for transferring the CS session from the CS network to the PS network actively. An MSC server is an entity introduced into the softswitch of the CS mobile network. It provides functions such as call control and mobility management of the MSC, and controls a CS Media Gateway (CS-MGW) to bear media streams of the call.
[0070] The MSC server communicates with the UE through layer-3 signaling of the mobile network (for example, 24.008 signaling in the 3GPP network). Meanwhile, the MSC server can implement conversion between the Session Initiation Protocol (SIP) signaling of the IMS network and the layer-3 signaling of the mobile network.
[0071] The CS-MGW is responsible for exchanging media streams between the CS network and the IMS network.
[0072] The CSCF implements the registration/registrar function, and performs session control.
[0073] The ICS UE is a UE capable of ICS. It can set up an IMS session through a Gm interface or an I1 interface, and can exercise session control on the CS session. The non ICS UE is a UE incapable of ICS.
[0074] Step 101 : The non ICS UE-A in the PS network sends a transfer request to the SCC AS. The transfer request is a session request message that carries a static STI. The message passes through the S-CSCF and arrives at the SCC AS.
[0075] Step 102 a : After receiving the request, the SCC AS determines that a new access leg is set up within the PS network, and allocates a dynamic STI (namely, STI-1) to the access leg.
[0076] Step 102 b : The SCC AS judges whether UE-A has any other CS session (held CS session). If so, the SCC AS sends the dynamic STI (STI-2) corresponding to the held CS session to UE-A through a message such as a Refer message. The message carries the dynamic STI-2 corresponding to the held CS session. More specifically, the STI-2 is carried in a Refer-To header field of the Refer message. Alternatively, the dynamic STI-2 is carried in a response message in response to the transfer request that carries a static STI. For details, see step 105 .
[0077] The STI-2 here may be a dynamic STI allocated by the SCC AS to a call connection at the time of setting up the call connection between UE-A and UE-C; or may be a dynamic STI allocated by the SCC AS to the held CS session temporarily according to a judgment result obtained in step 102 b.
[0078] Step 103 : According to the static STI carried in the transfer request in step 101 , the SCC AS determines that UE-A needs to transfer out the currently active access leg of the CS network. Therefore, the SCC AS updates the peer UE-B corresponding to the CS voice connection of UE-A, with a view to requesting UE-B to transfer the session between UE-B and UE-A to the PS network of UE-A. The request passes through the S-CSCF and arrives at UE-B.
[0079] Step 104 : UE-B returns a 200 OK message, which passes through the S-CSCF and arrives at the SCC AS.
[0080] Note: Step 102 b may also occur after step 104 .
[0081] Step 105 : The SCC AS sends a 200 OK message to UE-A, confirming success of transfer. The message carries a dynamic STI-1 allocated in step 102 a. Meanwhile, the dynamic STI-2 in step 102 b may also be carried in the 200 OK message. In this case, both STI-1 and STI-2 can be carried in a Contact header field, a Replace header field, or a Target-Dialog header field. In this case, STI-1 and STI-2 are order-sensitive so that UE-A may determine which STI is allocated to the transfer request message, and which STI is allocated to the held CS session. Here it is assumed that STI-1 is located before STI-2.
[0082] STI-1 and STI-2 may also be carried in different header fields. In this case, STI-1 may be carried in a Contact header field, and STI-2 may be carried in a Replace header field or a Target-Dialog header field. In this way, UE-A can judge whether any STI is allocated to the held CS session according to the content of different header fields.
[0083] STI-2 may also be carried in another message such as a Refer message. The SCC AS sends a Refer message to UE-A, with STI-2 carried in a Refer-To header field of the Refer message. In this way, UE-A can determine the need of sending a transfer request that carries STI-2 to the SCC AS according to the Refer message, with a view to transferring the held CS session.
[0084] Step 106 : The SCC AS sends a Bye message to the access leg of the CS network of UE-A, with a view to disconnecting the CS voice connection between UE-A and UE-B. The message passes through the S-CSCF and arrives at the MSC server of UE-A.
[0085] Step 107 : After receiving the Bye message, the MSC server of UE-A sends a Disconnect message to UE-A.
[0086] Step 108 : UE-A returns a Release message to the MSC server.
[0087] Step 109 : After receiving the Release message, the MSC server sends a 200 OK message to the SCC AS, confirming success of disconnecting the CS voice connection. The message passes through the S-CSCF and arrives at the SCC AS.
[0088] Step 1010 : If STI-2 is carried in the 200 OK message, UE-A checks whether the content of the 200 OK message includes STI-2. If finding STI-2 in the message, UE-A sends a transfer request that carries STI-2 to the SCC AS again, requesting to transfer the held CS session.
[0089] In this case, if STI-1 and STI-2 are carried in the same header field, UE-A can make the judgment according to the number of dynamic STIs. For example, in normal circumstances, the 200 OK message in step 105 carries only one dynamic STI, but the 200 OK message in step 105 carries two dynamic STIs, and therefore, UE-A determines that an STI is allocated to the held CS session, and determines that STI-1 is allocated to the new access leg of the PS network according to the order of STIs in step 105 and that STI-2 is allocated to the held CS session. If STI-1 and STI-2 are carried in different header fields, UE-A judges whether an STI is allocated to the held CS session according to whether there exists a special header field that carries STI-2.
[0090] If STI-2 is carried in a Refer-To header field of a Refer message, UE-A may send a transfer request that carries STI-2 to the SCC AS according to the Refer message, with a view to transferring the held CS session.
[0091] Step 1011 : The non ICS UE-A in the PS network sends a transfer request to the SCC AS. The transfer request is a session request message that carries STI-2. The message passes through the S-CSCF and arrives at the SCC AS.
[0092] Step 1012 : After receiving the request, the SCC AS determines that a new access leg is set up within the PS network according to the transfer request, and allocates a dynamic STI (namely, STI-3) to the access leg.
[0093] Step 1013 : According to the dynamic STI (STI-2) carried in the transfer request in step 1011 , the SCC AS determines that UE-A needs to transfer out the currently held access leg of the CS network. Therefore, the SCC AS updates the peer UE-C corresponding to the CS session of UE-A, with a view to requesting UE-C to transfer the voice session to the PS network of UE-A. The request passes through the S-CSCF and arrives at UE-C.
[0094] Step 1014 : UE-C returns a 200 OK message, which passes through the S-CSCF and arrives at the SCC AS.
[0095] Step 1015 : The SCC AS sends a 200 OK message to UE-A, confirming success of transfer. The message carries a dynamic STI-3 allocated in step 12 .
[0096] Step 1016 : The SCC AS sends a Bye message to the access leg of the CS network of UE-A, with a view to disconnecting the CS voice connection between UE-A and UE-C. The message passes through the S-CSCF and arrives at the MSC server of UE-A.
[0097] Step 1017 : After receiving the Bye message, the MSC server of UE-A sends a Disconnect message to UE-A.
[0098] Step 1018 : UE-A returns a Release message to the MSC server.
[0099] Step 1019 : After receiving the Release message, the MSC server sends a 200 OK message to the SCC AS, confirming success of disconnecting the CS voice connection. The message passes through the S-CSCF and arrives at the SCC AS.
[0100] The merits of the solution put forward in this embodiment are: The server receives the CS multimedia session transfer request from the UE; when executing a procedure for transferring the active CS session according to the session transfer request, the server judges whether the UE has a held CS session; if so, the server sends the dynamic STI for transferring the held CS session to the UE so that the UE uses the dynamic STI to transfer the held CS session. In this way, two CS multimedia sessions of a non ICS UE can be transferred to the PS network.
[0101] The second embodiment of the present invention is another method for multimedia session transfer, which includes the following steps:
[0102] As shown in FIG. 2 , the prerequisites are the same as those in the first embodiment of the present invention.
[0103] Step 201 : The non ICS UE-A in the PS network sends a transfer request to the SCC AS. The transfer request is a session request message that carries a static STI. The message passes through the S-CSCF and arrives at the SCC AS.
[0104] Step 202 a : After receiving the request, the SCC AS determines that a new access leg is set up within the PS network, and allocates a dynamic STI (namely, STI-1) to the access leg.
[0105] Step 202 b : The SCC AS judges whether UE-A has another held CS session. If so, the SCC AS sends a call request to UE-A to transfer the held CS session; and allocates a dynamic STI (namely, STI-3) to the new access leg set up for the call request.
[0106] Step 203 : According to the static STI carried in the transfer request in step 201 , the SCC AS determines that UE-A needs to transfer out the currently active access leg of the CS network. The SCC AS updates the peer UE-B, with a view to requesting UE-B to transfer the session between UE-B and UE-A to the PS network of UE-A. The request passes through the S-CSCF and arrives at UE-B.
[0107] Step 204 : UE-B returns a 200 OK message, which passes through the S-CSCF and arrives at the SCC AS.
[0108] Step 205 : The SCC AS sends a 200 OK message to UE-A, confirming success of transfer. The message carries a dynamic STI (STI-1) allocated in step 202 .
[0109] Step 206 : The SCC AS sends a Bye message to the access leg of the CS network of UE-A, with a view to disconnecting the CS session connection between UE-A and UE-B. The message passes through the S-CSCF and arrives at the MSC server of UE-A.
[0110] Step 207 : After receiving the Bye message, the MSC server of UE-A sends a Disconnect message to UE-A.
[0111] Step 208 : UE-A returns a Release message to the MSC server.
[0112] Step 209 : After receiving the Release message, the MSC server sends a 200 OK message to UE-A, confirming success of disconnecting the CS voice connection. The message passes through the S-CSCF and arrives at the SCC AS.
[0113] Step 2010 : The SCC AS sends a call request to UE-A. The call request carries a dynamic STI (STI-3) allocated to a new access leg which is set up for the call request.
[0114] The call request carries information indicating suppression of ringing of the UE. The information indicating suppression of ringing of the UE may be another dynamic STI (STI-2) different from STI-3, or a special indication in the Contact header field, or a special SIP header field in the call request message, or any combination thereof. STI-2 here may be an STI allocated by the SCC AS dynamically for this call transfer process, or a dynamic STI allocated by the SCC AS to a call connection between UE-A and UE-C at the time of setting up the call connection.
[0115] Step 2011 : UE-A returns a 200 OK message.
[0116] According to the information indicating suppression of ringing of the UE in the received request message, the UE does not ring.
[0117] Step 2012 : According to the judgment result obtained in step 202 b, the SCC AS determines that UE-A needs to transfer out the currently held access leg of the CS network. Therefore, the SCC AS updates the peer UE-C corresponding to the CS session of UE-A, with a view to requesting UE-C to transfer the voice session to the PS network of UE-A. The request passes through the S-CSCF and arrives at UE-C.
[0118] Step 2013 : UE-C returns a 200 OK message, which passes through the S-CSCF and arrives at the SCC AS.
[0119] Step 2014 : The SCC AS sends a Bye message to the access leg of the CS network of UE-A, with a view to disconnecting the CS voice connection between UE-A and UE-C. The message passes through the S-CSCF and arrives at the MSC server of UE-A.
[0120] Step 2015 : After receiving the Bye message, the MSC server of UE-A sends a Disconnect message to UE-A.
[0121] Step 2016 : UE-A returns a Release message to the MSC server.
[0122] Step 2017 : After receiving the Release message, the MSC server sends a 200 OK message to the SCC AS, confirming success of disconnecting the CS voice connection. The message passes through the S-CSCF and arrives at the SCC AS.
[0123] The merits of the solution put forward in this embodiment are: The server receives the CS multimedia session transfer request from the UE; when executing a procedure for transferring the active CS session according to the session transfer request, the server judges whether the UE has a held CS session; and if so, the server sends a call request that carries the dynamic STI actively to transfer the currently held CS session. In this way, two CS multimedia sessions of a non ICS UE can be transferred to the PS network.
[0124] The third embodiment of the present invention is another method for multimedia session transfer, which includes the following steps:
[0125] As shown in FIG. 3 , the prerequisites are the same as those in the first embodiment of the present invention.
[0126] Step 301 : The non ICS UE-A in the PS network sends a transfer request to the SCC AS. The transfer request is a session request message that carries a static STI. The message passes through the S-CSCF and arrives at the SCC AS.
[0127] Step 302 : After receiving the request, the SCC AS determines that a new access leg is set up within the PS network, and allocates a dynamic STI to the access leg. It is assumed that this STI is STI-1.
[0128] Step 303 : According to the static STI carried in the transfer request in step 301 , the SCC AS determines that UE-A needs to transfer out the currently active access leg of the CS network. The SCC AS updates the peer UE-B, with a view to requesting UE-B to transfer the session between UE-B and UE-A to the PS network of UE-A. The request passes through the S-CSCF and arrives at UE-B.
[0129] Step 304 : UE-B returns a 200 OK message, which passes through the S-CSCF and arrives at the SCC AS.
[0130] Step 305 : The SCC AS sends a 200 OK message to UE-A, confirming success of transfer. The message carries a dynamic STI (STI-1) allocated in step 2 .
[0131] Step 306 : The SCC AS sends a Bye message to the access leg of the CS network of UE-A, with a view to disconnecting the CS session connection between UE-A and UE-B. The message passes through the S-CSCF and arrives at the MSC server of UE-A.
[0132] Step 307 : After receiving the Bye message, the MSC server of UE-A sends a Disconnect message to UE-A.
[0133] Step 308 : UE-A returns a Release message to the MSC server.
[0134] Step 309 : After receiving the Release message, the MSC server sends a 200 OK message to UE-A, confirming success of disconnecting the CS voice connection. The message passes through the S-CSCF and arrives at the SCC AS.
[0135] Step 3010 : After determining existence of a held CS session, UE-A sends a second transfer request to the SCC AS from the PS network. The second transfer request is a session request message that carries a static STI and/or an STN. The message passes through the S-CSCF and arrives at the SCC AS.
[0136] Step 3011 a : After receiving the request, the SCC AS determines that a new access leg is set up within the PS network according to the second transfer request, and allocates a dynamic STI (namely, STI-3) to the access leg.
[0137] Step 3011 b : According to the content of the STI, the SCC AS determines that UE-A needs to transfer the held CS session.
[0138] If UE-A continues to initiate call transfer by using the static STI, the SCC AS determines that UE-A expects to transfer the held CS session according to order of call transfer initiated by UE-A.
[0139] If UE-A initiates call transfer by using the static STI and/or the STN, the SCC AS determines that UE-A expects to transfer the held CS session according to the content of the STI used by UE-A.
[0140] Step 3012 : According to the dynamic STI (STI-3) carried in the transfer request in step 3011 a, the SCC AS determines that UE-A needs to transfer out the currently held access leg of the CS network. Therefore, the SCC AS updates the peer UE-C corresponding to the CS session of UE-A, with a view to requesting UE-C to transfer the voice session to the PS network of UE-A. The request passes through the S-CSCF and arrives at UE-C.
[0141] Step 3013 : UE-C returns a 200 OK message, which passes through the S-CSCF and arrives at the SCC AS.
[0142] Step 3014 : The SCC AS sends a 200 OK message to UE-A, confirming success of transfer. The message carries a dynamic STI-3 allocated in step 3012 .
[0143] Step 3015 : The SCC AS sends a Bye message to the access leg of the CS network of UE-A, with a view to disconnecting the CS voice connection between UE-A and UE-C. The message passes through the S-CSCF and arrives at the MSC server of UE-A.
[0144] Step 3016 : After receiving the Bye message, the MSC server of UE-A sends a Disconnect message to UE-A.
[0145] Step 3017 : UE-A returns a Release message to the MSC server.
[0146] Step 3018 : After receiving the Release message, the MSC server sends a 200 OK message to UE-A, confirming success of disconnecting the CS voice connection. The message passes through the S-CSCF and arrives at the SCC AS.
[0147] The merits of the solution put forward in this embodiment are: The server receives the CS multimedia session transfer request from the UE; when executing a procedure for transferring the active CS session according to the session transfer request, the server judges whether the UE has a held CS session; and if so, the UE sends a CS session transfer request again that carries the static STI and/or the STN. In this way, two CS multimedia sessions of a non ICS UE can be transferred to the PS network.
[0148] The fourth embodiment of the present invention is a UE for multimedia session transfer.
[0149] As shown in FIG. 4 , the UE 41 is a mobile terminal incapable of ICS, namely, a non ICS UE. The UE includes:
[0150] a detecting module 401 , adapted to: detect coverage conditions of a CS network and a PS network at a current location of the UE 41 when the UE 41 is in a conversation, and send a trigger signal to a transferring module 402 when finding that the current location of the UE 41 is covered by the PS network other than the CS network;
[0151] the transferring module 402 , adapted to: send a CS session transfer request that carries a static STI to a server after receiving the trigger signal from the detecting module 401 , receive a response message from the server, execute a procedure corresponding to the CS session transfer request that carries the static STI, and judge whether to send another CS session transfer request according to the response message from the server, and execute a procedure corresponding to the other CS session transfer request; and
[0152] a judging module 4002 , located inside the transferring module 402 , and adapted to: judge whether to send the CS session transfer request again according to the number of the dynamic STIs carried in the response message from the server; if two dynamic STIs exist, retrieve the dynamic STI intended for the held CS session according to the set order, and send a request again for transferring the held CS session by using the dynamic STI; or
[0153] judge whether to send the CS session transfer request again according to whether the Replace header field or the Target-Dialog header field in the response message from the server carries the dynamic STI allocated to the held CS session.
[0154] The merits of the solution in this embodiment are: A design of modules of a non ICS UE is put forward so that the non ICS UE can transfer two CS multimedia sessions to the PS network.
[0155] The fifth embodiment of the present invention is a UE for multimedia session transfer.
[0156] As shown in FIG. 5 , the UE 51 is a mobile terminal incapable of ICS, namely, a non ICS UE. The UE includes:
[0157] a detecting module 501 , adapted to: detect coverage conditions of a CS network and a PS network at a current location of the UE 51 when the UE 51 is in a conversation, and send a trigger signal to a transferring module 502 when finding that the current location of the UE 51 is covered by the PS network other than the CS network; and
[0158] the transferring module 502 , adapted to: send a CS session transfer request that carries a static STI to a server after receiving the trigger signal from the detecting module 501 , receive a response message from the server, execute a procedure corresponding to the CS session transfer request that carries the static STI, and receive a CS session call request sent by the server and execute a procedure according to the CS session call request.
[0159] The merits of the solution in this embodiment are: Another design of modules of a non ICS UE is put forward so that the non ICS UE can transfer two CS multimedia sessions to the PS network.
[0160] The sixth embodiment of the present invention is a UE for multimedia session transfer.
[0161] As shown in FIG. 6 , the UE 61 is a mobile terminal incapable of ICS, namely, a non ICS UE. The UE includes:
[0162] a detecting module 601 , adapted to: detect coverage conditions of a CS network and a PS network at a current location of the UE 61 when the UE 61 is in a conversation, and send a trigger signal to a transferring module 602 when finding that the current location of the UE 61 is covered by the PS network other than the CS network; and
[0163] the transferring module 602 , adapted to: send a CS session transfer request that carries a static STI to a server after receiving the trigger signal from the detecting module 601 , receive a response message from the server, execute a procedure corresponding to the CS session transfer request that carries the static STI, and judge whether any CS session is held; and if so, send a request again for transferring the held CS session that uses the static STI and/or the STN and execute a procedure for transferring the held CS session.
[0164] The merits of the solution in this embodiment are: A third design of modules of a non ICS UE is put forward so that the non ICS UE can transfer two CS multimedia sessions to the PS network.
[0165] The seventh embodiment of the present invention is a server for multimedia session transfer.
[0166] As shown in FIG. 7 , the server 71 is adapted to exchange information with a non ICS UE so that the UE can transfer two CS multimedia sessions to a PS network when the UE is covered by the PS network other than the CS network or scarcely covered by the CS network but well covered by the PS network. The server includes:
[0167] a first module 701 , adapted to: receive a CS session transfer request sent by the UE, where the CS session transfer request carries a static STI; determine that the UE requests to transfer an active CS session according to the static STI; process the session transfer request and judge whether the UE has a held CS session; and if so, send a trigger signal to a second module 702 ; and
[0168] the second module 702 , adapted to: send a dynamic STI allocated to the held CS session to the UE when receiving the trigger signal sent by the first module 701 ; receive another session transfer request sent by the UE, where the session transfer request carries the dynamic STI; and process the session transfer request.
[0169] The merits of the solution in this embodiment are: A design of functional modules of a server for multimedia session transfer is put forward, and therefore, two CS multimedia sessions of a non ICS UE can be transferred to the PS network when the UE is covered by the PS network other than the CS network or scarcely covered by the CS network but well covered by the PS network.
[0170] The eighth embodiment of the present invention is a server for multimedia session transfer.
[0171] As shown in FIG. 8 , the server 81 is adapted to exchange information with a non ICS UE so that the UE can transfer two CS multimedia sessions to a PS network when the UE is covered by the PS network other than the CS network or scarcely covered by the CS network but well covered by the PS network. The server includes:
[0172] a first module 801 , adapted to: receive a CS session transfer request sent by the UE, where the CS session transfer request carries a static STI; determine that the UE requests to transfer an active CS session according to the static STI; execute a procedure for transferring the active CS session according to the session transfer request and judge whether the UE has a held CS session; and if so, send a trigger signal to a second module 802 ; and
[0173] the second module 802 , adapted to: send a CS session call request to the UE after receiving the trigger signal sent by the first module 801 , where the CS session call request carries a dynamic STI; and execute a procedure for transferring the held CS session.
[0174] The merits of the solution in this embodiment are: Another design of functional modules of a server for multimedia session transfer is put forward, and therefore, two CS multimedia sessions of a non ICS UE can be transferred to the PS network when the UE is covered by the PS network other than the CS network or scarcely covered by the CS network but well covered by the PS network.
[0175] The ninth embodiment of the present invention is a server for multimedia session transfer.
[0176] As shown in FIG. 9 , the server 91 is adapted to exchange information with a non ICS UE so that the UE can transfer two CS multimedia sessions to a PS network when the UE is covered by the PS network other than the CS network or scarcely covered by the CS network but well covered by the PS network. The server includes:
[0177] a first module 901 , adapted to: receive a session transfer request sent by a UE, where the session transfer request carries a static STI; determine that the UE requests to transfer an active CS session according to the static STI; execute a procedure for transferring the active CS session according to the session transfer request; receive another session transfer request sent by the UE, where the session transfer request carries the static STI and/or an STN; judge whether the UE requests to transfer a held CS session according to the static STI and/or the STN; and if so, send a trigger signal to a second module 902 ; and
[0178] the second module 902 , adapted to execute a procedure for transferring the active CS session according to the request for transferring the held CS session after receiving the trigger signal sent by the first module 901 .
[0179] The merits of the solution in this embodiment are: A third design of functional modules of a server for multimedia session transfer is put forward, and therefore, two CS multimedia sessions of a non ICS UE can be transferred to the PS network when the UE is covered by the PS network other than the CS network or scarcely covered by the CS network but well covered by the PS network.
[0180] The above descriptions are merely preferred embodiments of the present invention, but not intended to limit the scope of the present invention. Any modifications, variations or replacements that can be easily derived by those skilled in the art shall fall within the scope of the present invention. Therefore, the scope of the present invention is subject to the appended claims. | The present invention discloses a method, User Equipment (UE), and server for multimedia session transfer, and relates to a mobile communication technology, and in particular, to a technology for transferring multimedia sessions from a Circuit Switched (CS) network to a Packet Switched (PS) network. The method includes: receiving a session transfer request sent by a UE, where the session transfer request carries a static Session Transfer Identifier (STI); executing a procedure for transferring the active CS session according to the CS session transfer request, sending the dynamic STI corresponding to the held CS session to the UE, and receiving the request for transferring the held CS session and executing a procedure for transferring the held CS session. Further, a UE and a server are provided. | 7 |
BACKGROUND
[0001] 1. Technical Field
[0002] The present invention relates to an mounting support for a flexible printed circuit board and a retaining apparatus having the mounting support.
[0003] 2. Description of Related Art
[0004] Nowadays, electronic products have achieved ever greater levels of miniaturization in volume and diversification in function. Correspondingly, flexible printed circuit boards used in these electronic products have become smaller and smaller, and more and more complicated.
[0005] For the convenience of manufacturing, a flexible printed circuit board in a manufacturing process generally is classified into multiple electrical trace units. Each of electrical trace units belongs to a flexible printed circuit board unit. Thus, multiple flexible printed circuit board units can be manufactured simultaneously. After the flexible printed circuit board is manufactured and various electronic components are mounted thereon, laser processing such as a laser cutting is performed so as to separate the multiple flexible printed circuit board units according to the electrical trace units. Because the flexible printed circuit board is flexible and light in weight, the flexible printed circuit board can be held in place using a vacuum device of laser processing apparatus. Then, a laser beam produced by the laser processing apparatus cuts the flexible printed circuit board according to the electrical trace units, thereby separating the flexible printed circuit board into the multiple flexible printed circuit board units.
[0006] In order to ensure stable positioning under vacuum suction of the flexible printed circuit board onto the vacuum device, a contact surface of the flexible printed circuit board to be sucked by the vacuum device must be adequately flat. However, when the flexible printed circuit board is a double surface mounted flexible printed circuit board (i.e., two opposite surfaces of the flexible printed circuit board have electronic components mounted thereon), each of the two surfaces of the flexible printed circuit boards is unsmooth due to the electronic components mounted thereon. Thus, the double surface mounted flexible printed circuit board cannot be fixed on the vacuum device stably, thereby affecting laser processing precision. Furthermore, when the double surface mounted flexible printed circuit board is fixed on the vacuum device directly, the electronic components mounted may be damaged and/or removed.
[0007] What is needed, therefore, is a mounting support that is capable of retaining a double surface mounted flexible printed circuit board to process using a laser beam.
SUMMARY
[0008] One preferred embodiment provides a mounting support for retaining a flexible printed circuit board. The flexible printed circuit board has a side surface and at least one electronic component mounted on the side surface. The mounting support includes a first surface for contacting with the side surface of the flexible printed circuit board and a second surface on an opposite side of the mounting support to the first surface. The mounting support has at least one first recess defined in the first surface for receiving the at least one electronic component therein and at least one through-hole penetrating the first surface and the second surface. The mounting support has at least one second recess defined in the second surface.
BRIEF DESCRIPTION OF THE DRAWINGS
[0009] Many aspects of the present embodiments can be better understood with reference to the following drawings. The components in the drawings are not necessarily drawn to scale, the emphasis instead being placed upon clearly illustrating the principles of the present embodiments. Moreover, in the drawings, like reference numerals designate corresponding parts throughout the several views.
[0010] FIG. 1 is a schematic view of a double surface mounted flexible printed circuit board;
[0011] FIG. 2 is a schematic view of a mounting support for retaining a flexible printed circuit board according to a first exemplary preferred embodiment, which mainly shows a first surface of the mounting support;
[0012] FIG. 3 is a schematic view of the mounting support of FIG. 2 , which mainly shows a second surface of the mounting support;
[0013] FIG. 4 is a schematic, cross-sectional view of the mounting support of FIG. 2 as viewed along line IV-IV;
[0014] FIG. 5 is a schematic, cross-sectional view of an apparatus including the mounting support of FIG. 2 ;
[0015] FIG. 6 is a schematic view of a mounting support for retaining a flexible printed circuit board according to a second exemplary preferred embodiment, which mainly shows a second surface of the mounting support;
[0016] FIG. 7 is a schematic view of a mounting support for retaining a flexible printed circuit board according to a third exemplary preferred embodiment, which mainly shows a second surface of the mounting support; and
[0017] FIG. 8 is a schematic view of a mounting support for retaining a flexible printed circuit board according to a fourth exemplary preferred embodiment, which mainly shows a second surface of the mounting support.
DETAILED DESCRIPTION OF THE EMBODIMENTS
[0018] Embodiments will now be described in detail below and with reference to the drawings.
[0019] In FIG. 1 , a flexible printed circuit board 10 is shown. The flexible circuit board 10 is a double surface mounted flexible printed circuit board. The flexible printed circuit board 10 includes a first mounting surface 101 and an opposite second mounting surface 102 . The first mounting surface 101 has a number of first electronic components 103 mounted thereon. The second mounting surface 102 has a number of second electronic components 104 mounted thereon. The first electronic components 103 can be different from the second electronic components 104 . Each of the first electronic components 103 can be different and each of the second electronic components 104 can also be different. For purpose of illustration only, the first electronic components 103 in the present embodiment have a rectangular parallelepiped configuration, and the second electronic components 104 have a cylindrical configuration. It is understood that the first electronic components 103 and the second electronic components 104 may have other shapes.
[0020] In FIG. 2 to FIG. 4 , a mounting support 100 for retaining the flexible printed circuit board 10 is shown. The mounting support 100 can be designed to come into contact with the first mounting surface 101 having the first electronic components 103 mounted thereon, or to come into contact with the second mounting surface 102 having the second electronic components 104 mounted thereon. In the first exemplary preferred embodiment, the mounting support 100 is designed to come into contact with the first mounting surface 101 having the first electronic components 103 mounted thereon.
[0021] The mounting support 100 is board-shaped. The mounting support 100 can be made of metals, such as copper, aluminum, iron and alloys thereof, or organic composites such as polytetrafluoroethylene (PTFE), etc. In the first preferred embodiment, the mounting support 100 is an aluminum board with flat surfaces, i.e., a first surface 110 and a second surface 120 on an opposite side of the mounting support 100 . The first surface 110 is parallel to the second surface 120 .
[0022] The mounting support 100 has a number of first recesses 112 and a number of through-holes 113 defined in the first surface 110 . The first recesses 112 are configured for receiving the first electronic components 103 mounted on the first mounting surface 101 of the flexible printed circuit board 10 . Each of the first recesses 112 corresponds to one of the first electronic components 103 . Dimension, configuration and distribution of the first recesses 112 are mated with that of the first electronic components 103 mounted on the flexible printed circuit board 10 . Advantageously, for the convenience of placing and taking the first electronic components 103 , the size of the first recesses 112 can be a little larger than that of the first electronic components 103 . In the first preferred embodiment, each of the first recesses 112 has a rectangular parallelepiped configuration so as to receive the first electronic components 103 with a rectangular parallelepiped configuration.
[0023] The through-holes 113 are defined through the first surface 110 and the second surface 120 . The through-holes 113 may be defined at any position other than the first recesses 112 . The though-holes 113 may have a cross-section of circular, square, rectangular, or other irregular shape. In the first exemplary preferred embodiment, a cross-section of each of the though-holes 113 taken normal to the second surface 120 is circular. Each of the through-holes 113 is located adjacent to the respective first recesses 112 . Advantageously, the through-holes 113 are arranged so as to surround the first recesses 113 uniformly on the first surface 110 .
[0024] The mounting support 100 has a second recess 122 defined in the second surface 120 . The second recess 122 may be located at a desired position. A cross-section of the second recess 122 taken normal to the second surface 120 may be circular, square, rectangular, annular or other irregular shape. A sum of a depth of the second recess 122 and a depth of any one of the first recess 112 should be less than a distance from the first surface 110 to the second surface 120 of the mounting support 100 in order to ensure that the second recess 122 does not communicate with the corresponding first recess 112 . In other words, the first recesses 112 defined in the first surface 110 should not communicate with the second recess 122 defined in the second surface 120 . In the first exemplary preferred embodiment, the second recess 122 is in the middle of the second surface 120 . A cross-section of the second recess 122 taken normal to the second surface 120 is square. The through-holes 113 defined through the first surface 110 and the second surface 120 are arranged so as to surround the second recess 122 uniformly on the second surface 120 .
[0025] In FIG. 5 , a retaining apparatus 150 including the mounting support 100 and the vacuum device 140 is shown. The vacuum device 140 has a number of vacuum inlets 141 therein. The mounting support 100 is disposed on the vacuum device 140 . The second surface 120 of the mounting support 100 contacts with the vacuum device 140 . The through-holes 113 and the second recess 122 communicate with the vacuum inlets 141 .
[0026] In use, the flexible printed circuit board 10 is placed on the mounting support 100 with the first mounting surface 101 having the first electronic components 103 mounted thereon. The first electronic components 103 mounted on the first mounting surface 101 are received in the corresponding first recesses 112 , and thus the flexible printed circuit board 10 is supported by the mounting support 100 flatly. The through-holes 113 provide suction channels extending from the flexible printed circuit board 10 to the vacuum inlets 141 of the vacuum device 140 . In this way the flexible printed circuit board 10 is held on the mounting support 100 firmly when a vacuum sucking force produced by the vacuum device 140 is applied to the flexible printed circuit board 10 via the through-holes 113 . In the first exemplary preferred embodiment, the through-holes 113 are arranged to surround the first recesses 112 and are distributed uniformly so that the vacuum sucking force can be distributed uniformly. Thus the flexible printed circuit board 10 and flexible printed circuit boards cut from the flexible printed circuit board 10 can be fixed on the mounting support 100 flatly and firmly well. Meanwhile, air in the second recess 122 is removed using the vacuum device 140 through the vacuum inlets 141 . Thus vacuum sucking force acting on the mounting support 100 can be increased, thereby fixing the mounting support 100 on the vacuum device 140 firmly.
[0027] In FIG. 6 , a mounting support 200 for retaining the flexible printed circuit board 10 according to a second exemplary embodiment is shown. The mounting support 200 is similar to the mounting support 100 in the first exemplary embodiment except that the second surface 220 defines a number of second recesses 222 therein.
[0028] A cross-section of each of the second recesses 222 taken normal to the second surface 220 can be circular, square, rectangular, annular or other irregular shape. Each of the second recesses 222 can have essentially identical configuration and essentially identical depth. The second recess 222 does not communicate with the first recess. If one of the second recesses 222 does not correspond to any first recess in position, a depth of the one second recess 222 can be less than a distance from the first surface 210 to the second surface 220 of the mounting support 200 . In the second exemplary preferred embodiment, a cross-section each of the second recesses 222 taken normal to the second surface 220 is rectangular. The second recesses 222 are in the middle of the second surface 220 and arranged in a parallel manner. Each of the second recesses 222 has essentially identical depth and does not communicate with the corresponding first recesses.
[0029] In FIG. 7 , a mounting support 300 for retaining the flexible printed circuit board 10 according to a third exemplary embodiment is shown. The mounting support 300 is similar to the mounting support 100 in the first exemplary embodiment except that the second surface 320 defines a larger second recess 322 therein. Because the second recess 322 is large in size, all the through-holes 313 communicate with the second recess 322 . It can be understood that only one or some of the through-holes 313 communicate with the second recess 322 according to different shapes of the second recess 322 .
[0030] In FIG. 8 , a mounting support 400 for laser processing the flexible printed circuit board 10 according to a fourth exemplary embodiment is shown. The mounting support 400 is similar to the mounting support 100 in the first exemplary embodiment except that the second surface 420 defines a number of second recesses 422 therein and all the through-holes 413 communicate with the second recesses 422 . In the fourth exemplary preferred embodiment, a cross-section of each of the second recesses 422 taken normal to the second surface 420 is rectangular. The second recesses 422 are arranged parallel to each other. Each of the second recesses 422 has essentially identical depth and does not communicate with the corresponding first recesses. Each of the second recesses 422 communicates with two of the through-holes 413 . According to different shapes of the second recesses 422 , maybe some of the through-holes 413 communicate with some of the second recesses 422 .
[0031] While certain embodiments have been described and exemplified above, various other embodiments will be apparent to those skilled in the art from the foregoing disclosure. The present invention is not limited to the particular embodiments described and exemplified but is capable of considerable variation and modification without departure from the scope of the appended claims. | An exemplary mounting support for a flexible printed circuit board is provided. The flexible printed circuit board has a side surface and at least one electronic component mounted on the side surface. The mounting support includes a first surface for contacting with the side surface of the flexible printed circuit board and a second surface on an opposite side of the mounting support to the first surface. The mounting support has at least one first recess defined in the first surface for receiving the at least one electronic component therein and at least one through-hole defined through the first surface and the second surface. The mounting support has at least one second recess defined in the second surface. The mounting support can fix a double surface mounted flexible printed circuit board flatly, thereby enhancing laser processing precision. | 7 |
This invention relates to an improved flow test stand system and its corresponding fluid supply system. Currently available flow test stands suffer from the common disadvantage that they necessitate a lot of waiting time during the testing procedure, therefore causing considerable waste of labor and time.
According to the present invention, a plurality of like test table units are provided and connected one by one to form an endless test unit chain. The test unit chain is intermittently driven. Each time it shifts the distance of a test table. Practically, the performance of this system requires only three operators, a first operator at the front end of the endless test unit chain, a second operator at the middle, and a third operator at the rear end thereof. The first operator mounts the flow apparatus which are to be tested respectively onto one test table unit. The second operator carries out the test of each flow apparatus, and marks out the unqualified products. The third operator sorts out the good and bad products and sends them respectively to packing line or repairing line.
According to another feature of this invention, there is provided a fluid supply system which ensures the pressure in each test table unit to the equal.
This invention will be better understood when read in connection with the accompanying drawing, in which:
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a perspective view of the flow test stand system according to this invention with fluid supply system;
FIG. 2 is a lateral elevational view showing the endless test unit chain and the pipeline of the present invention;
FIG. 3 is an enlarged perspective view showing the mechanical connection of the endless test unit chain;
FIG. 4 is an enlarged perspective view of a test table unit; and
FIG. 5 is a perspective view showing the fluid supply system of this invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
Referring to the drawing, particularly FIG. 1 thereof, the main body 1 of the present invention comprises a plurality of test table units 2 connected one by one to form a caterpillar-track-like endless test unit chain. Each test table unit 2 has a flat table plane 20. The table plane 20 can be designed depending on the test requirement. This is similar to known flow test stand and not an essential part of this invention, thus detailed description thereof will be omitted.
The test table units 2 are mechanically connected with an endless chain 12 engaging with two sprockets 10, 11 (see FIG. 2), so that the test table units 2 can be driven. The intermittent driving is achieved by a microswitch 150 which is actuated by a fitting 22 provided on each test table unit 2 to cause the system to stop its motion for a predetermined interval. During this inverval, the first operator can mount a new flow apparatus to the next test table unit 2, and the second operator and the third operator may carry out their respective tasks, too. After this interval the system starts in motion and the endless test unit chain is driven the distance of a test table unit until the microswitch 150 is actuated again. And the work cycle is repeated as before.
Now, let's go into the details of the mechanical connection between the test table unit 2 and the chain 12, and the support of the endless test unit chain. Referring to FIG. 3, there is provided a fixing member 25, the ends of which are respectively fixed to one side of a test table unit 2 and the middle part of a segment of chain 12, hence the test table unit 2 (and therefore the whole endless test unit chain) can be driven by sprockets 10 and 11. Referring to FIGS. 1 and 2, the endless test unit chain is driven to travel around an elongated rail 15. Each test table unit 2 has a roller 210 with which it is supported on the rail 15 and guided therealong. The roller 210 is provided on the free end of an arm 21 fixed on one side of the test table unit 2 (see FIG. 4). The chain is guided in an upper profile 13 and a lower profile 14. Both profiles 13 and 14 have C-shaped cross sections and therefore respectively define a slot 130 and 140 extending throughout their length, so as to allow the fixing member to be guided therein. The two ends of the pivot pin of each segment of chain 12 are respectively provided with a roll 120, so that the chain 12 can be smoothly guided in profiles 13 and 14.
Finally, let's go to the details of the fluid supply system. Referring to FIG. 4, each test table unit has a fitting 22 fixed near the free end of arm 21. Two pipes 23, which serve respectively as the inlet pipe and outlet pipe are connected to fitting 22. Besides the two pipes 23, the fitting has a thin pipe 24 to communicate with the flow apparatus to be tested (not shown). The water from supply source flows into fitting 22 through the inlet pipe 23 and leaves from outlet pipe 23. Part of the water is supplied to the flow apparatus to be tested.
Referring to FIG. 5, water is supplied from a pump through a pipe 50 and joint 5 into a main hose 6 which is wound into a roll around a drum 4 and connected to a joint 7 which is connected to the fitting 22 of one of the test table units 2. Water flows through pipe 50, joint 5, hose 6, and joint 7 to the fitting 22 and then flows through the pipes 23 from one fitting to another to travel through all the fittings (and therefore supply all the test table units). The very test table unit shown in FIG. 5 to which the hose 6 is directly connected may travel away from and then travel back toward the drum 4 during the operation of this system, the drum is provided with spiral spring 40 which is wound up when the hose 6 is pulled away. Thus when the very test table unit shown in FIG. 5 travels back toward the drum 4, the excessive length of hose 6 will be wound up automatically by the restoring force of the spiral spring 40. Since the piping at joints 5 and 7 is rotatably and sealingly connected, there is no risk of tangling up of the hose 6. Practically the drum 4 is rotatably supported on a drum support 3. Below the endless test unit chain there is provided a water collector 17 to collect the overflowing water during the test. To avoid the negligence of the third operator to dismount the already tested product from a test table unit 2, there is provided a photo-electronic detecting device 16 downstream of the third operator to check if there is still anything left on the test table plane 20. Practically, the microswitch 150 is mounted on the rail 15 in a manner so that it can be touched and actuated by the advancing fitting 22 of test table unit 2. | A flow test stand system comprising a plurality of like test table units arranged in a head-to-tail manner to form an endless test-unit-chain to enable testing work to be carried out by only three operators in a minimum amount of time. | 6 |
CROSS-REFERENCE TO RELATED APPLICATIONS
This application claims the benefits of U.S. Provisional Patent Application No. 60/385,212, filed Jun. 3, 2002, entitled METHODS AND APPARATUS FOR CUSTOMIZING ELECTRONIC ERASABLE PROGRAMMABLE READ ONLY MEMORY, the entire disclosure of which is hereby incorporated by reference.
BACKGROUND OF THE INVENTION
The present invention relates to methods and apparatus for customizing a rewritable storage medium such that only authorized use of digital content contained within the storage medium is permitted.
The widespread use of personal computers and other microprocessor-based equipment has opened very large and profitable markets in the sale of software applications that run on such computing equipment. Conventional software applications are stored on either a write-once or rewritable storage medium in order to distribute same to end users. Such storage media include (floppy) diskettes (such as 3.5-inch diskettes, 5.25-inch diskettes, etc.), discs (such as compact discs, CDs, CD-ROMs, CD-Is, CD-RWs, CD-ROM XAs, CD-Ws, Photo CDs, Video CDs, etc.), electronic storage media (such as programmable read only memories, PROMs, erasable programmable read only memories, EPROMs, electronic erasable programmable read only memories, EEPROMs, etc.)
As the software application is contained in the storage medium in digital form, those seeking to obtain unauthorized copies of the software application can easily do so. Moreover, irrespective of whether a particular copy of the software application is authorized or not, such software application may be loaded and run on any compatible computing device. Such copying and ease of use on different computing devices has the unfortunate effect of significantly reducing sales and profits on the software applications.
Accordingly, there are needs in the art for new methods and apparatus that permit the use of only authorized copies of software applications, or any other digital content, and to permit the use of such digital content on only authorized computing devices.
SUMMARY OF THE INVENTION
In accordance with one or more aspects of the present invention, an apparatus includes a connector operable to communicate with a rewritable storage medium, the rewritable storage medium including digital content and a flag indicative of whether the digital content is encrypted; a processing core operable to execute at least some of the digital content of the rewritable storage medium; a storage device operable to contain a substantially unique identification (ID) number; and an encryption unit operable to (i) determine whether the digital content of the rewritable storage medium is encrypted based on the flag, and (ii) encrypt and overwrite the digital content of the rewritable storage medium using the ID number as an encryption key when the flag indicates that the digital content is not encrypted.
The encryption unit is preferably further operable to set the flag of the rewritable storage medium to indicate that the digital content is encrypted.
The processing core preferably comprises the encryption unit by executing encryption program instructions obtained from an internal read only memory of the apparatus or from the rewritable storage medium.
The encryption unit may encrypt the digital content of the rewritable storage medium using at least one of an exclusive OR of the digital content and the ID number, transposition, substitution, polyalphabetic substitution, conventional key encryption, public key encryption, cipher system encryption, and code encryption.
The apparatus may further include a decryption unit operable to decrypt the digital content of the rewritable storage medium using the ID number as a decryption key.
The processing core preferably comprises the decryption unit by executing decryption program instructions obtained from an internal read only memory of the apparatus or from the rewritable storage medium.
A random access memory preferably receives the decrypted digital content of the rewritable storage medium.
The storage device of the apparatus is preferably at least one of a register, a read only memory (ROM), a programmable read only memory (PROM) and a discrete circuit.
The ID number is preferably not readable externally from the apparatus. The digital content of the rewritable medium is preferably not encrypted when initially stored. The digital content of the rewritable medium preferably includes data and instructions for a computer program. For example, the computer program may be a video game.
In accordance with one or more further aspects of the present invention, a rewritable storage medium includes: digital content; a flag indicative of whether the digital content is encrypted; and a connector operable to communicate with a processing apparatus, the processing apparatus including a processing core operable to execute at least some of the digital content of the rewritable storage medium, a storage device operable to contain a substantially unique identification (ID) number, and an encryption unit operable to (i) determine whether the digital content of the rewritable storage medium is encrypted based on the flag, and (ii) encrypt and overwrite the digital content of the rewritable storage medium using the ID number as an encryption key when the flag indicates that the digital content is not encrypted.
In accordance with one or more further aspects of the present invention, a method includes: reading a rewritable storage medium, the rewritable storage medium including digital content and a flag indicative of whether the digital content is encrypted; determining whether the digital content of the rewritable storage medium is encrypted based on the flag; encrypting the digital content of the rewritable storage medium using an identification (ID) number as an encryption key when the flag indicates that the digital content is not encrypted, the ID number being unique to a processing apparatus operable to execute the digital content; and overwriting the digital content of the rewritable storage medium with the encrypted digital content.
Other advantages, features and aspects of the invention will be apparent to one skilled in the art in view of the discussion herein taken in conjunction with the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
For the purposes of illustrating the invention, there are shown in the drawings forms that are presently preferred, it being understood, however, that the invention is not limited to the precise arrangements and instrumentalities shown.
FIG. 1 is a block diagram illustrating one or more aspects of various apparatus that may be employed to implement one or more embodiments of the present invention; and
FIG. 2 is a flow diagram illustrating one or more methods that may be carried out in accordance with various aspects of the present invention.
DETAILED DESCRIPTION
Referring now to the drawings, wherein like numerals indicate like elements, there is shown in FIG. 1 a block diagram of a computing system 100 , including a rewritable storage medium 102 and a processing apparatus 120 .
The rewritable storage medium 102 may be implemented utilizing any of the known media, such as diskettes, discs, electronic media, etc., or any storage media hereinafter developed. The rewritable storage medium 102 preferably includes digital content 104 , an encryption flag 106 , and a connector 108 . The digital content 104 may be a software application, including data and program instructions, or any other digital content of interest. The encryption flag 106 is preferably stored within a hardware register, an addressable storage location (or locations), a fuse array, or any other suitable storage device. The encryption flag 106 is preferably indicative of whether the digital content 104 is customized, such as by encryption, or is in a state that is ready for use. The connector 108 is preferably implemented utilizing any of the known or hereinafter developed devices that operate to permit communication between the rewritable storage medium 102 and the processing apparatus 120 over a communications channel 134 .
The processing apparatus 120 is preferably implemented utilizing any of the known microprocessor architectures, such as those found in any personal computer, lap-top computer, set-top box, personal digital assistant, cell phone, hand held computer, etc. To this end, the processing apparatus 120 preferably includes a processing core 122 , a random access memory (RAM) 124 , and a read only memory (ROM) 126 . Unlike existing microprocessor architectures, however, the processing apparatus 120 also preferably includes an identification (ID) number 128 and an encryption/decryption unit 130 . The processing core 122 is preferably operable to execute program instructions and manipulate data, such as may be received from the RAM 124 and/or ROM 126 as is known in the art.
The processing apparatus 120 also preferably includes a connector 132 , which may be implemented utilizing any of the known devices that are operable to permit communication with the rewritable storage medium 102 over the communications channel 134 . It is noted that the communications channel 134 may be a hard-wired channel, such as a cable, or may be a wireless channel, such as an infrared link, an RF link, etc.
The ID number 128 is preferably unique (or substantially unique) to the processing apparatus 120 , such as a serial number or other identifying alphanumeric code. Preferably, the ID number 128 is not readable externally from the processing apparatus 120 and, therefore, remains secure and hidden from unauthorized persons. The encryption/decryption unit 130 preferably utilizes the ID number 128 to encrypt and/or decrypt the digital content 104 of the rewritable storage medium 102 .
With reference to FIGS. 1 and 2 , the use of the encryption flag 106 of the rewritable storage medium 102 and the ID number 128 of the processing apparatus 120 in encrypting and/or decrypting the digital content 104 in accordance with various aspects of the invention will now be discussed in more detail. In particular, at action 200 ( FIG. 2 ) the rewritable storage medium 102 is connected to the processing apparatus 120 by way of the connectors 108 , 132 and the communications channel 134 . Such connection (or other event, such as power-up) preferably signals the processing apparatus 120 to read the contents of the encryption flag 106 of the rewritable storage medium 102 . More particularly, the encryption/decryption unit 130 may read the contents of the encryption flag 106 and/or the processing core 122 may perform that function. It is noted that the functions of the encryption/decryption unit 130 may be performed by the processing core 122 by executing an appropriate software program that may be contained, for example, within the ROM 126 (which would render a separate encryption/decryption unit 130 unnecessary).
At action 204 , a determination is made as to whether the digital content 104 of the rewritable storage medium 102 is encrypted based on the state of the encryption flag 106 . For example, when the encryption flag has a form containing one or more bits, the state of such bits may be utilized to determine whether the digital content 104 is encrypted. When the encryption flag 106 is a single bit, one of a true (e.g., logic high) state or a false (e.g., logic low) state may represent that the digital content 104 is encrypted. The determination of whether the digital content is encrypted may be carried out by the encryption/decryption unit 103 and/or by the processing core 122 under the control of a suitable software program.
At action 206 , the process flow branches to action 208 (if the digital content 104 is not encrypted) or to action 218 (if the digital content 104 is encrypted). When the digital content 104 is not encrypted, the processing apparatus 120 preferably reads the digital content 104 of the rewritable storage medium 102 into the RAM 124 (action 208 ). At action 210 , the encryption/ decryption unit 130 preferably encrypts the digital content 104 (contained within the RAM 124 ) utilizing the ID number 128 of the processing apparatus 120 as an encryption key. It is noted that any of the known encryption techniques may be employed in accordance with the present invention, such as utilizing at least one of an exclusive OR of the digital content 104 and the ID number 128 , transposition techniques, substitution techniques, polyalphabetic substitution techniques, conventional key encryption, public key encryption, cipher system encryption, code encryption, etc.
At action 212 , the encrypted digital content 104 is written over the non-encrypted digital content 104 contained within the rewritable storage medium 102 . At action 214 , the encryption flag 106 is set to indicate that the digital content 104 contained within the rewritable storage medium 102 is encrypted. The non-encrypted digital content 104 stored within the RAM 124 is preferably deleted at action 216 .
At action 218 , which may follow action 216 or may be the result of an affirmative branch at action 206 , the encrypted digital content 104 contained with the rewritable storage medium 102 is read. The encrypted digital content 104 is decrypted utilizing the ID number 128 as a decryption key and the decrypted digital content 104 is stored in the RAM 124 (action 220 ). Thereafter, the processing core 122 is free to execute the instructions/data that may be contained within the digital content 104 (action 222 ).
Preferably, the digital content 104 is not encrypted when an initially stored within the rewritable storage medium 102 (e.g., during manufacturing). Advantageously, an end user may purchase the rewritable storage medium 102 from a distributor and run the digital content 104 on his or her processing apparatus 120 (e.g., personal computer or set-top box). Once the rewritable storage medium 102 is connected to the processing apparatus 120 of that particular end user, however, the digital content 104 will be encrypted utilizing the unique ID number 128 . Therefore, the encrypted digital content 104 will not be permitted to run on a different processing apparatus 120 (i.e., a processing apparatus that includes a different ID number 128 or no ID number at all). This advantageously protects the entity or entities interested in profiting from the sale of the digital content 104 to end users. By way of example, the digital content 104 of the rewritable storage medium 102 may include data and program instructions for a video game. Indeed, the present invention addresses the significant problems that exist in the video game market in terms of multiple end users sharing one copy of a game title for use on multiple computing systems.
Alternatively, the digital content 104 may include data and program instructions for a boot code read only memory for the processing core 122 . By customizing, e.g., encrypting, the code in a boot ROM utilizing the ID number 128 as an encryption key, the boot code and the processing apparatus 120 are secured from unauthorized observations and/or operations.
Although the invention herein has been described with reference to particular embodiments, it is to be understood that these embodiments are merely illustrative of the principles and applications of the present invention. It is therefore to be understood that numerous modifications may be made to the illustrative embodiments and that other arrangements may be devised without departing from the spirit and scope of the present invention as defined by the appended claims. | Methods and apparatus permit: reading a rewritable storage medium, the rewritable storage medium including digital content and a flag indicative of whether the digital content is encrypted; determining whether the digital content of the rewritable storage medium is encrypted based on the flag; encrypting the digital content of the rewritable storage medium using an identification (ID) number as an encryption key when the flag indicates that the digital content is not encrypted, the ID number being unique to a processing apparatus operable to execute the digital content; and overwriting the digital content of the rewritable storage medium with the encrypted digital content. | 6 |
BACKGROUND OF THE INVENTION
[0001] 1. Field of the Invention
[0002] The invention relates in general to image processing. More particularly, this invention relates to a method and apparatus that accelerates color space conversion by employing a multi-dimensional and multi-port memory.
[0003] 2. Description of the Related Art
[0004] Color Copiers or other imaging devices capture an image from an input device and attempt to create a suitable duplicate on an output device.
[0005] The input device has inherent properties and characteristics with regard to the sensing process in a document. An example of an input device is a Charged Coupled Device (“CCD”) scanner. A CCD sensor is typically composed of three sensors for each pixel to be sensed. Each of the three sensors responds to a different wavelength of light. Typically, the wavelengths are close to Red, Green and Blue (RGB).
[0006] The output device has inherent characteristics with regard to the process of creating an image. One such example is a color laser printer. The output device typically creates an image using four different colors, i.e. Cyan, Magenta, Yellow and Black (CMYK).
[0007] Color Management is defined as the task of accurately converting color information of one form or space to that of another space. This might be compared to the way that points in space or in a graph can be converted from a Euclidean space to a Spherical or other coordinate system.
[0008] The classical “textbook” method for converting color from one representation to another is by matrix multiplication. A three-component (e.g. RGB) element is multiplied by 3×3 matrix to generate a value in the new space. Industry standards exist for these matrices, such as those used in color television or JPEG compression.
[0009] The matrix-multiplication method demands that the conversion process be rather ordinary, in that the three-dimensional surface generated is continuous and without irregularities. For best results, one might desire that a different 3×3 matrix value set be used to convert various regions of the input color space. This is rather cumbersome, and the typical implementation is by table lookup.
[0010] The lookup process uses a table, usually implemented in memory such as SRAM or DRAM, that provides an output value for every input value. However, such a method requires a large amount of memory. For example, table-based color space conversion from RGB to CMYK would ideally translate every incoming 24-bit RGB value to a unique CMYK value. This would require a table with 16 million entries of 32 bits, or 64 MB of memory.
[0011] Due to practical limits on the size of the memory that can be used to store the color lookup table, only discrete data points, or nodes, are stored in the color lookup table. As a result, it is often necessary to interpolate between a set nodes adjacent to a given image color to determine the desired output color for a destination device.
[0012] Typically, the adjacent nodes are separately accessed from the lookup table, thus requiring multiple accesses to memory. For example, in the three-dimensional RGB input space, a set of eight nodes forming a cube around a color pixel must be accessed. This proves to be inefficient, given the plurality of pixels in input images.
[0013] Therefore, the need arises for an image processing device that allows for a single access of memory for interpolation of data points, thereby expediting input image conversion.
[0014] In U.S. Pat. No. 6,246,396, Gibson discloses an apparatus for converting an input image in an input color space to an output image in an output color space. Gibson does not interleave memory by placing odd and even indices into separate lookup tables. The subject invention separates odd and even indices for all three dimensions, resulting in eight separate lookup tables.
SUMMARY OF THE INVENTION
[0015] Accordingly, one object of the present invention is to provide an image processing device that expedites color space conversion.
[0016] A second object of the invention is to provide an image processing device that allows for a single access of memory for interpolation of data points.
[0017] A third object of the invention is to provide an image processing device color space conversion in multiple dimensions.
[0018] A fourth object of the invention is to provide an image processing device color space conversion using multiple ports.
[0019] To achieve these and other advantages and in accordance with the purpose of the invention, as embodied and broadly described herein, the invention provides an apparatus and method for converting an input image with a plurality of pixels to an output image using an N-dimensional conversion table with a plurality of nodes. The apparatus has a set of RAMS for storing odd-indexed nodes and even-indexed nodes for each dimension of the N-dimensional table. The apparatus also has means for retrieving for each pixel a set of output color values corresponding to nodes adjacent to the pixel in the conversion table. Finally, the apparatus has means for interpolating within each set of output color values to produce the output image.
BRIEF DESCRIPTION OF THE DRAWINGS
[0020] FIG. 1 is a graphical depiction of a prior art lookup table in three-dimensions.
[0021] FIG. 2 is a graphical depiction of a three-dimensional lookup table separating odd and even indices along the X-axis.
[0022] FIG. 3 is a graphical depiction of a three-dimensional lookup table in accordance with the present invention.
[0023] FIG. 4 is a diagram illustrating address increment hardware for the present invention.
[0024] FIG. 5 is a graphical depiction of the distribution of RAMS within a three-dimensional lookup table for the present invention.
[0025] FIG. 6 is a diagram illustrating the hardware configuration for the lookup table of FIG. 5 .
DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0026] Referring now to FIG. 1 , a graphical depiction of a prior art lookup table in three-dimensions is shown. The three-dimensional lookup table can be envisioned as a cube 10 containing nodes 11 at predetermined addresses along the X, Y and Z axes.
[0027] Still referring to FIG. 1 , an input color 12 contains address components X 1 , Y 1 and Z 1 . Typically, input color 12 will not coincide exactly with the predetermined address of a node. Therefore, address components X 1 , Y 1 and Z 1 are used to determine 8 vertices V 1 thru V 8 adjacent to input color 12 . Vertices V 1 thru V 8 all fall within a cube. Given the index coordinate of (x,y,z), for example, the following locations will be read: (x,y,z), (x,y+1,z), (x,y,z+1), (x,y+1,z+1), (x+1,y,z), (x+1,y+1,z), (x+1,y,z+1) and (x+1,y+1,z+1). An output value corresponding to input color 12 is approximated by interpolation of vertices V 1 thru V 8 .
[0028] Still referring to FIG. 1 , obtaining an output value for input color 12 requires separately accessing vertices V 1 thru V 8 . This is because the lookup table is implemented on a single SRAM. Because a single memory bank is used, 8 separate accesses to memory are necessary to process every pixel in a given input image. This proves to be an inefficient process for color space conversion.
[0029] With reference to FIG. 2 , a graphical depiction of a three-dimensional lookup table separating odd and even indices along the X-axis is shown. In this embodiment, each half of the lookup table 20 is implemented on a separate SRAM. By dividing the lookup table 20 into two pieces 21 and 22 , vertices V 1 thru V 4 can be accessed at the same time as vertices V 5 thru V 8 . All 8 vertices need not be separately accessed from memory. Instead, 2 groups, each containing 4 nodes, can be simultaneously accessed from their respective SRAM. This procedure cuts the time to access the 8 nodes surrounding input color 12 in half.
[0030] Referring now to FIG. 3 , a graphical depiction of a three-dimensional lookup table in accordance with the present invention is shown. The lookup table separates odd and even indices along the X-axis, Y-axis and Z-axis. In this embodiment, each of the eight portions of the lookup table is implemented on a separate SRAM. By dividing the lookup table into cubes 31 thru 38 , vertices V 1 thru V 8 corresponding to input color 12 can be accessed at the same time. Instead of performing separate accesses to memory for each these vertices, all output values of the vertices are simultaneously obtained.
[0031] With reference to FIG. 4 , a diagram illustrating address increment hardware for the present invention is shown. For purposes of this example, a 1-dimensional table with 17 elements will be used. The index into the table is a five-bit number with valid values from binary 00000b to 10000b, or from 0 to 16 inclusive. Given an algorithm that requires simultaneous access to two table elements at indices (or addresses) of n and n+1, the table is split into two separate tables with one containing the contents of all the even addresses and another containing all of the odd addresses. When the index into the table is even (e.g. 0, 2, 4 . . . ) then the index of 000b (the three most significant bits of the index value) into each table will in fact retrieve the values from addresses 00000b and 00001b from the original table.
[0032] Still referring to FIG. 4 , when the index is an odd value, then the even table address needs to be incremented. For example, if the 4 most significant bits of the input color are 0101b, then locations 0101b and 0110b will be accessed from the original un-split table. In the split table arrangement, only the 3 most significant bits of the input color are used, so the input address would be 010b. At address 0010, values of 4 and 5 will be retrieved, but the subsequent value from the even table is needed. Hence when the four most significant bits of the input color are odd, the address to the even table must be incremented in order to retrieve the desired values from entries n and n+1 of the original, un-split table. This concept must be extended to all three dimensions.
[0033] Referring now to FIG. 5 , a graphical depiction illustrating the distribution of RAMS within a three-dimensional lookup table for the present invention is shown. This embodiment shows a 17×17×17 lookup table formed as a cube 50 . The lookup table is composed of a 16×16×16 core 51 implemented in 8 RAMS.
[0034] Still referring to FIG. 5 , faces 52 thru 54 , edges 55 thru 57 and corner 58 form a skin around core 51 . Faces 52 thru 54 are 1×16×16 each, edges 55 thru 57 are 1×1×16 each, and corner 58 is 1×1×1. Faces 52 thru 54 , edges 55 thru 57 and corner 58 are implemented on RAMS separate from the core. Like the core, the additional RAMS are implemented by separating odd and even indices in the appropriate number of dimensions. This allows for simultaneous access of vertices V 1 thru V 8 for input color 12 .
[0035] With reference to FIG. 6 , a diagram illustrating the hardware for lookup table of FIG. 5 is shown. For purposes of this embodiment, 24-bit incoming color data will be used. Only the four most significant bits of each color component are used to index into the table, and the lower four bits will be used for a three-dimensional interpolation within the 8 value cube that is supplied by the table.
[0036] Still referring to FIG. 6 , index values 0 thru 14 within the 4-bit range of 0 thru 15 will only access the inner 8 RAMS, i.e. RAMS 0 thru 7. The inner 8 RAMS represent core 50 in FIG. 5 . When any of the color components equals 15, some components will be retrieved from the outer 8 RAMS, i.e. RAMS 8 thru 15. The outer 8 RAMS represent faces 52 thru 54 , edges 55 thru 57 and corner 58 in FIG. 5 .
[0037] Still referring to FIG. 6 , hardware 60 includes address generation logic 61 for accessing RAMS 0 thru 15. Address generation logic 61 determines which points of the eight vertices of the cube will come from which RAMS.
[0038] Other embodiments of the invention will appear to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. It is intended that the specification and examples to be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims. | An apparatus and method for converting an input image with a plurality of pixels to an output image using an N-dimensional conversion table with a plurality of nodes. The apparatus has a set of RAMS for storing odd-indexed nodes and even-indexed nodes for each dimension of the N-dimensional table. The apparatus also has means for retrieving for each pixel a set of output color values corresponding to nodes adjacent to the pixel in the conversion table. Finally, the apparatus has means for interpolating within each set of output color values to produce the output image. | 7 |
CROSS-REFERENCE TO RELATED APPLICATIONS
This application is a Divisional Patent Application under 35 U.S.C. §120 of U.S. patent application Ser. No. 10/177,236 filed Jun. 21, 2002, which in turn, as does this application, claims priority under 35 U.S.C. §119(e) from U.S. Provisional Patent Application Ser. No. 60/299,935 filed Jun. 21, 2001.
This application claims the benefits under 35 U.S.C. §119 (e) of provisional application No. 60/299,935 filed on Jun. 21, 2001.
BACKGROUND OF THE INVENTION
Field of the Invention
The present invention lies in the field of electronic systems and methods for transacting a purchase between a purchaser and a merchant. More specifically, the invention relates to systems and methods for facilitating purchases over an interactive network, and particularly using an interactive television system.
Today, electronic purchases represent a large and continuously increasing percentage of all new purchases. In a transaction for a purchase, the purchaser typically has the ability to pay using different payment methods. For example, consider a purchaser in a store wishing to buy a computer. The purchaser can pay for the computer with cash or check. The purchaser might also wish to use a credit card or a debit card.
However, the store might only accept a few of these forms of payment, while not accepting other forms of payment. The department store often posts these accepted forms of payment at the point-of-sale (“POS”) counter.
During the purchase transaction of the computer, the purchaser notes the forms of payment accepted by the department store. The purchaser then pays using a suitable payment method. If the purchaser chooses to pay with a check, the sales person performs an authentication process. The sales person may only accept the check if the person presents an identification card to verify the authenticity of that person who is offering the check.
If the purchaser uses a credit card to pay, the sales person verifies that the purchaser has sufficient funds in the credit card account and has not exceeded the credit limit. This is done by passing the credit card through a magnetic-stripe card reader, that is located at the POS counter to electronically read the purchaser's account information contained in the magnetic stripe on the credit card.
Then, the account information is validated with the card issuer. Alternatively, a computer user may want to make a purchase from an on-line service provider. The user orders the desired service electronically over an interactive network. One of the issues arising relates to protecting the purchaser's identity. An electronic system should block the merchant from access to the purchaser's private information.
The electronic Smart Card (sometimes called Chip Card) is a superior alternative to the magnetic stripe payment card (credit card) and is in wide use in Europe, though much less so in the United States. Its main advantageous use has been as a stored-value (money replacement) card, which is suitable even for the small transaction conducted by the card itself. The relatively expensive verification for every transaction, using communications to a network server, is not done.
The original version of a one-application card (e.g., a phone card having stored money for phone calls) is not versatile or sophisticated enough, and therefore new architectures are required.
The cryptographic and multi-application Smart Card, a recent development, features an embedded microprocessor with special circuitry to perform mathematical calculations quickly. It also contains up to 32K of memory for storing data, application executables and digital credentials.
Typically, the memory hardware has enhanced protection features for security to isolate applications and the operating system from one another. The card is also able to perform complex calculations for functions such as encryption and digital signatures, and can contain identification (e.g., a photograph).
The card in conjunction with Public Key Encryption technology can be used to encrypt data on the card. This combined with a procedure for creating the digital signature of a document (Public Key Infrastructure, hereinafter “PKI”) creates a legally binding document and transaction. Incentives can be securely handled with credits and payments accounted as real money.
The application, which is of interest here, is a combination (stored value and PKI) card. This allows value to be saved in one or more accounts on the card and to move the value, via local area networks (LANs) and the Internet, to servers where required or when checking is necessary.
Prior and current developments by the assignee, MetaByte Networks Inc. (MNI) deal broadly with systems and technology for TV Ad and program targeting to specific user profiles and parameters. These developments are also reflected in several prior patent applications, including:
“System and Method for Generating and Managing User Preference Information for Scheduled and Recorded Television Programs,” U.S. patent application Ser. No. 10/156,153, filed May 28, 2002, which claims priority of U.S. Provisional Patent Application No. 60/293,763, filed May 25, 2001 , and the related application “Database Management System and Method for Electronic Program Guide and Television Channel Lineup Organization,” U.S. patent application Ser. No. 10/156,173, filed May 28, 2002, which also claims priority of U.S. Provisional Patent Application No. 60/293,763, filed May 25, 2001 . These applications are herewith incorporated by reference. “System & Method for Targeted Advertising”, a copending patent application describing a DTV or STB payment card or smart card for paying for programs without advertising, where advertising with the program has been refused by the user, and our copending application entitled “System and Method for Behavioral Model Clustering in Television usage, Targeted Advertising via Model Clustering, and Preference Programming Based on Behavioral Model Clusters,” U.S. patent application Ser. No. 10/043,698 filed Jan. 9, 2002 and based on provisional application No. 60/260,745 filed Jan. 9, 2001. The copending applications are herewith incorporated by reference. “Television Program Recording with User Preference Determination,” application Ser. No. 09/096,592, which is herewith incorporated by reference. The copending, earlier applications “Logic Operators for Delivery of Targeted Programming”, and “Improved Logic Operators for Delivery of Targeted Programming,” describe targeting metadata attached to a TV program or other content for the purpose of targeting it to certain users that satisfactorily match certain criteria detailed therein. Example criteria include program content types, input or inferred demographics, products, universal product codes (UPC) and industry type codes, whereas extended system architectures for explaining how such product code information might arrive in the STB equipment was, at the time, not provided. The copending application is herewith incorporated by reference. Of particular interest is our concurrently filed, copending application entitled “Method and System for Electronic Purchases Using an Intelligent Data Carrier Medium, Electronic Coupon System, and Interactive TV Infrastructure,” application Ser. No. 10/177,236, which is based on the same provisional application as the instant application and which is herein incorporated by reference. Our copending application contains technical details concerning the smart card and the e-coupon systems which are also important in the context of the instantly described model.
SUMMARY OF THE INVENTION
Referring now to the television STB, a first, original, smart card is still necessary for authentication of right to use the broadcast services and for decryption of some services, and must remain in the STB for operation and cannot be removed. The cryptographic and multi-application smart card for user retail incentives and purchasing must be an additional (i.e., a second), removable card.
The present invention is directed to a method for electronically transacting a purchase. The method includes storing accrued incentives on an intelligent data carrier medium via DTV/STB equipment and redeeming a discount or a value corresponding to the accrued incentives present on the data carrier medium when a purchase is made. The present invention also discloses an extended system architecture for explaining how product code information can arrive in the STB equipment (using Smart Card technology).
Further, the present invention is directed to securely administering user targeted incentives/discounts, credits/payments and dollars/mileage points incurred at Direct Television/Set-Top-Box (“DTV/STB”) user equipment and their later use at the DTV/STB (or elsewhere) for making a purchase. Some examples include credit for viewing program contents (e.g., advertisements, “ads”), positively interacting with broadcast content material (e.g., advertising), direct marketing information or a game that leads to one or more commerce transactions at the DTV/STB, at a Point Of Sale (POS) or at a different location. Another example is payment (debit) for not viewing program contents.
This new extended TV/STB architecture enables service/product selections and purchases to be conducted outside of the normal TV domain (i.e., at the regular high street, retail store, airline, general business and commerce domains). Thus, user interaction at the DTV/STB can be kept to a minimum (i.e, only for claiming and accruing credits, discounts and incentives), and the purchases can be made at the regular and preferred “brick and mortar” locations.
Further, targeted content at the DTV/STB can be used to encourage users with incentives to go to certain retail locations to make their purchases. “Smart Card” is the medium used to capture and convey the incentives.
All retail purchases made at the time the SC (or incentive) is used are recorded on the SC, and the information is returned to the DTV/STB. When the SC is re-docked in the terminal for capturing more incentives, the information is processed and added to the preferences database (as preferred products) and is used to improve the demographic inference. Now the targeting is aimed at the improved user demographic profile, including the products directly. Users with a purchase history of a certain product can be treasured and targeted with better or different incentives (e.g., free T-shirts to retain their loyalty).
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a block diagram of a multi-application and cryptographic smart card;
FIG. 2 is a DTV/STB architecture, as extended to a retail store with an incentive smart card, according to the invention;
FIG. 3 is DTV/STB architecture, as extended to On-Line Store with Incentive Smart Card, according to the invention;
FIG. 4 shows the relevant internal components of three pieces of equipment, namely, DTV/STB PDE, Smart Card (SC) and Retail Point of Sale terminal (POS), according to the invention;
FIG. 5 shows top-level components of the MetaByte Smart Card Application, according to the invention;
FIG. 6 is the format of an original E-Coupon as published and distributed, according to the invention;
FIG. 7 is the format of the E-Coupon after issue and signed by the user, according to the invention;
FIG. 8 shows all of the stages in the life of the E-Coupon, according to the invention;
FIG. 9A-9B show a flow chart for the method according to the invention in a retail store context; and
FIG. 9C is a flow chart for the method according to the invention in an on-line context.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
In all the figures of the drawing, sub-features and integral parts that correspond to one another bear the same reference symbol in each case.
Referring now to the figures of the drawings in detail and first, particularly to FIG. 1 thereof, there is shown a block diagram of a multi-application and cryptographic smart card (prior art).
FIG. 2 shows the DTV/STB architecture, as extended to a Retail Store with an Incentive Smart Card in accordance with the invention. It illustrates a system that implements the electronic commerce system according to an aspect of the present invention. A selected portion of the software may reside in the user equipment DTV/STB 4 in the form of an insertable intelligent data carrier medium/smart card 2 .
The user equipment DTV/STB 4 may also be used for access to a network (e.g., Internet). The smart card 2 is removably attached to the user equipment DTV/STB 4 . Further, the smart card 2 , for example, may contain data such as personal information and account information.
One important element of the new architecture is the inclusion of the second Smart Card 2 (“SC 2 ”) at the user equipment DTV/STB 4 to securely manage accrual and delivery of incentives and to deliver retail purchase information back to the DTV/STB. The retail purchase information is then used to improve the attraction of content and further (loyalty) incentives, thus encouraging more card and service use. In general, the more the system is used (and the SC is used), the better the system works and the more benefits the user receives.
Direct marketing to a group, and user interaction earned value is cached on the Smart Card 2 followed by item purchase at a retail POS 6 .
The overall operation of the DTV/STB architecture is extended with an Incentive/Purchase Smart Card. FIG. 2 shows three views of the DTV/STB user equipment 4 with different steps of the operation. The Smart Card 1 almost always remains in the DTV/STB 4 . Only Smart Card 2 is shown, but there could be a third smart card (or more if necessary) for more users not willing to share benefits. The first operation is called STEP 1 and proceeds through STEP 9 .
FIGS. 9A-9B show a flow chart of these steps of the method according to the invention in a retail store context. FIG. 3 shows DTV/STB architecture, as extended to On-Line Store with Incentive Smart Card, according to the invention. FIG. 9C shows a flow chart for the method according to the invention in an on-line context.
At step 900 , targeting is initially to a user demographic inferred from the program viewing history or to manually input demographic information.
Ads are targeted for products with a high interest level inferred from the inferred demographic. At step 902 , targeting may frequently include geographic parameters, thereby offering incentives for users to go to local retail outlets. At step 904 , incentives or discounts are offered in order to attract the user to view the ad, to interact with it and seek information or make purchases, thus showing high interest.
At step 906 , incentives, money or other value amounts are accrued and saved as account data by an appropriate application (shown in FIG. 5 ) on the Smart Card 2 at the DTV/STB 4 via either ad impression (i.e., simple viewing) or interaction with the initial presented ad top-layer page. The interaction may also occur with the ad hierarchy lower layers or similar ad detail activity, or by receiving random/earned award or reward value amounts.
An appropriate application and appropriate account data mean appropriate for the MNI's Megabyte TV (MbTV) incentive application. The multi-application card may have more accounts. The Smart Card comes with a standard method for the discovery of the applications on-board the SC and a standard for authorizing communications with the correct application. The MbTV application uses the standardized SC methods.
At step 908 , accrued incentives are stored as account data on the intelligent data carrier medium SC 2 via DTV/STB equipment 4 . At step 910 , while the SC 2 is still docked in the DTV/STB 4 , the user accesses information stored on the card (by using a GUI). At step 912 , the user detects that there is a significant value stored making it worthwhile taking the card to a retail store or POS 6 to redeem the stored value.
At step 914 , armed with the accrued incentives, the user takes the intelligent data carrier medium SC 2 to the merchant's POS 6 to make the purchase, redeem discounts or airline mileage (or, whatever value is on the card). Alternatively, the user may take SC 2 to a computer (PC) 30 to make an on-line purchase (at step 940 ).
At step 916 , the user redeems a discount corresponding to the accrued incentives present on the data carrier medium SC 2 . At step 918 , the user supplies an appropriate authorization code to the POS 6 . At step 920 , the POS 6 reads the account data from the appropriate application on SC 2 .
At step 922 , as purchases are made (at the POS terminal 6 ), the SC (account data application) 2 is altered to debit the incentives or discounts used. At step 924 , the SC 2 is altered to send back confirmation of the debit to the check out terminal 6 .
At step 926 , the complete purchased products information (including retail store name/UPC, manufacturer name/UPC and product name/UPC) of a check out list is downloaded to the appropriate application data area of SC 2 .
At step 928 , armed with the somewhat-depleted SC 2 , but anxious to replenish it, the user carries the SC 2 back home. At step 930 , the user inserts SC 2 into the DTV/STB user equipment 4 .
At step 932 , the appropriate DTV/STB agent 4 reads the purchased products information or UPCs. At step 934 , the appropriate DTV/STB agent 4 deletes the purchased products information/UPCs from the SC 2 .
The method also may include a step where the SC 2 expires periodically (at step 936 ). An issuing authority checks purchaser qualifications and renews the data carrier medium sc 2 .
User Interaction earned value cached on Smart Card followed by item purchase at Network Connected POS:
Referring again to FIG. 3 , it shows the DTV/STB architecture, as extended to On-Line Store with Incentive Smart Card. The overall operation of the DTV/STB architecture is extended with an Incentive/Purchase Smart Card 2 and additionally permits an extension to an On-Line commercial service for making the purchase. FIG. 3 shows three views of the DTV/STB user equipment to illustrate different steps of the operation. The Smart Card 1 almost always remains in the DTV/STB. Smart Card 2 only is shown in use, but there could be a Smart Card 3 (or more) if necessary for more users who do not wish to share benefits.
Accordingly, an on-line book order/purchase, for example, can be made via a home PC 30 at www.amazon.com (at steps 940 and 942 ). In addition, the DTV/STB 4 may permit this purchase directly if it were connected on-line 32 , thus eliminating the PC terminal 6 and saving the user the removal and physically carriage of the SC to another place (step 940 ). Also, part of the network may be a home network.
FIG. 3 , as compared with FIG. 2 , has additional steps 5 A and 6 A. The standardized Public Key Infrastructure (“PKI”) that includes generation of a digital signature and a digital certificate (to guarantee unaltered delivery of the account information received remotely via a network) is employed (at step 944 ). Completion of step 944 leads to step 932 .
The PKI operations and key storage are preferably performed by the security specialized hardware of the SC 2 because they are performed more securely than by the user equipment DTV/STB or PC. In the event of a breach of the SC security, only the card needs to be replaced to fix the problem, thereby minimizing the costs and inconvenience associated with the breach.
The structure and components for carrying the above method are explained below in a more detailed manner.
User Preference Determination extended with Smart Card to include Purchased Products:
Preference Determination Engine (PDE) technology was originally developed for the DTV or STB for the automatic learning of user preferences for TV programs, video on demand (VOD) movie programs, interactive TV content or presentable content in general. Increasingly, most DTV/STB equipment is being developed with computer type technology, including random access program storage (e.g., hard disc storage).
The program or content preferences may direct automatic program selection to ensure that preferred programs are almost always available in the program storage for the user to watch at his convenience. A conversion step infers the user demographic profile from the program preferences, which is used for targeted advertising with a hit if the target metadata of the ad matches the profile of the user. Audio/video (A/V) programs as well as Interactive TV type (I-TV) graphical user interface (GUI) content (including sale of items) may be targeted.
Ad and commercial interactions, and items purchased, which are conducted at the DTV/STB can also add (product) information to the preference database and enhance the accuracy of the profile.
However, the DTV/STB, optimized for cost and video presentation, is generally slow at processing graphics pages, and user interaction with a TV type remote control is generally cumbersome. Therefore, the expected user uptake of new GUI and I-TV technology for making a purchase selection using ads, commerce and product-for-sale graphics pages (or AV) is not expected to be high in the near term.
FIG. 4 shows the relevant internal components of three pieces of equipment: namely, DTV/STB PDE; Smart Card (SC) center and Retail Point of Sale terminal (POS), in terms of their controlling agents (shown in circles); and databases (shown in blocks), which are normally implemented in software.
Annotation notes are included in FIG. 4 showing the operational flow and demonstrating how the system loops or feeds back product information to the DTV/STB preference database 402 , thereby becoming part of the user profile, which is subsequently used for the targeting of ads, commerce and services.
FIG. 4 shows a user using a TV 401 , interacting with the TV 401 , and viewing targeted content (see note 1 ) or GUI materials partly selected by the Presentation Agent 404 (shown in a large circle overlapping the TV block). Interacting may be the normal DTV/STB use (e.g., viewing TV or channel changing) or may be a more sophisticated use (e.g., selecting a VOD movie using Interactive-TV GUI screens).
User activity is monitored by a connected Program Preference Agent (PPA) 406 , which results in the information being recorded in the Program Preference Database 402 . The PPA 406 also performs maintenance and processing on the database 402 , which includes examining and sometimes combining data rows (for example, to demonstrate a general content preference).
In addition, there is a Demographic Agent 408 for inferring the user demographic from preferences deemed from the database contents (in the event that the user has chosen not to input his demographic directly).
The Algorithm conversion data for inferring demographics (as shown by the arrow to the demographic agent 408 in FIG. 4 ), delivered to all user STBs from the targeting system operator, is computed and produced using a representative STB sample (known willing users) usage intelligence feedback to the targeting main operator system, as shown by the arrow from the Measure and Report Agent 409 .
In addition, ad and ad incentive campaign effectiveness and targeting effectiveness are partly based on the feedback from STB sample using Measure and Report Agent 409 .
Reiterating: A first feedback via SC 2 from merchant or terminal 6 to STB 4 is given, and then a second representative STB sample feedback to the targeting system operator is sent.
The dash-dot lines show database usage by a Targeting and Storage Agent 410 to determine what programs or other content to be stored (in a program Storage box 411 ), and by the Presentation Agent 402 to determine what content to be presented to the user.
This represents the regular Preference Engine 406 , which learns program and content preferences using the database 402 , makes preferred programs, content available to the user, and subsequently improves the database 402 as the preferred content is used.
If interactive graphics content is also shown via which the user makes a purchase at the DTV/STB, it is monitored using an Internal Purchase Record Agent 413 and causes a product entry in the preference database 402 using Universal Product Codes (UPC) or standardized product description originally made available (e.g., via the broadcast system downloaded metadata). In this case, a second Smart Card SC 2 is not required if the DTV/STB 4 is in communication with an operator or seller's server (e.g., via broadband or telephone-data connections), and is able to use the payment system, which is normally in place for the broadcast system (e.g., cable or satellite) service payments.
However, with just the original broadcast service smart card 1 , services or possibilities for new services are narrow in scope and are confined to the broadcast system (e.g., incentives for, and then purchases of, Near-video-in-demand (NVOD) or VOD movies, purchases of products advertised via the broadcast system and subsequently delivered by the broadcast system or delivered later by mail).
With a second additional user Smart Card 2 , services can be of a much wider scope: for example, the user can be encouraged by an ad or by using a service, and also by an incentive or a discount to purchase a product or service from a retail establishment (e.g., a bottle of Pantene hair shampoo from Longs Drugs store, or Baskin Robbins ice cream). This collection and accrual of incentives is done via the second Smart Card 2 (see note 2 ) and a GUI user interface is provided for viewing the incentives or accounts on the SC 2 (see note 3 ). The Smart Card 2 is removed from the DTV/STB 4 and is carried to the retail POS terminal 6 (see note 4 ).
The combination of the incentive Smart Card 2 with content targeting is even more powerful. The retail store has a Smart Card reader 6 at their POS terminal (currently, equipment is available that can read both a magnetic stripe (e.g., VISA type) card and an electronic-chip Smart Card). Few examples of utilization are listed as follows:
When a new Baskin Robbins is opened, users in the respective district can be targeted with incentives to discover and use the new ice cream store. Viewer of a movie or VOD movie gets free popcorn and coke, redeemed at the participating supermarket. As the user skips the coke ad using personal video recorder (PVR) control, he gets a message stating “OK you cheat because you skipped, but you still get the coke discount” or “Sorry, but you only get the discount if you watch the coke ad; you can watch it anytime this evening, and you can double the discount if you interact”. User wins $20 by playing a game promoting a Las Vegas casino hotel (e.g., maybe a downloaded game application running on the STB 4 ; see FIG. 4 ), and can redeem the amount with gamboling chips at the casino.
The Program Preference Agent 406 interfaces with an External (SC) Account Agent 414 , when monitored activity detects authorized amounts to be added to or subtracted from the Smart Card accounts, thereby passing the account and amount details to the Account Agent 414 . The Account Agent is 414 designed to interface with a counterpart agent (or application) on the SC.
Incentives and discounts often take the form of an electronic coupon, a replacement for the cutout paper coupon. Using a Smart Card for an electronic coupon delivered by TV is a major advance in efficiency for the user and the industry, compared to the current newspaper magazine type coupon. Currently, a paper coupon is cut out manually and goes through many stages of handling by the retail store, clearing houses as well as the manufacturer to ensure there is no fraud. The SC and PKI technology provides a secure electronic coupon that allows fraud free electronic retail redemption and electronic clearing and refunds.
FIG. 5 shows three top-level components of the Smart Card Application 500 of the present invention: namely, the application executable 502 , interface of the application 504 and the underlying communications protocol 506 . This can be implemented in many ways, but the choice of the World-Wide-Web Hypertext Transfer Protocol (HTTP) protocol and Extensible Markup Language (XML) standard is convenient. XML may be converted to a user displayable HTML as needed. The system deploys a standard HTTP Web Server 508 for communications. The Web Server 508 interfaces to the files on the Smart Card 2 (e.g., the App. Interface description 504 , and the App. Executable 502 ).
The standardized XML syntax is used to ‘mark-up’ MBSC vocabulary, for example, command tokens and data for certain functions or methods supported by the MBSC application. Using a standard ‘mark-up’ syntax has the advantage that while some (e.g., newly added) vocabulary or encryption may not be understood by the present SC application 500 , the XML syntax allows the application 500 to react gracefully and realize that it does not know (and maybe notify the user), rather than hang-up or crash.
The DTV/STB Account Agent 414 (as a client) accesses the Interface Description 504 , an XML document that is named with a standard name (e.g., index.xml), using a HTTP ‘get’ command. This XML interface ‘document’ exposes the name of the application executable 502 and the names of the functions, methods, data and account data and formats supported. Subsequent ‘get’ commands to the executable 502 can retrieve SC application or account data via the executable 502 . Conversely, ‘put’ commands put/enter data via the executable 502 . Data accounts can be changed and corresponding changes can be made to the XML interface to represent account additions or deletions (as shown by the dotted lines in FIG. 4 ). The fact that there is a separate interface document, which can be dynamically changed adds great flexibility to the system.
The contents of the XML interface and transmissions (i.e., names of functions, methods, data and account data) are generally encrypted to ensure they can be understood only by applications having the key. The recent cryptographic SC is configured for this job.
FIG. 6 shows the format of an original E-Coupon as published and distributed. Incentive accounts employ Universal Product Code (UPC) descriptor code numbers, which are already standardized, to define manufacturers and products. They are also used to describe discounts pertaining to a manufacturer, an individual or a family of products and a coupon value. Sometimes, a simple UPC type coupon is all that is required; other times, a more complex combination incentive coupon is required, which is described using multiple UPCs and Boolean operators.
The REQUIREMENTS field 602 for coupon issue include an MNI registered UPC number with code numbers (in product number position) or otherwise standardized text or code to indicate the coupon issue terms, including coupon campaign start and end time and date, ad impression, ad interaction, double-interaction, purchase made at STB and no terms free to all viewers.
The VALUE 604 of coupon may include money ($) or any other currency or other units of value (e.g., airline frequent flier type mileage)
Referring to the DETAILS field 606 of coupon, coupon may be simple or complex (i.e., Boolean), as shown below. Text description is also required (in addition to a UPC) in order to display the coupon information to the user at any time. Without the text, the DTV/STB 4 should have a cross-reference library or access to a cross-reference library.
SIMPLE COUPON: (UPC of Manufacturer, Product or family, also Text description#) COMPLEX COUPON: (UPC of Manufacturer, Product or family, also Text description#) AND
(UPC of Retail-store or other entity, also Text description#), etc.,
The e-coupon may be transmitted via a broadcast type TV system and can be encoded as program or content metadata using XML Schema. For illustration, see http://www.w3.org/TR/xmlschema-0/ and http://www.w3.org/TR/xmlschema-1/ http://www.w3.org/TR/xmlschema-2/. A number of “industry standards” bodies (e.g., TV-Anytime and MPEG-7) define TV program and content description metadata using XML Schema. The coupon description can be coded using the same style and can be a metadata addition. The XML Schema standard also allows an extendable Boolean description (for a simple or complex coupon).
E-coupons are transmitted from the manufacturer or system operator. The SC 2 does not generate the coupons or discounts. The Account Agent 414 reads the coupon requirements, follows the monitored user interactions and verifies that the appropriate conditions are met, and if affirmative, registers the coupon with the SC 2 . Part of this process may be verifying the coupon (using the digital signature 608 ) for the DTV/STB 4 .
The e-coupon set of information is not encrypted, but is accompanied by an originator's or publisher's digital signature 608 using PKI technology to ensure that the information (including the UPC's) has not been tampered with (at any place or in transmission involving broadcast and data networking). The digital signature 608 includes an encrypted hash of the coupon and the coupon originator's public key so that any party can validate the coupon contents by decrypting the hash sent and comparing it against a re-hash of the coupon.
The digital signature 608 can be used to validate the e-coupon at any stage, but an additional security step (which is equivalent to the paper coupon cutout and redemption) should take place to make the e-coupon unique at the earning or issue stage and prevent copying fraud (later in the coupon collection and refund chain).
The e-Coupon has the originator (publisher) digital signature 608 to permit coupon details to be checked to be tamper-free and (at issue) has a second digital signature 710 attached by the Smart Card 2 making the used-coupon unique and thus preventing duplication fraud in the collection and refund stages. Use of the digital signatures allows the coupon SC 2 to also be used at an Internet connected Home PC or any network connected terminal or POS 6 .
Coupon manufacturer/product/value details use existing codes (e.g., UPC) and a text description to allow the user to be informed of the details. Complex e-coupons involving a combination of a product/store (e.g., a particular supermarket chain and a particular product) can be described and delivered.
E-coupon copying fraud prevention is provided by the Smart Card 2 , which generates a second digital signature 710 (with unique public key as shown in FIG. 7 ) using its own private key, thus making the redeemed coupon (which is the original coupon together with a SC generated digital signature 710 ) unique. Accordingly, the e-coupon uses double digital signature. The first signature 608 validates the coupon and the second signature 710 validates the use of the coupon.
Moreover, the SC digital certificate can be verified to check whether it is from a valid user or SC 2 (typically, via Internet communications) at any later collection, clearing and refund stages. A unique redeemed coupon with SC 2 validation is a candidate for coupon value refund to the POS store or entity by the coupon originator, although other business entities may also qualify to retain a percentage.
FIG. 8 shows numbered stages (beginning at 1 and ending at 5) of the e-coupon processing, as listed below.
1. Publish (to many, some targeted, or all DTV/STBs 4 ) 2. Issue (by DTV/STB 4 to SC 2 if the conditions or requirements have been met) 3. Redemption (by business entity, where the user took the SC 2 to redeem the discount) 4. Collection (business entity collects together all coupons and sends (for refund) to the originator, maybe via a clearing house) 5. Refund (coupon value amount is sent back to the business entity that took the SC discount)
Verification may be done, at any point, with additional steps involving a certifying agency.
The Smart Card 2 is removed from the DTV/STB 4 at the user's convenience and is taken to one or more retail stores or service business entities 6 . The store 6 has a reader that can read the Smart Card 2 and the application that can interface to the MBSC application 500 (as shown in FIG. 4 ).
As the SC 2 is docked at the POS terminal reader, a POS Crediting Agent 416 reads the incentives from the SC application 500 and temporarily saves the data locally (see note 5 ). As purchases are made (or checked out through the POS system 6 ), a Check Out Agent 418 verifies if discount coupons or other value amounts can be used as credit and subtracts or deletes the used coupon from the SC and receives confirmation of the deletion (see notes 6 a and 6 b ).
Before the SC 2 is un-docked, the POS Check Out and Reporting Agent 418 transfers identification information, (e.g., UPCs) about the products or services purchased, to the SC application data area 510 (annotated note 7 ).
It is assumed that the retail POS system can process and collate the discount coupons and transfer them electronically to the clearinghouse (or whatever system is in operation) for the recovery and refund of the allowed discounts, value amounts or incentives.
Having some or all incentives or discounts used, the user will re-dock the Smart Card 2 in the DTV/STB 4 . A DTV/STB External Purchase Record Agent 412 reads the product/service purchase list from the SC 2 (see note 9 a ) and deletes the list (see note 9 b), thereby conserving valuable SC data storage area. Subsequently, the product information is processed to formulate a suitable preference profile record, which is transferred to the database 402 .
Later targeting to the DTV/STB 4 involving the purchased product preferences will register a hit, and will store further content and incentives for the user to accrue according to the coupon requirement rules. The user of the DTV/STB 4 , also a user of (preferred) program content, is now additionally treated as a user of certain (preferred) products. By developing and retaining the preference profile at the DTV/STB 4 , the user can remain anonymous but still gain the benefit of the selected (targeted) contents and e-coupons.
One or more extra Smart Card slots in the DTV/STB 4 (e.g., two Smart Card slots for two DTV/STB users), and one or more E-Coupon Application or Cryptographic Application Smart Cards may be deployed in them. It may also deploy XML syntax and schema, and standardized SC Application discovery and Application Interface discovery by DTV/STB agent.
E-Coupon Smart Card Application Characteristics
A Cryptographic Smart Card 2 may be issued (by an issuing authority company) to a user, but with no Name or ID actually on the card 2 , which allows the user to gather incentives, discounts and to redeem or use them anonymously. The SC 2 's serial number can be used by the issuing authority to cross-reference the SC 2 to the owner's name and address, but this is not normally expected or permitted, for example, without written permission from the user.
Periodically, the SC 2 will expire and be re-issued after re-checking the user's credentials (by the issuing authority). The user may be anonymous to any entity involved in the Smart Card E-Coupon Application; although user ID, name and address are known to the issuing authority, they are not necessary components of the Application and need not be made available by the Application.
Coupon Application SC is a medium for carrying the incentive value gained at a DTV/STB 4 (electronic place/terminal) to a (non-electronic) retail establishment 6 for the purchase of the product or service (which was the target of the incentive). This enables the combination of an incentive or discount issued (electronically) at a DTV/STB 4 or other user terminal in one location (e.g., home), to be redeemed (electronically) at another location (e.g., retail store POS or other product or service business entity 6 , or Internet E-commerce terminal public kiosk or at another home).
User interaction may include requesting an item to be delivered by mail (e.g., information, data sheet, sample, etc.,). User interaction also may also be performed to play a game. It can also include receiving credit for winning a game (e.g., for guessing the six or eight ads selected for the user in an ad icon top-level page). SC application can ensure that game-results information is on the SC by a certain time (via SC timestamp), and that the entry fee is paid by SC account debit. | A method and a system for electronically transacting a purchase between a purchaser and a merchant are disclosed. The method includes storing accrued incentives on an intelligent data carrier medium via interactive television (DTV/STB) equipment and redeeming a discount or a value corresponding to the accrued incentives present on the data carrier medium when a purchase is made. The electronic purchase system using an electronic network contains a purchaser interactive television (DTV/STB) equipment connected to the electronic network, a fixed intelligent data carrier medium connected to the interactive television (DTV/STB) equipment for service authentication and decryption and a detachable intelligent data carrier medium connected to the interactive television (DTV/STB) equipment. | 6 |
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application is a continuation-in-part of the U.S. patent application Ser. No. 13/674,118 filed on Nov. 12, 2012, now allowed.
FIELD OF INVENTION
[0002] The present invention relates broadly to a device and method for continuous (extended) metallic structures inspection and monitoring for possible mechanical defects; in particular, to contact magnetic scanner device and method, using magnetic tomography for a real-time structural defects measurement and assessment.
BACKGROUND OF THE INVENTION
[0003] This invention can be used in various fields where constructions are tested for continuity defects in a contact fashion or combined with the remote method. Examples of device and method implementation may include pipes for oil and gas industry, detection of flaws in rolled products in metallurgical industry, welding quality of heavy duty equipment such as ships and reservoirs, etc. It is especially important for inspection of loaded constructions, such as pressured pipes, infrastructure maintenance, nuclear power plant monitoring, bridges, corrosion prevention and environment protection.
[0004] Similar to the modes of transportation like roads, railroads, and electric transmission lines, the pipelines have an important role in the nation's economy, belonging to the long linear assets. They typically cross large distances from the points of production and import facilities to the points of consumption. Like the other modes of transportation, pipelines require very large initial investment to be built, having long exploitation periods when properly maintained. Like any engineering structure, pipelines do occasionally fail. While pipeline rates have little impact on the price of a fuel, its disruptions or lack of capacity can constrain supply, potentially causing very large price spikes. That's why pipelines, such as ones used in the oil and gas industry, require regular inspection and maintenance before potentially costly failures occur.
[0005] The major causes of pipeline failures around the world are external interference and corrosion; therefore, assessment methods are needed to determine the severity of such defects when they are detected in pipelines. Pipeline integrity management is the general term given to all efforts (design, construction, operation, maintenance, etc.) directed towards ensuring continuing pipeline integrity.
[0006] Traditional contact methods of assessing the structural integrity typically complemented by flaw detection using in-line inspection (ILI), detecting and evaluating various metal defects organized by area (clusters), assessing their danger by calculating a level of stress-deformed state (SDS), and deciding on a permissible operating pressure with evaluated factor of repair (EFR), based on residual pipe wall thickness (for defects of “metal loss”—corrosion type).
[0007] As a contact technique, pigging devices has been used for many years to maintain larger diameter pipelines in the oil industry. Today, however, the use of smaller diameter pigging devices is increasing in many plants as plant operators search for increased efficiencies and reduced costs. Unfortunately, the ILI using intelligent pigging is unavailable for a wide range objects that require full disruptive inspection and significant spending on repair preparation. While the ILI method is suitable for the initial flaw detection, it is less efficient for the relative degree (ranking) of the risk-factor evaluation, as well as for defective pipeline serviceability calculation.
[0008] Pipe-line pigging device can detect the following types of defects: i) changing in geometry: dents, wavy surface, deformed shape of cross-section; ii) metal loss, having mechanical, technological or corrosion nature; material discontinuity: layering and inclusions; iii) cracks; iv) all types of welding defects.
[0009] Pipe-line pigging is a very expensive and labor-consuming method. The major limitation of this method is the fact that a large part of pipe-lines are not prepared for the pigging device operation, e.g. due to lack of input/output chambers for pig-flow device launching and pipe-line cleaning access, partially blocked pipe cross-section due to the welding artifacts, geometrical abnormalities and large slopes (small radius turns) of the pipe-line layout. In order to make the pipe-line pigging method possible, a significant preparation has to be done in advance, in particular, the high residual level magnetization (saturated magnetic fields) of the pipe-line has to be performed before using the pig-flow device. This causes future technical problems of the pipeline demagnetization that required for actual pipe repair after the pigging.
[0010] Moreover, the evaluation of the absolute values of mechanical flaws by pigging device is particular difficult due to the multiple additional factors that have to be taken into account, e.g. bearing capacity of the soil, local cyclical loads (temperature, etc.).
[0011] Aside of the remote methods, there are numerous contact non-destructive testing devices for access to the surface of the metallic construction (ultrasound-, eddy-current-, magnetic-powder-defectoscopy). The main disadvantages of such methods is the time-consuming procedure of surface preparation that reduces the scope of applicability and leads to high cost, low registration sensitivity and selectivity for hidden internal defects. identification.
[0012] Typically, a pipeline company will have a thorough pipeline safety program that will include a routine for the identification of pipeline defects and review of pipeline integrity. Such a plan should include, but not be limited to i) a review of previous inspection reports by a third party expert; ii) excavation of sites identified by this review for visual examination of anomalies; iii) repairs as necessary; and iv) addressing factors in the failure and verify the integrity of the pipeline.
[0013] It is important to mention that the pipeline safety program can be only as effective as the interpretation of internal inspection reports.
[0014] There are several magnetographic devices that have been disclosed for non-destructive inspection of ferrous materials. In magneto-graphic inspection and defectoscopy the tested area of the material is placed in proximity to the magnetic medium. The changes of the surface-penetrating impede flux due to the material flows or deviations can be recorded. The resulting “magnetogram” of the material can provide the information about the location, size, and type of the defect or abnormality. In general, this information can be converted into the report about the quality of the material. Obtaining the magnetogram (magnetic picture) of the material in the course of the non-destructive inspection process is very challenging and typically requires additional forms of inspection, such as roentgenogram or an X-ray image.
[0015] For example, U.S. Pat. No. 4,806,862 (Kozlov) offers a contact method of magnetographic inspection of quality of materials, where a magnetic substance (such as liquid) is applied to be magnetized together with the tested material. According to the invention, the intensity of the magnetizing field is established by the maximum curvature of the surface of a drop of a magnetic fluid applied onto the surface of the material to be inspected, so that the resulting magnetogram can be used to assess the quality of the material.
[0016] In another magnetographic U.S. Pat. No. 4,930,026 (Kljuev), the flaw sensor for magnetographic quality inspection is disclosed, which includes a flaw detector and a mechanism for driving the magneto-sensitive transducer. During the scanning procedure, the magnetic leakage fluxes penetrate through the surface of the material in places where flaws occur, resulting in a magnetogram of the tested material.
[0017] There is another magnetic technique that has been proposed by U.S. Pat. No. 6,205,859 (Kwun) to improve the defect detection with magnetostrictive sensors for piping inspection. The method involves exciting the magnetostrictive sensor transmitter by using a relatively broadband signal instead of a narrow band signal typically used in order to avoid signal dispersion effects. The amplified detected signal is transformed by a short-time Fourier transform providing the identifiable signal patterns from either defects or known geometric features in the pipe such as welds or junctions.
[0018] There is a known contact device with two single-component collinear flux-gate magnetometers have been reported for the contact magnetometric monitoring and defects detection, RU 2062394. This device characterized by limited applicability due the slow data reception and processing and low sensitivity that makes impossible to detect minor deviations of stress-strain state (STS) from the background values, also leading to the low resolution threshold and a high false alarm rate.
[0019] The defect areas risk-factor criteria and ranking (such as material stress: F-value) is used for planning a required sequence of repair and maintenance steps. Such criteria were developed by comparing a risk-factor calculated using the defect geometry in calibration bore pits with a predicted risk-factor obtained by the remote magneto-metric data (i.e. comprehensive F-value of particular magnetic anomaly).
[0020] The deviations of F-value can be classified as follows: X1—for negligible defects (good technical condition of the metal); X2—for defects that require planned repairs (acceptable technical condition); X3—for defects that require immediate repairs (unacceptable, pre-alarm technical condition, alarm).
[0021] The absolute values X1-X3 of the F-value (comprehensive value of magnetic field anomaly) should be defined for each particular case, depending upon the following factors: i) Material (e.g. steel) type; ii) Topological location with the local background magnetic fields variation range, iii) Distance to the object (e.g. pipe-line installation depth), iv) General condition of the deformation-related tension within construction under testing, v) etc.
[0022] As a result, the only relative changes (variations) of the magnetic field can be evaluated for the given defective segment (relatively to the flawless segment), by comparing to its relative F-values. Thus, the very moment of the ultimate stress-limit crossing can be identified for each defective segment during the real operation (i.e. under pressure/loaded) condition. It can be done by monitoring the development of the defects within its F-value interval, namely, starting from the good technical condition X1 up until the yield-strength-limit approaching and material breakdown. It provides a real possibility to predict the defect's speed development, resulting in increased accuracy in priority order definition for upcoming maintenance steps.
[0023] The aforementioned techniques are not satisfactory to be used for efficient prediction in defects development timeline and not capable of providing a real-time alert about the strength-limits approaching, i.e. when probable construction failure is about to occur.
[0024] The closest remote technology to the disclosed invention is shown in RU 2264617 that describes the Magnetic Tomography (MT) technique. This technique includes a remote magnetic field vectors measurement in Cartesian coordinates with the movement of measuring device (magnetometer) along the pipe-line, the recording of the anomalies of magnetic field (on top of background magnetic field), processing of the data and report on found pipe-line defects with their localization shown in resulting magnetogram. The technique provides a good sensitivity, also capable of discovering the following types of defects: i) Changing in geometry: dents, wavy surface, deformed shape of cross-section; ii) Metal loss, having mechanical, technological or corrosion nature; material discontinuity: layering and inclusions; iii) Cracks; iv) Welding, flaws, including girth weld defects. Moreover, such method provides a risk-factor ranking of the discovered pipe-line defects accordingly to material tension concentration (factor F). Accordingly this technique was taken as initial prototype for the disclosed technology.
[0025] MT determines the comparative degree of danger of defects by a direct quantitative assessment, of the stress-deformed condition of the metal. Conventional surveys only measure the geometrical parameters of a defect. Their subsequent calculations to assess the impact of the defect on the safe operation of the pipe do not take into consideration the stress caused by the defect. Therefore conventional surveys may fail to detect dangerously stressed areas of the pipe or, conversely, classify a defect as one which requires urgent attention when, in reality, the stress level may be low and the defect presents no immediate threat to the operation of the pipe. Since MT directly measures the stress caused by defects it is an inherently more accurate guide to the safe operation of the pipeline than conventional survey methods.
[0026] There are several methods for integrity assessment of extended structures (e.g. metallic pipes) that have been proposed in literature. Thus, U.S. Pat. No. 4,998,208 (Buhrow, et al) discloses the piping corrosion monitoring system that calculates the risk-level safety factor producing an inspection schedule. There is another method disclosed in U.S. Pat. No. 6,813,949 (Masaniello, et al.), which addresses a pipeline inspection system having a serviceability acceptance criteria for pipeline anomalies, specifically wrinkles, with an improved method of correlating ultrasonic test data to actual anomaly characteristics.
[0027] The main disadvantages of previous methods are: i) The scope of its application is limited by large-scale linear objects. Located at a considerable distance from each other, ii) Difficult real-time implementation of the device, iii) It is impossible to identify the location of individual defects, visualize and specify the exact position on the internal or external tested surfaces; iv) There is also a lack of visualization of the obtained information in a form of the resulting tomogram where all the locations of the defective segments with associated respective risk factors (absolute mechanical stress values) are shown.
[0028] There is a need in developing a combination of contact and remote techniques in order to increase sensitivity, resolution and visual representation of the stress-related anomalies within the structure, as well as a probability of operation failure (i.e. risk-factor).
SUMMARY OF THE INVENTION
[0029] A device for discovering, identification and monitoring of mechanical defects in extended metallic structure, such as pipe, a rail, a rolled metal product, a reservoir, a bridge, a vessel a cable, or electrical power transmission lines, is disclosed. The device includes a pulse generator being used to irradiate a part of the metallic structure, a sensor array registering a response from this part of the structure and a GPS. The sensor array is located in proximity of the structure and measures its magnetic field gradient at a distance of up to 20 cm from the structure without any surface preparation treatment. The sensor array includes a number of 3-component arrays, positioned along the 3 orthogonal dimensions. An analogue-to-digital converter digitizing the sensor signal which is wirelessly transmitted to the calculation unit.
[0030] A calculation unit exploits an inverse magnetostrictive (Villari) effect of changing material's magnetic susceptibility wider applied mechanical stress. Such changing results in gradient distribution of the magnetic field along the area of the structure that has a magnetic field anomaly. The distribution, in turn, reflects a presence and a value of the magnetic field anomaly at the given location. An absolute value of the mechanical stress, which corresponded to said anomaly, is further deducted, thus characterizing a mechanical defect of the structure, optionally using, a pre-determined information such as look-up tables, standards, thresholds or an alternative contact measurement such as a contact probe.
[0031] The sensor array functions without removing the non-metallic cladding of the structure, such as a concrete wall around a metallic pipe, for example. The sensor array measurements can also be performed from inside the pipeline.
[0032] The device detects foreign objects that are present in vicinity of the structure, measuring a relative distances and angles between themselves and the found anomaly. The discovered information is visualized by representing a topological map of the structure in real coordinates, showing simultaneously a structure layout, the foreign objects in vicinity, the location and calculated three-dimensional values of the mechanical stress.
[0033] The device is also capable of measuring a natural Earths background magnetic field without engaging the pulse generator. Such measurement is subtracted from the sensor signal to improve accuracy of the anomaly(s) location.
[0034] The device is operated by the battery with a residual charge indicator to ensure a quality and reliability of the identification in the field conditions and can perform without interruption of the structure normal operation.
[0035] A method for discovering, identification and monitoring of mechanical defects of various nature, causing the concentration of mechanical tension in metallic structures, is also disclosed. The method includes an irradiating a part of the metallic structure with electromagnetic pulses, performing mechanical stress measurement of the metallic structure by a sensor array placed in proximity of the structure and producing a digitized sensor signal and digitizing the sensor signal. The method also includes analyzing the digitized signal in a calculation unit using the inverse magnetostrictive effect providing information about the presence and the value of the magnetic field anomaly at the given location of the structure. The method calculates absolute values of the mechanical stress around the anomaly, thus unveiling and characterizing the mechanical defect of the structure.
BRIEF DESCRIPTION OF THE DRAWINGS
[0036] FIG. 1 : The block-diagram of the device for discovering, identification and monitoring of mechanical defects in metallic structures using contact method, optionally, in combination with a non-contact technique.
[0037] FIG. 2 : A general principle of operation of the contact and non-contact magneto-graphic techniques used in metallic structure defects monitoring and integrity assessment.
[0038] FIG. 3 : An example of a single magneto-graphic measurement. The diagram represents the three areas of a magnetic field anomalies (a), (b) and (c) corresponding to the respective local mechanical stresses. The area (c) shows the evidence of the metal stress yielding-limit crossing.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
[0039] The present invention describes the contact magnetic scanner device that uses a magnetic tomography (MT) for contact magnetographic identification and analysis of mechanical flaws/defects, optimized for extended metallic constructions inspection. The invention can be used in combination with a non-contact identification. And can be applied to variety of extended metallic structures, such as a pipe, a rail, a rolled metal product, a reservoir, a bridge, a vessel a cable, or electrical power transmission lines.
[0040] The use of MT device has following advantages: 1) Applicable for the unpiggable pipelines or other objects where in-line inspection method is inapplicable; 2) the objects to be inspected include but not limited to: compressor stations pipelines, pipeline inclusions, water-supply pipelines in cities; 3) the use of MT device doesn't require any preparation of the pipeline for testing such as cleaning, opening the pipe, or stopping pipeline operation; 4) the use of MT device doesn't require magnetizing of the object's pipes; 5) MT device capable of detecting flaws of various types including long crack-like pipe-line defects and welding defects; 6) the use of MT device doesn't have limitation on the structure diameter, configuration and protective coatings, for example, change of pipe diameter/wall-thickness, turns and their directions, transported product (e.g. gas, oil, or water), inside pressure, pipeline protection e.g. cathodic protection, etc).
[0041] The MT device is capable to evaluate the degree of danger of defects by the level of concentration of mechanical tensions rather than defect geometry (e.g. length-width-depth) and particularly suitable for running a database on condition certification of objects of any length and any monitoring period.
[0042] The MT device implementation guarantees minimal customer resources use for monitoring preparation and repair works such as: i) reduces work volume and total costs of pipe access works; ii) greatly reduces time of full diagnostic—repair evaluation—repair planning—repair cycle; iii) gives pipe corrosion prognosis and estimates levels of tense-deformed state of the pipeline under current operating conditions.
[0043] The MT device application provides a remote metal flaws monitoring, which is particularly suitable for hidden ferromagnetic constructions of extended length.
[0044] The general combined block-diagram of the method is given in FIG. 1 .
[0045] The magnetic tomography device is based on Using of the inverse magnetostrictive (Villari) effect—i.e. the changing of the material magnetic susceptibility under applied mechanical stress. Generally, such technique uses “natural” magnetization of the ferrous pipes by magnetic field of the Earth. The changing of magnetic susceptibility results in distribution of magnetic field gradient along the structure surface area under measurement, thus providing information about the presence and the value of the magnetic field anomaly at the given location of the structure.
[0046] The term “contact measurement”, as used herein is defined as the measurement being used from a small distance from the surface of the structure under testing. For the preferred embodiment of the invention, such distance is defined as a small if it is less than 20 cm from the surface of the structure. Furthermore, for the preferred embodiment of the invention applying an additional (pulsed) magnetic field is used.
[0047] The term “remote measurement”, as used herein is defined as the measurement being used from a substantial distance from the structure under testing. Unlike to the contact measurement (non-destructive or distractive), the remote sensor is not necessary located in a close proximity to the structure. For the preferred embodiment of the invention, the substantial distance have value of 1-50 m, making the disclosed device especially effective for testing structures located deep underground or underwater.
[0048] The remote measurement is capable of identifying, the anomalies by deviation of the Earth's magnetic field at each location from a background value, without applying an additional magnetic field during the measuring.
[0049] The contact measurement device is also capable localizing coordinates of foreign objects in vicinity of the structure and making, a linkage between the anomalies' locations and the foreign objects locations around. In the preferred embodiment of the invention, the device finds coordinates of foreign objects which can be present in vicinity of the structure and measures a distance/angle between those foreign objects and the structure's anomaly.
[0050] The both remote and contact measurements are further capable of localizing coordinates of the structure and detecting anomalies with localized coordinates within the extended metallic structure based on measuring a value of the Earth's magnetic field at multiple locations in vicinity of the structure.
[0051] The present invention discloses the Contact Magnetic Scanner a device for the contact detection of the defects in metallic structures. The present invention effectively overcomes the aforementioned disadvantages of contact defect monitoring and detection.
[0052] Similarly to the remote method, the contact method at a given measurement point, the presence of the magnetic field anomaly and its magnitude (the local stress at the remote area) is determined based on a comparison between the increments (modules) of the Earth's magnetic field values (magnetic moments), Such calculation method is based on a dipole approximation of the remote stress-concentrator. The solution of the problem of the magnetic moment calculation results from a system of algebraic equations, which, for example, described in the patent U.S. Pat. No. 4,309,659.
[0053] The disclosed device expands the scope of device applications for different types of metallic structures (e.g. confined extended, small and large), ii) provided real-time operational means by including, data preprocessing and calibration, iii) increases the identification sensitivity of the defects located at the surface and within the volume of the object by including an additional pulse-magnetization unit, v) using a contact tomography technique in order to add 3D visualization capabilities using a 3D model of the tested object. The information visualization (display) unit of the device represents a topological map of the structure in real coordinates, showing; simultaneously a structure layout, the foreign objects in vicinity, the calculated values of a mechanical stress and the location of the found anomalies.
[0054] The disclosed device uses pre-determined information for structure anomaly identification and localizing. Such pre-determined information can be a look-up table, preset standards and thresholds, an alternative contact measurement, or combination of the above.
[0055] Moreover, the device can combine a contact and non-contact measurement increasing the reliability and accuracy of information about the necessary repair or stop alarm. It can be done using the risk-factor ranking tables based on the absolute values of stress, compared against the values from regulatory documentation (for particular object).
[0056] In the preferred embodiment of the invention, the device performs the identification of anomalies without interruption of the structure normal operation.
[0057] Increasing the efficiency of the method by applying a 3D visualization-assisted maintenance and repair schedule with the real values of mechanical stress) to the actual structural layout, such as a pipe-line integrated into the existing topology.
[0058] Such technological outcome can be achieved, mainly, due to the following innovative means: i) Contact (object surface) identification of the local defects and their respective risk-factors; ii) Comparing the remote measurement with ones obtained locally; iii) Comparing the resulting measurements against the values from regulatory. documentation (for particular object), iii) Graphical 3D visualization of the obtained information using the actual topological layout of the area and the structure in absolute geographical coordinates.
[0059] For the remote registration of magnetic field anomalies in extended metallic structures (such as a pipe) is performed in a predetermined coordinate system relatively to the structure (axis) with a known (fixed) remote sensor array aperture. The coordinates of each single measurement along the structure can be chosen accordingly to the cross-section size and burial depth of the (underground, underwater) structure. It results in the matrix distribution of magnetic field gradient along the structure surface area under each single measurement. The presence and the value of the magnetic field anomaly at the given location are derived from the comparison of different increments of the Earth's magnetic induction vector modulus.
[0060] Similarly to the remote measurements, the contact measurement also includes device to measure the magnetic field vector in Cartesian coordinates, by moving the registration device (magnetometer) along (above) the metallic structure (of arbitrary configuration, in general) and registration of the magnetic field anomalies, Such anomalies are calculated by a deviation from the background values (calculated using matrix transformations).
[0061] The contact device also connected the data recording unit and decoding system that provides conclusive information about the presence and location of the defects in the form of magnetograms that shows the location of the defective pipe sections and their degrees of risk.
[0062] Similarly to the remote measurements, the contact measurement of the extended object (such as pipeline) uses the recording of the magnetic field that is carried out in a pre-defined coordinate system at specifically defined measuring points by a set of sensors having a pre-selected aperture (base) K2. This aperture corresponds to the axis of the extended object with a measuring step K1.
[0063] The exact location of measurement points is defined from the diameter and underground depth (e.g. of the pipeline), using coefficients K1, K2 and K3, where: K1—is the measuring step (registration of the magnetic field induction) 0.2 in, for example, K 2—the aperture (the base) of the sensors, chosen from the ratio 0.7 D≦K 2≦1,4 D, where D—is the diameter of the structure (pipeline), K3—is the depth of the pipeline, or the shortest distance from the metallic construction to the surface, [m].
[0064] In the case of a non-linear (or small) extended object the contact registration c the magnetic field is carried out in a fixed coordinate system. In this case, registration is possible at different relative positions of the sensors and their arbitrary orientation with respect to the object (coplanar or collinear).
[0065] To verify the anomaly angular position along the structure (pipeline) circumference, the angular scanning step K1 should not larger than 30 degrees with the pre-defined distance between the sensors K2, to ensure the required accuracy of calculations.
[0066] The block-diagram of such device is shown in FIG. 1 . with the reference to FIG. 1 , the device for contact and, optionally, non-contact measurements comprises of a sensor array for remote measurements ( 1 ), a sensor array for proximity (contact) measurements ( 20 ), a quartz generator ( 2 ), a frequency divider ( 3 ), analogue-to-digital converter (A/D) ( 4 ), a control unit ( 5 ), a threshold unit ( 6 ), a light- and sound-alarm unit ( 7 ), a battery with a charge indicator ( 8 ), a calculation unit ( 9 ), a (resulting) information unit ( 10 ) with a display unit ( 23 ), a non-volatile memory unit ( 11 ), a recording unit ( 12 ), a case-analysis unit ( 13 ), a pulse generation lint ( 21 ), an odometer unit ( 23 ), a GPS unit ( 14 ), navigation unit (gyroscope/accelerometer) ( 17 ) and a logic unit ( 15 ). The device performs in a following manner.
[0067] The remote sensor array ( 1 ) registers induction gradients of the magnetic field ( 16 ) within construction under testing.
[0068] The proximity sensor array ( 20 ) registers induction gradients of the magnetic field ( 19 ), the gradients corresponding to reflections of the EM pulses from the structure; the EM pulses generated by the Pulse generator ( 21 ). The signal from the proximity sensor is used as a calibrating measurement.
[0069] By using A/D converter ( 4 ), the both digitized signals (remote and contact) are: i) inputted into calculation unit as a preliminary data; ii) recorded by the memory unit ( 11 ). The Quartz generator ( 2 ) controls the frequency of the A/D converter ( 4 ).
[0070] The control unit ( 5 ) through the logic unit ( 15 ) controls the case analysis unit ( 13 ) with predetermined database and lookup tables, the recording unit ( 12 ), the GPS unit ( 14 ), the navigation unit ( 17 ) and the memory unit ( 11 ).
[0071] The calculation unit ( 9 ) receives the information from units ( 12 ), ( 13 ), ( 14 ), ( 17 ), ( 20 ), ( 22 ) through the memory unit ( 11 ), controlled by logic unit ( 15 ).
[0072] The real-time information from ( 4 ) is compared with the information from the threshold unit ( 6 ). By these means, the visualization of the real-time data against the threshold values is provided, enabling the alarming (by the unit ( 7 )) an operator about potentially dangerous operational conditions of the structure. The remaining charge of the battery ( 8 ) is monitored. The calculation unit ( 9 ) is responsible for the information processing, providing the information to the resulting, and visualization init ( 10 ).
[0073] The calculation unit ( 9 ) unit receives the digitized signal, uses the inverse magnetostrictive effect of changing of material magnetic susceptibility under applied mechanical stress resulting in gradient distribution of the magnetic field along an area of the structure that has a magnetic field anomaly, the distribution of magnetic field gradient providing an information about a presence and a value of the magnetic field anomaly at the given location of the structure and a mechanical stress, corresponded to the anomaly.
[0074] The calculation unit ( 9 ) further calculates absolute values of a mechanical stress around all found anomalies in the metallic structure using the measured values of the Earths magnetic field for each anomaly and applying the calibration coefficient As a result, the calculation unit is capable of identifying and localizing of said signal anomalies.
[0075] In one embodiment of the invention the calculation unit is located at a distance from the sensor array, and the digitized signal is transmitted to the calculation unit via wireless connection.
[0076] The measured magnetic field values from 2 inputs ( 16 ) and ( 19 ) local stress at the remote area are recorded at each measurement point, (both for contact and optional remote sensor independently), then further compared with other measurements within a respective segment of the metallic construction. By these means the anomalies (levels of stress-deformation) that deviate from the baseline magnetic field values are selected. Thus, the location of each stress-related deformation is derived from the maximum concentration value of the magnetic field after comparing it with the previous measurements.
[0077] The visualization unit has a 3-dimensional display means ( 23 ) in order to provide a 3-D representation of the density of magnetic field strength distribution, found detects and its risk-factors along with the topological (3D) map of the structure under testing.
[0078] The resulting and visualization init ( 10 ) also accommodates inputs from the threshold unit ( 6 ) and the light-/sound-alarm unit ( 7 ) which enables identification of the parameters' deviation from the background level, as well as (e.g. wirelessly) informing an operator about the deviation value in real-time, respectively.
[0079] Moreover, the resulting and visualization init ( 10 ) is capable of comparing the remote signals ( 16 ) with in-contact measurement ( 19 ) and producing a set of calibration coefficients in order to calibrate the resulting calculated data of found magnetic anomalies.
[0080] The situational case-analysis unit ( 13 ) enables the analysis of the information in the context of pre-determined technological information and schemes, which, in combination with the GPS unit ( 14 ), provides more accurate topological mapping.
[0081] In the preferable configuration of the device, a GPS sensor ( 14 ) is complemented by a. navigation unit that includes gyroscope(s) and/or set of accelerometer(s) ( 17 ), and odometer unit ( 22 ) enabling the recording of the device's angle-positioning relatively to the extended metallic structure cross-section at each moment of the magneto-graphical measurements. The recorded angle-positioning data (including positioning, relatively to horizon) is used further to correct the magneto-graphical measurements due to structural bending/turning-related deviations.
[0082] Accordingly, the absolute coordinates of discovered defects relatively to the (visible) reference objects can be obtained with the following registration in the database during the equipment assessment report.
[0083] In the preferable configuration of the mentioned device, each sensor arrays ( 1 ) and ( 20 ) consist of a few 3-compenent arrays, positioned along the 3 orthogonal dimensions. Alternatively, each array includes a few single-component sensors, such as optically pumped quantum analyzers. Using the optically pumped quantum analyzers in the sensor array (I) allows higher flaw-detection accuracy in underground constructions, well-suited for detecting relatively small values of mechanical stress, and/or deeper underground installation.
[0084] Since die sensor array ( 1 ) and ( 20 ) can be rotated above the surface of the structure during the scanning procedure, it is possible to implement a polar coordinate system for detects detection, in combination with the data from the gyroscope/accelerometer unit ( 17 ).
[0085] The recording process is arranged in a discrete manner, enabling an independent storage and access for different recorded portions (memory segments) of the scanning.
[0086] In the preferable configuration of the disclosed device, the unit ( 9 ) calculates: i) magnetic field gradients distributed along the square area within the defined segment of the structure, ii) the values of the local mechanical stress within the defined segment of the structure.
[0087] The device allows identifying the location of defects using both in-contact and remote magnetic measurements.
[0088] Moreover, it expresses the calculations in real-time, also providing the visualization of the information in the form of tomograms with reference to the 3D model of the controlled object.
[0089] Moreover, the device provides automated evaluation of the defects risk factor at respective identified location, allows automatic processing, interpretation and archiving of non-destructive testing results.
[0090] In the alternative configuration of the disclosure, the calculation unit ( 9 ) can be realized similarly to the U.S. Pat. No. 4,309,659 patent.
[0091] Moreover, in the alternative configuration of the disclosure, the recording unit ( 12 ) can be realized similarly to the RU2037888 patent.
[0092] The principle of operation of the device shown in FIG. 1 . is explained further in FIG. 2 . The FIG. 2 a shows the structure ( 1 ) without defects, with the preliminary magnetic tomography charts (magnetogram) ( 2 ) showing the measured background (calibrated to zero) level of magnetization. The FIG. 2 b shows the same structure ( 1 ) with the potential defects ( 3 ), ( 4 ) corresponded to the deviations of the tomography charts ( 5 ). The FIG. 2 c show the same structure ( 1 ) with the processed tomography charts ( 5 ) showing the location of the defect ( 4 ) that require an immediate attention (unacceptable, pre-alarm technical condition, alarm), based on the local mechanical stress value estimate.
[0093] As mentioned before, the magnetogram ( 2 ) attributes and characterizes the section of the structure by registering and analyzing changes in the magnetic field of the structure such as pipeline. These changes are related to stress, which, in turn, is related to defects in the metal and insulation. Magnetic measurements data is collected from the surface and includes the detected anomalies. Such detected anomalies are function of a local stress and/or local mechanical tension and structural changes in the metal. Moreover, a post-processing of this experimental data enables the visualization of the flaws in the structure.
[0094] The device can operate on the metallic structure which is covered by a non-metallic cladding and the sensor array performs the measurement without removing the cladding, for example, when the metallic structure is a pipeline and the cladding is a pipeline insulation cover. Moreover, the device (sensor array) is capable of performing measurements from inside the structure, such as a pipeline.
[0095] The described. MT device does not measure the dimensions of geometric defects alone, but, instead, provides a stress measurement caused b these defects and identifies their character, location and orientation in accordance with the location and orientation of the area of stress. Linear and angular coordinates of flaws in the metal and coating are have been experimentally defined within a tolerance of +/−0.25 m.
[0096] The device explained by FIG. 1 and FIG. 2 can effectively identify and analyze the magnetic field anomalies in areas with stress concentrators caused by: i) defects or changes in structural conditions (such as metal loss, cracks, dents, lamination and inclusions); ii) erosion, seismic activity, or third-party damage.
[0097] FIG. 3 shows the example of a single magneto-graphic measurement. The diagram represents the three areas of a magnetic field anomalies (a), (b) and (c) corresponding to the respective local mechanical stresses. The area (c) shows the evidence of the metal stress yielding-limit crossing.
[0098] In parallel, the in-contact (proximity) defectoscopy has been performed at the location (c). The actual dimensions of defects (cracks and corrosion) have been evaluated. The magnetographic device calibration has been done based on a difference between the measured signal (versus background) and the actual parameters of the defect(s) found. Then, the calibrated values of the anomalies have been used as a criterion. For this particular case, the calibrated values appeared to be 3-10 times higher comparing to the background signal value. The follow-up magnetographic measurements ha been performed in a real-time.
[0099] The presented MT device helps to plan necessary structural maintenance procedures and define their priorities. The device is particularly efficient when the magneto-graphic material (Magnetic Tomography) inspection is applied to extended metallic constructions, revealing its flaws against the topological map of the structure.
[0100] Moreover, the device enables direct monitoring of the defective construction segments with still acceptable technical conditions. It allows a long-term database support for the follow up monitoring, certification, prognosis and operational timeline for the structure.
[0101] In the preferred embodiment of the invention the non-destructive detection of anomalies in the structure is performed using magnetographic technique such as MT.
[0102] The main goals of the present invention are: i) to increase the method's applicability area: ii) to increase the accuracy of the priority scheduling for required maintenance and repair procedures iii) to broaden the spectrum of the potentially scheduled repair procedures, based on the additional data.
[0103] The description of a preferred embodiment of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Obviously, many modifications and variations will be apparent to practitioners skilled in this art. It is intended that the scope of the invention be defined by the following claims and their equivalents. | A device for discovering, identification and monitoring, of mechanical flaws in metallic structures is disclosed, based on magneto-graphic/magnetic tomography technique to identify stress-related defects. The device includes registration means that optimized for use with metallic structures of various types, shapes and sizes. Applications include a real-time quality control, monitoring and emergency alarms, as well structural repairs and maintenance work recommendations and planning. Examples of the device implementation include pipes for oil and gas industry monitoring, detection of flaws in rolled products in metallurgical industry, welding quality of heavy duty equipment such as ships, reservoirs. etc. It is especially important for loaded constructions, such as pressured pipes, infrastructure maintenance, nuclear power plant monitoring, bridges, corrosion prevention and environment protection. | 6 |
BACKGROUND OF THE INVENTION
[0001] This invention relates to blood chemistry monitoring systems and more particularly to wearable blood sampling and monitoring, especially for glucose monitoring.
[0002] Various systems and methods are known and used for measuring and analyzing blood drawn from patients. Usually blood is drawn and sent to a laboratory for analysis, and then the results are reported to a medical professional who then decides among treatment options.
[0003] In certain hospital situations, for example when administering insulin therapy, frequent blood measurements are needed. In the case of insulin therapy, it is glucose measurements which are needed. In other cases, frequent hematology data, lactate measurements, or other analytical measurements are needed rather than, or in addition to, glucose measurements to aid in managing a patient's condition.
[0004] Using current systems and methods, clinical laboratory measurements of blood drawn from patients only provide sporadic data which are insufficient to guide certain therapies where patients would benefit from optimal drug titrations to maintain certain physiologic parameters within clinically optimal ranges.
[0005] For example, glucose control and insulin drug delivery for hyperglycemia could benefit from continuous or semi-continuous, automated blood sampling and analysis in order to automatically regulate insulin delivery. This approach is also applicable to other analytes and drug therapies such as with anticoagulant administration. The advantages of automated blood sampling in the cases of insulin therapy for example have been recognized and various systems have been proposed to achieve such sampling and analysis.
[0006] For example, Wong, in U.S. Pat. Nos. 5,165,406; 5,758,643; and 5,947,911. discloses a system for monitoring a patient's blood chemistry which intermittently draws blood samples into a special sensor assembly having a plurality of analytical sensors, each sensitive to a particular blood parameter. A catheter connects the sensor assembly to the patient.
[0007] Goldberger, et al., in U.S. Pat. Pub. 20080014601, disclose a glucose measurement system which has a controller, a pump, and flush solution in a first reservoir, IV solution in a second reservoir, a first valve, a second valve, and a plurality of tubing placing the pump, reservoirs, and valves in fluid communication with each other. The pump is a syringe pump.
[0008] Goldberger, et al., in U.S. Pat. Pub. 20070123801, disclose a wearable, automated blood testing device in an inflatable cuff which employs a lancet, a lancet launching mechanism, and a blood analyte measuring element, and a control unit for controlling the periodic sampling of blood and measurement of blood analytes and blood parameters, wherein the control unit is programmable to initiate blood sampling for measurement of blood analytes at pre-determined time intervals. Capillary forces are used to carry the blood to a reservoir where the blood sample is carried through small passages to a blood analyte measuring element contained within a cartridge, or the blood analyte measuring element may be integrated with the lancet.
[0009] For many situations it is undesirable to have an automated lancet needle system due to the cost and difficulty of engineering a system which involves multiple needles. Furthermore, it is believed that the use of multiple needles is impracticable due to cost and risk of failures in operation.
[0010] It is therefore an object of the present invention to provide a portable, wearable system for enabling frequent and automated blood sampling in a patient without use of lancets or automated needle punctures in the patient. It is another object to provide automated blood analysis employing a catheter which remains in place and involves only one puncture rather than the multitude of punctures which a lancet system requires. Also, smaller diameter needles are known to be prone to acclusion, therefore, reducing the reliability of such systems.
SUMMARY OF THE INVENTION
[0011] These objects, and others which will become apparent from the following detailed description and drawings, are achieved by the present invention which comprises in one aspect a wearable blood chemistry monitoring device comprising (A) a mini pump, (B) a portable form factor mechanical apparatus; (C) at least one measurement element for measuring at least one blood parameter (D) a catheter connected to the pump via a tube, (E) a computerized device adapted to automatically measure blood analytes and blood parameters (F) a belt adapted to hold a housing, a waste bag, and a flush solution bag; wherein the pump and a disk are arranged in the housing so that a hole in the disk fits over the pump.
[0012] The device of the invention is for use in patients with central or peripheral access catheter ports and functions to automatically monitor blood sampling and measurement of various blood analytes such as glucose, electrolytes, lactate, hemoglobin, and hematocrit, as well as any agent, drug or blood test, which may be quantitated with microliter blood quantities on a strip, cuvette or other body fluid type assay.
[0013] The blood monitoring device of the invention consists of regular sterile tubing but preferably consists of microtubing. The tubing is connected to a mini pump (i.e., peristaltic) with rotating valves or other flow control systems which allow bidirectional flow for drawing blood and then flushing the tubing in the reverse mode.
[0014] Preferably the monitoring device comprises an optical cuvette type window for optical measurement of blood. The device further includes a rotatable disk located within a circular housing which is adapted to fit in a belt or other wearable apparatus such as an armband, leg band, or waistband. The rotatable disk has a hole in the center and carries a series of glucose test strips, preferably in a radial, i.e., spoke like configuration. Other configurations of test strips may be used in some embodiments. The glucose strips are preferably read using optical or other reading systems. In the glucose monitoring embodiments, the data can be used to control a closed loop insulin delivery system, and/or to initiate an alarm, and the data can be transmitted by various means to any type monitor, either locally or remotely. Wireless transmission of blood data can be utilized. Alternatively, the blood data may be monitored locally, on the device itself.
[0015] In a closed loop insulin delivery system wherein glucose is being periodically tested, a controller and an algorithm can be employed to use blood glucose data from the monitoring device to deliver insulin via intravenous or subcutaneous routes when appropriate.
[0016] The monitor of the invention can be used by critically ill or perioperative, i.e., around the time of surgery, patients needing close monitoring of medical conditions requiring single or multiple laboratory parameters to guide therapy and monitor patients conditions and progress.
[0017] The monitor of the invention can provide patients and medical staff advantages in not having the patient tethered to a monitor which is typically placed on a pole or at the patient's bedside.
[0018] In the case of sedated or anesthetized patients, frequent readings from the monitor on anesthetic drug concentrations would permit the delivery of anesthesia care using more optimal drug concentrations and the delivery of anesthesia care using optimized drug concentrations and the delivery of care using closed loop feedback with input from other monitors for information on physiologic parameters.
[0019] In a closed or semi-closed loop system for automated delivery of anesthetics, the monitor would provide real time or semi-real time blood chemical data while other physiologic parameters would be received by the anesthetic delivery system from other sources. In such embodiments, blood chemistry in addition to glucose is monitored.
[0020] The monitor can be used in certain embodiments on an ambulatory patient who has available long term central access ports. The monitor can also be used with peripheral catheters in a hospitalized patient or an ambulatory patient since only small blood volumes are used for sampling and analysis by the monitor.
[0021] While it is preferred that the housing be circular to accommodate the rotatable disk, the housing can be other portable form factor as long as the disk and the mini pump are accommodated.
[0022] The pumping action for the drawing of the blood and flushing of the fluid lines and catheters is provided by the mini peristaltic pump.
[0023] The monitor is designed to permit using a multianalyte disc with strips mounted at intervals around the disc, for example in a radial pattern at regular intervals, spaced evenly around the disc. The strips are advanced by controlled rotation of the disc so that they are at the proper position and aligned with the blood dispensing orifice.
[0024] The monitor in most embodiments requires two small reservoir bags, one containing the flush solution such as saline or other injectable solution for purging the tubing, and the other for receiving waste solution from the purging. In other embodiments no waste bag is necessary and the physiologic fluid solution is flushed back to the patient in a closed system.
[0025] The invention shall be described in greater depth in the drawings and detailed description provided herein.
BRIEF DESCRIPTION OF THE DRAWINGS
[0026] These and other features and advantages of the present invention will be illustrated by certain embodiments set forth in the detailed description when considered in connection with the accompanying drawings, wherein:
[0027] FIG. 1 depicts a patient wearing a blood chemistry monitoring device with catheter and tubing.
[0028] FIG. 2 depicts a schematic view of a blood chemistry monitoring device including catheter tubing and a flush solution bag.
[0029] FIG. 3 is a schematic view of a blood chemistry monitoring device according to the invention with a mini peristaltic pump arranged in the center.
[0030] FIG. 4 is a blood chemistry monitoring device according to the invention with a waste bag and flush solution bag, a mini peristaltic pump, and a central catheter depicted.
[0031] FIG. 5 is a blood chemistry monitoring device according to the invention with a waste bag and flush solution bag, a mini peristaltic pump, and a central catheter depicted.
[0032] FIG. 6 shows a typical patient wearing a blood chemistry monitoring device according to the invention with a waste bag and flush solution bag, a mini peristaltic pump, and a central catheter depicted.
[0033] FIG. 7 shows a typical patient wearing a blood chemistry monitoring device with one bag according to the invention.
[0034] FIG. 8 shows a block diagram of the Device Controller.
DETAILED DESCRIPTION
[0035] The present invention provides a wearable, automated system for sampling and monitoring of blood analytes and blood parameters. The system components are combined in a single apparatus to initiate automatic, periodic blood sampling and monitoring. The system operates automatically to draw blood samples at suitable, programmable frequencies to analyze the drawn blood samples and obtain the desired blood readings such as glucose levels, hematocrit levels, hemoglobin blood oxygen saturation, blood gasses, lactates or any other parameter as would be evident to persons of ordinary skill in the art.
[0036] The system includes a reusable sensor for obtaining blood measurements. The sensor is preferably electrochemical or optochemical sensor, but other options such as sensors that support optical blood measurements (without relying on chemical reactions between the sample of blood and a chemical agent embedded in the sensor) are disclosed. The present invention also discloses apparatuses and methods that employ components of manual test systems (e.g. blood glucose test strips) for use in an automated measurement system.
[0037] As referred to herein, the terms “blood analyte(s)” and “blood parameter(s)” refers to such measurements as, but not limited to, glucose level; ketone level; hemoglobin level; hematocrit level; lactate level; electrolyte level (Na.sup.+, K.sup.+, Cl.sup.−, Mg.sup.2+, Ca.sup.2+); blood gases (pO.sub.2, pCO.sub.2, pH); blood pressure; cholesterol; bilirubin level; and various other parameters that can be measured from blood or plasma samples.
[0038] Referring now to FIG. 1 , an embodiment of a blood chemistry monitoring device 11 according to the invention is shown having a portable form factor i.e., a circular housing 12 (around 10 cm or 3.94 inches in some embodiments), safety valves 28 , 28 , port 14 , mini pump 16 , rotatable disk 18 , blood chemistry test strips 20 , central catheter 30 , flush solution bag 26 , electronic meter 23 , device controller 31 . Device 11 is worn by a patient 15 by means of a belt 17 adapted to hold device 11 . Device 11 receives blood from patient 15 through a tube 29 in fluid connection to a central catheter 30 placed in a vein of patient 21 . Device controller 31 operates safety valve 28 and mini syringe pump 16 , which is located in central cavity 19 of rotatable disk 18 allowing blood to flow from patient 15 . Blood chemistry test strips 20 are arranged radially from the central cavity toward the circumference of rotatable disk 18 in a star pattern. A mechanism 32 is provided to advance disk 18 in direction 27 by the distance between each glucose test strip 20 . One test strip 20 at a time is moved into position by means of mechanism 32 , controlled by device controller 31 to receive a drop of blood from a port 33 . The device includes a flush solution bag 26 in fluid connection with the device via tubes 29 and 24 , respectively. After blood is received via tube 22 from patient 15 , then tube 22 is flushed with solution from bag 26 . Device 11 also returns the solution to the patient via the same tube 29 when the pump 16 is reversed and safety valve 28 is operated by device controller 31 . Safety valves 28 also prevent reflux back to the patient.
[0039] Glucose test strips 20 are read after they have received a drop of blood and have time to react chemically, depending on which types of blood chemistry are to be determined and the result is displayed on electronic meter 23 over hard-wired link 37 or wireless communication methods, as are well-known in the art.
[0040] Housing 12 is not necessarily round but can be any desired shape, usually a portable form factor designed to fit into belt 17 . Belt 17 can alternatively be a waste band, arm band, leg band, or any other apparatus which may be worn by patient 15 .
[0041] Referring to FIG. 8 , the diagram depicts the components of a device controller as used in the automated blood parameter sampling and monitoring system of the present invention. Device controller 31 preferably comprises software program 39 , memory 40 and user interface 41 . Device controller interfaces to the monitoring device via user interface 41 and I/O ports. Fluid sensor 34 , blood chemistry test strip 20 and output of light detector 36 are all connected to the input of the controller 31 . Both safety valves 28 , electronic meter 23 , rotatable disk 18 , mini pump 16 and light source 35 are under the control of the device controller.
[0042] Software program 39 is used for data analysis and correlation. Additionally, software program 39 also supports calculation of trends using look-up tables and algorithms based on measurement history. The results of data analysis and interpretation performed upon the stored patient data by the monitor may optionally be displayed in the form of a paper report generated through a printer (not shown), besides being displayed on the electronic monitor screen 23 . Software 39 uses a blend of symbolic and numerical methods to analyze the data, detect clinical implications contained in the data and present the pertinent information in the form of a graphics-based data interpretation report. The symbolic methods used by the software to encode the logical methodology used by expert diabetologists as they examine patient logs for clinically significant findings, while the numeric or statistical methods test the patient data for evidence to support a hypothesis posited by the symbolic methods which may be of assistance to a reviewing physician.
[0043] Device controller 31 is also preferably equipped with an I/O port 38 that may optionally include interfaces to external automated systems such as, but not limited to, portable monitors, printers, hospital data network(s), external processors and display units, and other monitoring automated systems. The connection between the device controller and the various possible external units can be made via any of the known wired or wireless communication methods, as are well-known in the art. Alternatively, I/O port 38 may be adapted to provide telemetry.
[0044] Software program 39 allows the user to perform queries on the stored information. For example, the user may wish to view the results of previous measurements or the current measurement. The user may set an alarm, when the sensor is in operation, or reconfigure the port assigned to a component. The automated system further includes alerts and integrated test systems. The alerts may include alerts for hyperglycemia and hypoglycemia. The alerts may also include alerts for hemoglobin level below a defined level. The device alerts when the blood measurement falls outside a defined range for blood parameters.
[0045] Software program 39 uses a blend of symbolic and numerical methods to analyze the data, detect clinical implications contained in the data and display the pertinent information. The symbolic methods used by the software encode the logical methodology used by expert diabetologists as they examine patient logs for clinically significant findings, while the numeric or statistical methods test the patient data for evidence to support a hypothesis posited by the symbolic methods which may be of assistance to a reviewing physician.
[0046] The processed data may be transmitted from the monitoring device to a central monitoring station when the automatic blood parameter testing device is used in a hospital environment. The monitoring device maintains a record of all physiological parameters measured over a period of time from different patients. Thus, the monitoring device can communicate with a designated central monitoring station to supply data (telemetry) from previous patients or the current patient.
[0047] Referring now to FIG. 2 , another embodiment of the invention is shown as the same configuration as the embodiment of FIG. 1 , except blood chemistry test strips 20 are replaced with a fluid sensor 34 , a cuvette of flow thru cell 42 , a light source 35 , a light detector 36 and mini pump 16 is preferably a peristaltic pump. Cuvette or flow thru cell 42 is preferably a surface or miniature container, such as but not limited to a capillary tube, enabling storage of the blood sample for optical measurements. In this embodiment, both a light source and a light detector are used for measuring the blood analyte based on reflected, transmitted or other known optical effects such as Raman Spectroscopy, NIR or IR Spectroscopy, FTIR or fluoroscopy. Light source 35 and light detector 36 are chosen such that glucose (1650 nm in the Infra Red region of the spectrum) and hemoglobin (540 nm) can be accurately measured and monitored. The operation of the light source and detector is well known in the art.
[0048] Referring to FIG. 3 , in another embodiment, monitor device 11 is shown connected to an IV, which is another option if no central venous catheter (CVC) is available. The device would be connected to the proximal infusion port in the preferred embodiment to avoid sample contamination from the mid and distal infusion ports. The sample draw rate could be adjusted (slow draw, intermittent draw steps with a 1 sec pause between steps) to prevent sample contamination from other infusions.
[0049] Referring to FIG. 4 , in another embodiment, flush solution bag 26 is replaced with a dual compartment bag. One compartment contains flush solution and the other compartment provides for waste storage.
[0050] Referring to FIG. 5 , in yet another embodiment, flush solution bag 26 is replaced with two distinct bags. One bag contains flush solution and the other provides for waste storage.
[0051] Referring to FIGS. 6 and 7 , typical area of the body where the device can be worn is shown.
[0052] While the invention has been described in conjunction with specific embodiments, it is not intended to limit the invention to one embodiment. Thus, the present invention is not intended to be limited to the embodiments described, but is to be accorded the broadest scope consistent with the disclosure set forth herein. | A wearable blood chemistry monitoring device is disclosed which comprises a wearable automated blood chemistry monitoring device comprising (A) a mini pump which can be, for example a peristaltic pump or syringe pump; (B) a portable form factor mechanical apparatus which preferably includes a rotatable disc with a hole which fits over the pump; (C) at least one measurement element for measuring at least one blood parameter, preferably on the disc, and preferably a series of glucose strips arranged radially in a spoke-like pattern on the disc; (D) a catheter connected to the pump via a tube; (E) a computerized device adapted to automatically measure blood analytes and blood parameters; (F) a belt adapted to hold the housing, a waste bag, and a flush solution bag; wherein the pump and disk are arranged in the housing so that a hole in a disk fits over the pump. | 0 |
DESCRIPTION OF THE INVENTION
This invention relates to and has among its objects the provision of novel apparatus for sorting particles, especially for separating rough particles from smooth particles.
Further objects of the invention will be evident from the following description taken in conjunction with the annexed drawings, wherein;
FIG. 1 is a plan view of the apparatus of the invention. In this figure parts have been broken away for purpose of illustration.
FIG. 2 is an end view, taken on planes 2--2 of FIG. 1.
FIGS. 3 and 4 are diagrams illustrating the separation action of the apparatus.
FIG. 5 is a diagrammatic side view illustrating the rotatable mounting of separator 17.
In accordance with modern bean harvesting methods, the vines are severed from their roots and subjected to threshing to separate the beans from the pods and other plant material. In this operation bits of earth enter the thresher with the vines, and the threshing operations tend to form these soil particles into clods. Sieving operations are included in the threshing operation but are only partially effective to remove the clods; those clods which are approximately the same size as the beans are not separated by sieving. Thus the end product is often contaminated with these clods, thereby causing problems in the sale and utilization of the product.
A primary object of the invention is the provision of means for solving this problem in that the apparatus of the invention readily separates the clods from the beans, even those clods which are the same size as the beans.
The apparatus of the invention operates on the principle of separating rough from smooth particles. Since earth clods are rough while beans are smooth, the apparatus is especially useful for removing clods from beans. However, it is to be emphasized that use of the apparatus of the invention is not so restricted; the invention can be employed in any situation where rough and smooth particles need to be separated. Typical applications are in separating rough particles (such as stones, earth clods, bits of woody material, etc.) from smooth particles such as beans, peas, lentils, and the like. Another application is separating broken from whole kernels. Since broken kernels have sharp edges they are readily separated from the whole kernels which have relatively smooth (curved) edges. In this connection, the apparatus may be used for separating broken kernels from whole kernels in many different kinds of products such as corn, rice, wheat, and other cereal grains; beans, peas, lentils, and other legume seeds. Further applications of the invention will be obvious to those skilled in the art from the foregoing illustrations.
The structure of the apparatus of the invention and its operation are next explained in detail, having particular reference to the separation of clods from beans. It will be understood that this application of the invention is by way of illustration and not limitation.
Referring to FIGS. 1 and 2, the apparatus includes a feeder 1 which includes a hopper 2 established between plates 3 and 4. The material to be sorted is placed in hopper 2.
A feed roller 5, preferably having a grooved rubber surface, is mounted for rotation between end members 6 and 7. Roller 5 is rotated in the indicated direction by conventional means (not illustrated) applied to pulley 8. Rotation of roller 5 causes the material to be sorted to be fed at a predetermined rate onto inclined apron 10, whereby the material moves downwardly to the separation part of the apparatus.
The separation part of the apparatus includes a frame 11 which is provided with a flat bed 12 for supporting belt 13. The upper surface of bed 12 is preferably provided with a low-friction surface--such as an adhered film of polyethylene or the like -- so that belt 13 can slide easily on bed 12.
Rotatably mounted on frame 11 are idler roller 14 and driven roller 15, the latter being rotated by conventional means (not illustrated) applied to pulley 16. Belt 13 is draped over rollers 14 and 15 and thus caused to traverse in the indicated direction. Belt 13 is usually made of textile material, for example, carpeting or other tufted textile fabric, upholstery fabric, or the like.
Mounted across the surface of belt 13 and at an angle of about 45' to the length of belt 13, are a series of separators 17 and collectors 18. In the illustrated form of the apparatus only three of each of these elements is shown. This was done merely to simplify the drawing; in practice the apparatus is equipped with many more sets of these elements since the output increases with an increasing number thereof.
Separators 17 are usually made of a soft material such as sponge rubber or polyurethane foam. These elements co-act with belt 13 to separate rough and smooth particles, in particular, by permitting the rough particles to be conveyed under them while retaining smooth particles, all as hereinafter explained in detail. Since separators 17 are of a soft and flexible nature, they are maintained in position by adhering them to support bars 19. In the preferred modification of the invention, support bars 19 are rotatably mounted so that the angle between separators 17 and belt 13 can be varied. FIG. 5 illustrates how such rotatable mounting may be achieved. Reference numeral 32 indicates a bracket mounted on frame 11. Also provided on the opposite side of the device is a similar bracket 32, not shown in the drawing. These brackets are provided with thumbscrew arrangements 33, whereby the angle of separator 17 with respect to belt 13 can be varied as desired. It is obvious that enough brackets 33 are provided so that all the separators 17 can rotate to the desired angle.
Collectors 18 (in contrast to separators 17) are constructed of metal or other rigid material of construction since they merely serve to scavenge from belt 13 the particles which pass under the separators 17.
As shown in FIGS. 3 and 4, separators 17 and collectors 18 are mounted so that their bottom surfaces touch the top surface of belt 13. It is generally preferred that separators 17 be mounted with a slight tilt as shown in FIGS. 3 and 4.
Referring again to FIGS. 1 and 2, mounted on the side opposite feeder 1 are chambers for receiving the separated particles. Thus there is provided a chamber 21 for receiving the smooth particles. When such particles are directed off belt 13 by the action of separators 17, these particles slide down sloping plates 23 into chamber 21. Also provided is chamber 22 for receiving the rough particles via openings 24.
In operation, the particles to be separated move downwardly on apron 10 which is provided with triangular deflectors 20 so that the particles are fed onto belt 13 in front (upstream) of each separator 17, these entry positions being designated as 25 in FIG. 1. Considering one allotment of particles so introduced: By the action of belt 13 the particles are brought against the face of separator 17. Since the rough particles exhibit a high coefficient of friction they are gripped by the belt and carried under separator 17. The latter is of soft material so that it can deflect to allow such passage. With continued movement of the belt these rough particles are conveyed to succeeding collector 18 which serves to scavenge them off the belt and they drop through opening 24 into chamber 22. A different action occurs with the smooth particles. When these particles are moved up to separator 17 by belt 13, they slip on belt 13 because of their low-friction (smooth) surfaces. As a result, these smooth particles remain on the upstream side of separator 17. The continued traversal of belt 13 causes these particles to be moved to the side of the apparatus, whereby they slide down apron 23 into chamber 21.
The smooth particles which are collected in chamber 21 and the rough particles which are collected in chamber 22 can be separately removed from these chambers by any suitable means such as troughs, conveyor belts, or the like (not illustrated).
The separation action in accordance with the invention is further illustrated in FIGS. 3 and 4. In particular, FIG. 3 illustrates how rough particle 30 exhibits a high degree of friction so that it is carried by belt 13 under separator 17 which yields (deforms) to permit the particle to pass thereunder. FIG. 4 illustrates how smooth particle 31 provides little friction so that it slips on belt 13 and is therefore held back by separator 17. Rough particle 30, which has passed under separator 17, is retained against collector 18 since this member is of non-yielding construction. | Device for separating rough particles from smooth ones, for example, removing earth clods from beans. The device utilizes the principle that the rough particles display a higher degree of friction than do the smooth particles. | 1 |
This is a continuation of application Ser. No. 852,795 filed on Nov. 18, 1977, now abandoned.
BACKGROUND OF THE INVENTION
High voltage transformers of the type mounted within a ventilated casing and cooled either by ambient air flow or by forced ventilation generally require relatively large physical spacings to ensure that the high voltage windings do not short circuit to the core and winding support structure. To provide adequate high voltage coil spacing a distance of from 10 to 12 inches or more is generally required at each end.
Transformers currently employing voltages less than 23 kilovolts are generally wound in a delta type arrangement. When materials, economy and overall space must be maintained at a minimum, wye connections are more feasible for voltage applications of 23 Kv and greater.
The purpose of the invention is to provide methods and apparatus for manufacturing dry type, air cooled transformers having a substantially reduced core and coil size.
SUMMARY OF THE INVENTION
Dry type air cooled transformers are manufactured by providing a plurality of layer type windings on a continuous core in a wye connection having a grounded neutral.
The multi-layer coil is arranged such that the extremities of the coil are at neutral potential and the coil center section provides the high voltage line terminals. The neutral terminals are located relative to the extremities of the vertical core dimension to provide a minimum space requirement between the ends of the coils and the transformer core and the coil support structure.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a cutaway perspective of the compact high voltage dry type transformer according to the invention;
FIG. 2 is a top perspective view of the high voltage coil and tube for use within the transformer of FIG. 1;
FIG. 3 is an enlarged sectional view of nine layers of windings arranged around the perimeter of the tube of FIG. 2;
FIG. 4 is a cross section plan view of the coil of FIG. 3 containing nine layers of windings;
FIG. 5 is a schematic representation of a method of arranging windings for the transformer of the invention with the neutral terminal coil leads proximate the core yokes;
FIG. 6 is an alternate method for arranging the windings for the transformer of the invention;
FIG. 7 is one schematic arrangement of the windings for the transformer of the invention containing two sections of windings with an odd number of layers of winding per section;
FIG. 8 is one schematic arrangement of the windings for the transformer of the invention having six sections containing an odd number of layers per section with the individual sections interconnected in a first configuration;
FIG. 9 is a schematic arrangement of the windings for the transformer of the invention having the same number of layers and sections as the embodiment of FIG. 8 with the sections interconnected by a different arrangement;
FIG. 10 is a diagrammatic representation of the winding arrangement of FIG. 5 in a wye connection.
DESCRIPTION OF THE PREFERRED EMBODIMENT
The compact dry type high voltage transformer of the invention can be seen by referring to FIG. 1 where the transformer 10 consists basically of a core 11 centrally disposed within a low voltage winding 12. A tube 13 of electrically insulating material surrounds the low voltage winding 12 and serves to support the high voltage winding generally described as 16. For the purpose of this disclosure the terms "coil" and "winding" are considered synonymous. The high voltage winding 16 consists of a plurality of layers of wire and a plurality of sections such as the first section 17, second section 18 and third section 19. Connections to each of the individual sections (17, 18, 19) are made by means of plurality of taps T. Connection to taps T is made through a pair of insulating bushings 15, 15' to external leads 14, 14'. The core 11 containing the aforementioned structure is rigidly connected to a base member 8 by means of supporting legs 9. Access to cooling air is made by providing a plurality of ventilating openings 24 in the casing 23 which provides environmental protection to the transformer 10.
For providing compact dimensions to the transformer 10 of FIG. 1, the tube 13 is wound with the high voltage winding 16 in a particular manner as can be seen by reference to FIG. 2. The high voltage winding 16 is arranged around the perimeter of tube 13 in an odd number of layers so that electrical access can be made to the winding 16 by means of tap T located at the upper extremity of tube 13. The requirement that the layers provided in an odd number can be seen by referring to FIG. 3. Here the first section 17 is shown in an enlarged sectional view where the electrical tap T is connected to a first layer 1 1 . First section 17 is to be connected to the next section 18 by interconnecting the ninth layer 1 9 of section 17 with the first layer 1 1 of section 18. The particular arrangement of odd number of layers (1 1 -1 9 ) for example is chosen to ensure that the last connecting lead is distal from the top end of tube 13. As is common with multi layer transformer windings, a plurality of layers of insulation 26 is provided between each of the individual layers to ensure adequate electrical insulation between layers.
To ensure an adequate flow of coolant between the individual layers a plurality of cooling ducts 28 is also provided as shown in FIG. 4. The cooling ducts 28 are provided in such a manner as to define a continuous path from the bottom to the top of the coil 16.
FIG. 5 shows one arrangement for providing the compact transformer winding of the invention. The arrangement of FIG. 5 has four individual section 17-20, each containing 5 layers (1 1 -1 5 ) for example, arranged so that the top terminal T 1 is proximate to the end of the low voltage winding 12, and the third terminal T 3 is proximate to the other end of the aforementioned low voltage winding 12. The arrangement of FIG. 5 represents one of three like phases for a three phase transformer or a single phase winding in the case of a single phase transformer. Between the individual sections 17-20, there is both an operating voltage stress and an impulse voltage stress. The top terminal T 1 and the bottom terminal T 3 are at neutral potential, and the center terminal T 2 is at line potential. This arrangement allows the distance between the electrically neutral ends of the high voltage transformer winding 16 to be at a minimum distance from the top and bottom core yokes 11 which are electrically grounded. Taps T 21 -T 24 are the high voltage connections for other tap voltage ratings and can be located proximate the center of the high voltage windings 16 or proximate the ends thereof.
Another arrangement for the compact transformer windings of the invention is shown in FIG. 6. The arrangement of FIG. 6 is similar to the embodiment of FIG. 5 except that the individual sections 17-20 have inside connections in contrast to the inside-outside connections of FIG. 5. Electrical connections can be made with the terminals T 1 -T 3 which are all outside whereas the end terminals T 1 and T 3 for embodiment of FIG. 1 are "outside".
Another arrangement for the windings of the compact transformer of the invention shown in FIG. 7, consists of two sections 17 and 18. The operating voltage and the impulse voltage stress between the section 17, 18, of high voltage winding 16 and the low voltage winding 12 is low. However, with this arrangement insulating collars 7 have to be provided at the ends of the outer layers 1 4 and 1 5 to permit a minimum separation distance between the ends of the high voltage winding 16 and the yokes 11. Although five layers (1 1 -1 5 ) are shown for each section 17, 18, a large number of layers (1 1 -1 n ) is generally required with this particular arrangement to keep the operating voltage stress between each of the individual layers (1 1 -1 n ) within the allowable values. As with the embodiments of FIGS. 5 and 6 the total number of layers (1 1 -1 n ) must be kept at an odd number in order to ensure that the connections between the individual sections 17, 18 are in the same direction for the reasons described earlier.
The arrangement of FIG. 8 is similar to that of FIG. 5 with the addition of two extra sections 21 and 22. The extra sections 21 and 22 reduce the operating voltage stress between the individual layers 1 1 -1 5 and improve the impulse voltage distribution but is more expensive to manufacture in view of increased labor and material costs to provide the extra sections. The individual sections 17-22, operate in a similar manner as described earlier for the individual sections 17-20. When the arrangement of FIG. 5 is used in a three-phase assembly each of the individual phases having line terminals T 2 , T 2 ', and T 2 " respectively, and neutral terminals T 1 , T 3 , T 1 ', T 3 , T 1 ", T 3 " respectively are interconnected in the wye configuration shown in FIG. 10. The individual sections in each phase being designated 17-20, 17'-20' and 17"-20".
A further winding arrangement for the compact transformer of the invention is shown in FIG. 9. The arrangement of FIG. 9 is similar to the arrangement described earlier for FIG. 6. Two extra sections 21,22 are provided to reduce the operating voltage stress between the individual layers 1 1 -1 5 and to improve the impulse voltage distribution.
The compact high voltage transformer arrangement of the invention is described for dry type transformers wherein air is provided as the coolant. This is by way of example only, since the novel winding arrangement for providing compact transformers applies equally well to other type coolants such as condensible and noncondensible gases and dielectric fluids. | A compact air cooled transformer employs multisection, multilayered high voltage coils in a wye connection to substantially reduce the spacing required between the high voltage coil and low voltage coil and between the ends of the high voltage coil and the transformer core yokes and coil support structure. | 7 |
CROSS REFERENCE TO EARLIER APPLICATION
[0001] The present application is a continuation in part of U.S. application Ser. No. 11/416,432 filed 2 May 2006, incorporated herein by reference. The present application also claims priority under 35 USC §119(e) of U.S. Provisional application No. 60/865,131 filed 9 Nov. 2006, incorporated herein by reference.
FIELD OF THE INVENTION
[0002] In one aspect, the present invention relates to an improved gasification system for preparing a mixture comprising carbon monoxide and hydrogen from a carbonaceous stream using an oxygen containing stream.
[0003] In another aspect, the present invention relates to a process to prepare a mixture comprising carbon monoxide and hydrogen in a system according to the invention.
BACKGROUND OF THE INVENTION
[0004] Methods for producing synthesis gas are well known from practice. An example of a method for producing synthesis gas is described in EP-A-400740. Generally, a carbonaceous stream such as coal, brown coal, peat, wood, coke, soot, or other gaseous, liquid or solid fuel or mixture thereof, is partially combusted in a gasification reactor using an oxygen containing gas such as substantially pure oxygen or (optionally oxygen enriched) air or the like, thereby obtaining a.o. synthesis gas (CO and H 2 ), CO 2 and a slag. The slag formed during the partial combustion drops down and is drained through an outlet located at or near the reactor bottom.
[0005] The hot product gas in the reactor of EP-A-400740 flows upwardly. This hot product gas, i.e. raw synthesis gas, usually contains sticky particles that lose their stickiness upon cooling. These sticky particles in the raw synthesis gas may cause problems downstream of the gasification reactor where the raw synthesis gas is further processed. Undesirable deposits of the sticky particles on, for example, heat exchange surfaces, walls, valves or outlets may adversely affect the process. Moreover such deposits are hard to remove. Therefore, the raw synthesis gas is quenched in a quench section. In such a quench section a quench gas is injected into the upwardly moving raw synthesis gas in order to cool it.
[0006] WO-A-2004/005438 describes a gasification system comprising a gasification reactor and a synthesis gas cooling vessel. This publication describes a gasification combustion chamber and a tubular part fluidly connected to an open upper end of said combustion chamber. Both combustion chamber and tubular part are located in a pressure shell defining an annular space between said pressure shell and the combustion chamber and tubular part respectively. In the tubular part a quench gas is injected into the hot synthesis gas. This publication also describes a separate cooling vessel provided with three banks of heat exchange surfaces located one above the other.
[0007] U.S. Pat. No. 5,803,937 describes a gasification reactor and a syngas cooler within one pressure vessel. In this reactor a tubular part is fluidly connected to an open upper end of a combustion chamber. At the upper end of the tubular part the gas is deflected 180° to flow downwardly through the annular space between the tubular part and the wall of the pressure shell. In said annular space heat exchanging surfaces are present to cool the hot gas.
[0008] U.S. Pat. No. 4,836,146 describes a gasification system for a solid particulate comprising a gasification reactor and a synthesis gas cooling vessel as in WO-A-2004/005438. In this publication a method and apparatus described for controlling rapping of the heat exchange surfaces as present in the separate cooling vessel. Rapping is required to prevent deposits from accumulating on the surfaces of the heat exchangers.
[0009] The afore discussed gasification reactors have in common that the synthesis gas as produced flows substantially upwards and the slag flows substantially downwards relative to the gasification burners as present in said reactors. Thus, all these reactors have an outlet for slag, which is separate from the outlet for synthesis gas. This in contrast to a class of gasification reactors as for example described in EP-A-926441 where both slag and synthesis gas flow downwardly and wherein both the outlet for slag and synthesis gas are located at the lower end of the reactor.
[0010] The present invention is directed to an improved reactor of the type where slag flows downwardly and is discharged at the bottom end of the reactor and wherein synthesis gas flows upwardly and is discharged at the upper end of said reactor.
[0011] A problem with the syngas cooler of WO-A-2004/005438 and U.S. Pat. No. 4,836,146 and also with the apparatus of U.S. Pat. No. 5,803,937 is that the heat exchanging surfaces introduce a large complexity to the design of said apparatuses. Furthermore, extensive measures like rapping are required to avoid deposits on the heat exchanger surfaces. Another problem is that the heat exchanging surfaces are even more vulnerable to fouling from feedstocks with for instance a high alkaline content. There is thus a desire to process high alkaline feedstocks as well as a desire to provide more simple gasification systems. These and other objects are achieved with the reactor as described below.
SUMMARY OF THE INVENTION
[0012] In one aspect, the invention provides a gasification system comprising a gasification reactor and a synthesis gas cooling vessel.
[0013] In this gasification system, the gasification reactor comprises:
[0014] a pressure shell for maintaining a pressure higher than atmospheric pressure;
[0015] a slag bath located in a lower part of the pressure shell;
[0016] a gasifier wall arranged inside the pressure shell defining a gasification chamber wherein during operation the synthesis gas can be formed, a lower open part of the gasifier wall which is in fluid communication with the slag bath and an open upper end of the gasifier wall which is in fluid communication with the synthesis gas cooling vessel via a connecting conduit;
[0017] In this gasification system, the synthesis gas cooling vessel comprises an inlet for hot synthesis gas; an outlet for cooled synthesis gas; and means to directly contact liquid water with the hot synthesis gas as formed in the gasification reactor when in use.
[0018] Applicants found that, by using such a gasification system, the use of complicated heat exchange surfaces could be avoided. A further advantage is that high alkaline feedstocks can be more easily processed. Other advantages and preferred embodiments will be discussed hereafter.
[0019] The invention also provides a process of preparing a mixture comprising carbon monoxide and hydrogen by partial oxidation of a solid carbonaceous feed in the gasification system according to the invention. In the gasification chamber the solid carbonaceous feed is partially oxidized with an oxygen comprising gas to form an upwardly moving gas mixture having a temperature of between 1200 and 1800° C., preferably between 1400 and 1800° C., and a pressure of between 20 and 100 bar, cooling said gas mixture in the connecting conduit to a temperature of between 500 and 900° C. by injecting a gaseous or liquid cooling medium and subsequently further cooling the gas in the synthesis gas cooling vessel to below 500° C. by contacting the gas with water.
[0020] It has been found that the raw synthesis gas is cooled very efficiently, as a result of which the risk of deposits of sticky particles downstream of the gasification reactor is reduced.
[0021] The invention will now be described by way of example in more detail, with reference to the accompanying non-limiting drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
[0022] In the accompanying drawings:
[0023] FIG. 1 schematically shows a process scheme for a system for preparing a purified mixture comprising carbon monoxide and hydrogen;
[0024] FIG. 2 schematically shows a longitudinal cross-section of a preferred gasification system comprising a reactor vessel and a cooling vessel;
[0025] FIG. 3 schematically shows a possible further embodiment for the cooling vessel; and
[0026] FIG. 4 schematically shows a more detailed longitudinal cross section of a gasification reactor.
[0027] The same reference numbers are used below to refer to similar structural elements.
DETAILED DESCRIPTION OF THE INVENTION
[0028] Disclosed is an improved gasification system for preparing a synthesis gas comprising CO, CO 2 and H 2 , from a carbonaceous stream using an oxygen containing stream.
[0029] The gasification reactor according to the present invention is suitably used to prepare a mixture comprising carbon monoxide and hydrogen by partial oxidation of a solid carbonaceous feed in a gasification reactor according to the present invention or in a system according to the present invention. In such a process a solid carbonaceous feed is partially oxidized in the gasification chamber with an oxygen comprising gas to form an upwardly moving gas mixture having a temperature of between 1200 and 1800° C., preferably between 1400 and 1800° C. This mixture is preferably cooled, in a first cooling step. In a separate cooling vessel the gas is further cooled to preferably below 500° C.
[0030] The solid carbonaceous feed is partially oxidized with an oxygen comprising gas. Preferred carbonaceous feeds are solid, high carbon containing feedstocks, more preferably it is substantially (i.e. >90 wt. %) comprised of naturally occurring coal or synthetic (petroleum)cokes, most preferably coal. Suitable coals include lignite, bituminous coal, sub-bituminous coal, anthracite coal, and brown coal.
[0031] In general, this so-called gasification is carried out by partially combusting the carbonaceous feed with a limited volume of oxygen at an elevated temperature in the absence of a catalyst. In order to achieve a more rapid and complete gasification, initial pulverisation of the coal is preferred to form fine coal particulates. The term fine particulates is intended to include at least pulverized particulates having a particle size distribution so that at least about 90% by weight of the material is less than 90 μm and moisture content is typically between 2 and 8% by weight, and preferably less than about 5% by weight.
[0032] The gasification is preferably carried out in the presence of oxygen and optionally some steam, the purity of the oxygen preferably being at least 90% by volume, nitrogen, carbon dioxide and argon being permissible as impurities. Substantially pure oxygen is preferred, such as prepared by an air separation unit (ASU). The gas may contain some steam. Steam acts as moderator gas in the gasification reaction. The ratio between oxygen and steam is preferably from 0 to 0.3 parts by volume of steam per part by volume of oxygen. The oxygen used is preferably heated before being contacted with the coal, preferably to a temperature of from about 200 to 500° C.
[0033] If the water content of the carbonaceous feed, as can be the case when coal is used, is too high, the feed is preferably dried before use.
[0034] The partial oxidation reaction is preferably performed by combustion of a dry mixture of fine particulates of the carbonaceous feed and a carrier gas with oxygen in a suitable burner as present in the gasification chamber of the reactor according to the invention. Examples of suitable burners are described in U.S. Pat. No. 4,887,962, U.S. Pat. No. 4,523,529 and U.S. Pat. No. 4,510,874. The gasification chamber is preferably provided with one or more pairs of partial oxidation burners, wherein said burners are provided with supply means for a solid carbonaceous feed and supply means for oxygen. With a pair of burners is here meant two burners, which are directed horizontal and diametric into the gasification chamber. This results in a pair of two burners in a substantially opposite direction at the same horizontal position. The reactor may be provided with 1 to 5 of such pairs of burners. The upper limit of the number of pairs will depend on the size of the reactor. The firing direction of the burners may be slightly tangential as for example described in EP-A-400740.
[0035] Examples of suitable carrier gasses to transport the dry and solid feed to the burners are steam, nitrogen, synthesis gas and carbon dioxide. Preferably nitrogen is used when the synthesis gas is used for power generation and as feedstock to make ammonia. Carbon dioxide is preferably used when the synthesis gas is subjected to downstream shift reactions. The shifted synthesis gas may for example be used to prepare hydrogen, methanol and/or dimethyl ether or as feed gas of a Fischer-Tropsch synthesis.
[0036] The synthesis gas discharged from the gasification reactor comprises at least H 2 , CO, and CO 2 . The suitability of the synthesis gas composition for especially the methanol forming reaction is expressed as the stoichiometric number SN of the synthesis gas, whereby expressed in the molar contents [H 2 ], [CO], and [CO 2 ], SN═([H 2 ]−[CO 2 ])/([CO]+[CO 2 ]). It has been found that the stoichiometric number of the synthesis gas produced by gasification of the carbonaceous feed is lower than the desired ratio of about 2.05 for forming methanol in the methanol forming reaction. By performing a water shift reaction and separating part of the carbon dioxide the SN number can be improved. Preferably hydrogen separated from methanol synthesis offgas can be added to the synthesis gas to increase the SN.
[0037] In one embodiment of the present invention the hot synthesis gas is first cooled in a first cooling step to a temperature of between 500 and 900° C. before it enters the separate cooling vessel. This first cooling step is preferred to achieve a gas temperature below the solidification temperature of the non-gaseous components present in the hot synthesis gas. The solidification temperature of the non-gaseous components in the hot synthesis gas will depend on the carbonaceous feed and is usually between 600 and 1200° C. and more especially between 500 and 1000° C., for coal type feedstocks. The first cooling step is preferably performed in the connecting conduit that fluidly connects the gasification chamber and the cooling vessel. Cooling may be performed by injecting a quench gas. Cooling with a gas quench is well known and described in for example EP-A-416242, EP-A-662506 and WO-A-2004/005438. Examples of suitable quench gases are recycle synthesis gas and steam.
[0038] More preferably this first cooling and/or the cooling performed in the cooling vessel is performed by injecting a mist of liquid droplets into the gas flow as will be described in more detail below. The use of the liquid mist as compared to a gas quench is advantageous because of the larger cooling capacity of the mist.
[0039] The liquid may be any liquid having a suitable viscosity in order to be atomized. Non-limiting examples of the liquid to be injected are a hydrocarbon liquid, a waste stream etc. Preferably the liquid comprises at least 50% water. Most preferably the liquid is substantially comprised of water (i.e. >95 vol %). In a preferred embodiment the wastewater, also referred to as black water, as obtained in a possible downstream synthesis gas scrubber is used as the liquid. Even more preferably, the process condensate of an optional downstream water shift reactor is used as the liquid.
[0040] With the term hot synthesis gas is meant the gas mixture as directly obtained in the gasification chamber.
[0041] With the term ‘mist’ is meant that the liquid is injected in the form of small droplets. If water is to be used as the liquid, then preferably more than 80%, more preferably more than 90%, of the water is in the liquid state.
[0042] Preferably the injected mist has a temperature of at most 50° C. below the bubble point at the prevailing pressure conditions at the point of injection, particularly at most 15° C., even more preferably at most 10° C. below the bubble point. To this end, if the injected liquid is water, it usually has a temperature of above 90° C., preferably above 150° C., more preferably from 200° C. to 230° C. The temperature will obviously depend on the operating pressure of the gasification reactor, i.e. the pressure of the raw synthesis gas specified further below. Hereby a rapid vaporization of the injected mist is obtained, while cold spots are avoided. As a result the risk of ammonium chloride deposits and local attraction of ashes in the gasification reactor is reduced.
[0043] Further it is preferred that the mist comprises droplets having a diameter of from 50 to 200 μm, preferably from 100 to 150 μm. Preferably, at least 80 vol. % of the injected liquid is in the form of droplets having the indicated sizes.
[0044] To enhance quenching of the hot synthesis gas, the mist is preferably injected with a velocity of 30-90 m/s, preferably 40-60 m/s.
[0045] Also it is preferred that the mist is injected with an injection pressure of at least 10 bar above the pressure of the raw synthesis gas as present in the gasification reactor, preferably from 20 to 60 bar, more preferably about 40 bar, above the pressure of the raw synthesis gas. If the mist is injected with an injection pressure of below 10 bar above the pressure of the raw synthesis gas, the droplets of the mist may become too large. The latter may be at least partially offset by using an atomization gas, which may e.g. be N 2 , CO 2 , steam or synthesis gas, more preferably steam or synthesis gas. Using atomization gas has the additional advantage that the difference between injection pressure and the pressure of the raw synthesis gas may be reduced to a pressure difference of between 5 and 20 bar.
[0046] Further it has been found especially suitable when the mist is injected in a direction away from the gasification reactor, or said otherwise when the mist is injected in the flow direction of the raw synthesis gas, more preferably under an angle. Hereby no or less dead spaces occur which might result in local deposits on the wall of the connecting conduit. Preferably the mist is injected from the wall of the connecting conduit or from the wall of the cooling vessel in the direction of the flow of hot synthesis gas and under an angle of between 30-60°, more preferably about 45°, with respect to a plane perpendicular to the longitudinal axis of the connecting conduit or cooling vessel. Alternatively the injection of the mist in the cooling vessel may be performed by injecting the mist in the same, suitably downwardly, direction as the flow path of the synthesis gas.
[0047] According to a further preferred embodiment, the injected mist is at least partially surrounded by a shielding fluid. Herewith the risk of forming local deposits is reduced. The shielding fluid may be any suitable fluid, but is preferably selected from the group consisting of an inert gas such as N 2 and CO 2 , synthesis gas, steam and a combination thereof.
[0048] According to an especially preferred embodiment, the amount of injected mist is selected such that the raw synthesis gas leaving the cooling vessel comprises at least 40 vol. % H 2 O, preferably from 40 to 60 vol. % H 2 O, more preferably from 45 to 55 vol. % H 2 O.
[0049] In another preferred embodiment the amount of water added relative to the raw synthesis gas is even higher than the preferred ranges above if one chooses to perform a so-called overquench. In an overquench type process the amount of water added, preferably the amount added in the cooling vessel, is such that not all liquid water will evaporate and some liquid water will remain in the cooled raw synthesis gas. Such a process is advantageous because a downstream dry solid removal system can be omitted. In such a process the raw synthesis gas leaving the cooling vessel is saturated with water. The weight ratio of the raw synthesis gas and water injection can be 1:1 to 1:4.
[0050] Overquench type process conditions may be achieved by injecting a large amount of water into the flow path of the synthesis gas, by passing the flow of synthesis gas through a water bath positioned at the lower end of the cooling vessel or combinations of these measures.
[0051] It has been found that herewith the capital costs can be substantially lowered, as no further or significantly less addition of steam in an optional downstream water shift conversion step is necessary. With capital costs is here meant the capital costs for steam boilers.
[0052] In a preferred method of the present invention, the synthesis gas or a part thereof, and especially the synthesis gas as saturated with water, leaving the quenching section is preferably shift converted whereby at least a part of the water is reacted with CO to produce CO 2 and H 2 thereby obtaining a shift converted synthesis gas stream. As the person skilled in the art will readily understand what is meant with a shift converter, this is not further discussed. Preferably, before shift converting the raw synthesis gas, the raw synthesis gas is heated in a heat exchanger against the shift converted synthesis gas stream. Herewith the energy consumption of the method is further reduced. In this respect it is also preferred that the liquid is heated before using the liquid injecting it as a mist in the process of the present invention. Preferably heating of this liquid is performed by indirect heat exchange against the shift converted synthesis gas stream.
[0053] Any desired molar ratio of H 2 /CO may be obtained by subjecting one part of the synthesis gas to a water shift reaction obtaining a CO depleted stream and by-passing the water shift unit with another part of the synthesis gas and combining the CO depleted stream and the by-pass stream. By choosing the ratio of by-pass and shift feed one may achieve most desired ratios for the preferred downstream processes.
[0054] Reference is made to FIG. 1 . FIG. 1 schematically shows a system 1 for producing synthesis gas. In a gasification reactor a carbonaceous stream and an oxygen-containing stream may be fed via lines 3 , 4 , respectively to a gasification chamber 2 . In gasification chamber 2 a raw synthesis gas and a slag is obtained. To this end usually several burners (not shown) are present in the gasification chamber 2 . Usually, the partial oxidation in the gasification chamber 2 is carried out at a temperature in the range from 1200 to 1800° C., preferably between 1400 and 1800° C., and at a pressure in the range from 1 to 200 bar, preferably between 20 and 100 bar, more preferably between 40 and 70 bar.
[0055] The produced raw synthesis gas is fed via a connecting conduit 5 to a cooling vessel 9 . Water 17 is injected in the form of a mist in connecting conduit 5 , wherein the synthesis gas is cooled to below 500° C., for example to about 400° C.
[0056] The ash components as are present in most of the preferred feeds will form a so-called liquid slag in gasification chamber 2 at these temperatures. The slag will preferably form a layer on the inner side of the wall of gasification chamber 2 , thereby creating an isolation layer. The temperature conditions are so chosen that the slag will create on one hand such a protective layer and on the other hand will still be able to flow to a lower positioned slag outlet 7 for optional further processing.
[0057] As shown in the embodiment of FIG. 1 , the partly cooled synthesis gas 8 enters a cooling vessel 9 . In cooling vessel 9 the synthesis gas 8 is contacted with an amount of water 6 in an overquench process mode to obtain a water saturated synthesis gas 10 .
[0058] Water saturated synthesis gas 10 is directly fed to a wet gas scrubber 11 and subsequently via line 12 to a shift converter 13 to react at least a part of the water with CO to produce CO 2 and H 2 , thereby obtaining a shift converted gas stream in line 14 . Part of the scrubbed gas 24 may by-pass the shift converter 13 . This gas and stream 20 may be combined, optionally after both streams have been subjected to a further gas treating (not shown). As the wet gas scrubber 11 and shift converter 13 are already known per se, they are not further discussed here in detail. Waste water from gas scrubber 11 is removed via line 22 and optionally partly recycled to the gas scrubber 11 via line 23 . Part of the wastewater, black water, from gas scrubber 11 may be preferably used as liquid water as injected via line 17 or 6 . In a non-overquench mode the synthesis gas 10 is suitably fed to a dry-solids removal unit to at least partially remove dry ash. Preferred solids removal units are cyclones or filter units as for example described in EP-A-551951 and EP-A-1499418.
[0059] Further improvements are achieved when the raw synthesis gas in line 12 is heated in a heat exchanger 15 against the shift converted synthesis gas in line 14 that is leaving the shift converter 13 .
[0060] Further it is preferred according to the present invention that energy contained in the stream of line 16 leaving heat exchanger 15 is used to warm up the water in line 17 prior to be used in a first or second cooling step. To this end, the stream in line 16 may be fed to an indirect heat exchanger 19 , for indirect heat exchange with the stream in line 17 .
[0061] As shown in the embodiment in FIG. 1 , the stream in line 14 is first fed to the heat exchanger 15 before entering the indirect heat exchanger 19 via line 16 . However, the person skilled in the art will readily understand that the heat exchanger 15 may be dispensed with, if desired, or that the stream in line 14 is first fed to the indirect heat exchanger 19 before heat exchanging in heat exchanger 15 .
[0062] The CO depleted synthesis gas leaving the indirect heat exchanger 19 in line 20 may be further processed, if desired, for further heat recovery and gas treatment.
[0063] If desired the heated stream in line 17 may also be partly used as a feed (line 21 ) to the gas scrubber 11 .
[0064] FIG. 2 shows a longitudinal cross-section of a gasification system, which may be part of the system 1 of FIG. 1 . FIG. 2 shows the gasification reactor 43 of FIG. 1 of WO-A-2004/005438 in combination with a downstream cooling vessel or quench vessel 44 fluidly connected by a connecting conduit, i.e. transfer duct 45 . Shown in FIG. 2 is the gasification chamber 47 , which is connected to a tubular part 51 , which connects, by means of a connecting conduit, gasification chamber 47 via an upper wall part 52 to the interior of cooling vessel 44 . At the lower end of the tubular part 51 injecting means 48 are present for injecting a liquid or gaseous cooling medium. Cooling vessel 44 is further provided with an outlet 49 for cooled synthesis gas.
[0065] The system of FIG. 2 differs from the system disclosed in FIG. 1 of WO-A-2004/005438 in that the cooling vessel 3 of said FIG. 1 is omitted and replaced by a simple vessel comprising means 46 to add liquid water. A further difference is that injecting means 48 may be suited for injecting a mist of liquid water.
[0066] Preferably the wall of the gasification chamber 43 and/or the wall of the connecting conduit 51 are provided with cooling means. Preferably the cooling means are an arrangement of water-cooled tubes, more preferably in the form of a membrane wall.
[0067] FIG. 2 also shows a burner 50 . The burner configuration may suitably be as described in EP-A-0400740, which reference is hereby incorporated by reference. The various other details of the gasification reactor 43 and the transfer duct 45 as well as the upper design of the cooling vessel 44 are preferably as disclosed for the apparatus of FIG. 1 of WO-A-2004/005438.
[0068] The embodiment of FIG. 2 is preferred when retrofitting existing gasification reactors by replacing the syngas cooler of the prior art publications with a cooling vessel 44 or when one wishes to adopt the process of the present invention while maintaining the actual gasification reactor of the prior art.
[0069] The invention is thus preferably directed to a system, wherein the inlet for receiving hot synthesis gas of the cooling vessel is at its upper end and the outlet for cooled synthesis gas is at its lower end, such that in use, a substantially downwardly directed flow path of synthesis gas will result and wherein in the flow path downwardly directed injecting means are present, said injecting means suited to inject a mist of water.
[0070] FIG. 3 shows the upper end of gasification reactor 43 and the upper end of gasification chamber 47 . This upper end is fluidly connected by means of connecting conduit 51 to separate cooling vessel 53 . Injecting means 48 are present to inject a gaseous or liquid quenching medium in accordance with the process of the present invention.
[0071] In cooling vessel 53 a dip tube 54 is present to create a downwardly directed flow path for synthesis gas. At the upper end of the dip-tube 54 injecting means 46 are present to inject a mist of liquid water into the synthesis gas. The dip-tube is partly submerged in a water bath 55 . In use the synthesis gas will flow through water bath 55 to an annular space 56 as present between dip-tube 54 and the wall of the cooling vessel 53 . From said annular space 56 the water saturated synthesis gas is discharged from said cooling vessel via conduit 57 .
[0072] FIG. 3 also shows a pump 58 to recirculate water 59 , providing a bleed stream 60 and a supply stream 61 for fresh water.
[0073] The invention is thus also directed to a system, wherein the synthesis gas cooling vessel has an opening for receiving hot synthesis gas at its upper end and an outlet for cooled synthesis gas defining a flow path for synthesis gas there between, and wherein a water bath is present in the flow path of the synthesis gas.
[0074] More preferably the invention is directed to a system, wherein in the connecting conduit injecting means are present for injecting a liquid or gaseous cooling medium into the synthesis gas. Even more preferably wherein the injecting means are injecting means for injecting a liquid cooling medium in the form of a mist of water droplets.
[0075] FIG. 4 shows a more detailed longitudinal cross-section of a gasification reactor 2 used in the system 1 of FIG. 1 . The gasification reactor 2 has an inlet 3 for a carbonaceous stream and an inlet 4 for an oxygen containing gas.
[0076] One or several burners (schematically denoted at 26 ) are present in the gasification reactor 2 for performing the partial oxidation reaction. For reasons of simplicity, two burners 26 are shown here but a different number may be provided.
[0077] Further, the gasification reactor 2 comprises an outlet 25 for removing the slag formed during the partial oxidation reaction via line 7 .
[0078] Also, the gasification reactor 2 comprises an outlet 27 for the raw synthesis gas produced, which outlet 27 is connected with the connecting conduit 5 . The skilled person will readily understand that between the outlet 27 and the connecting conduit, some additional tubing may be present. However, usually the connecting conduit 5 is directly connected to the gasification reactor 2 , as shown in FIG. 4 .
[0079] The connecting conduit 5 comprises a first injector 28 that is adapted for injecting a water containing stream in the form of a mist in a quenching section of connecting conduit 5 . The first injector 28 is connected to line 17 . The person skilled in the art will readily understand how to select the first injector to obtain the desired mist. Also more than one first injector may be present.
[0080] The first injector injects the mist in a direction away from the gasification reactor, usually in a partially upward direction. As shown in FIG. 4 , the first injector in use injects the mist in a direction away from the outlet 27 of the gasification reactor 2 . To this end the centre line X of the mist injected by the first injector 28 forms an angle α of between 30-60°, preferably about 45°, with respect to the plane A-A perpendicular to the longitudinal axis B-B of the quenching section in connecting conduit 5 .
[0081] As shown in the embodiment of FIG. 4 , the quenching section may further comprise a second injector 29 adapted for injecting a shielding fluid at least partially surrounding the mist injected by the at least one first injector 28 . The second injector 29 is connected via line 30 to a source of shielding gas.
[0082] Also in this case the person skilled in the art will readily understand how to adapt the second injector to achieve the desired effect. For instance, the nozzle of the first injector may be partly surrounded by the nozzle of the second injector. As shown in the embodiment of FIG. 4 the first injector 28 is to this end partly surrounded by second injector 29 .
[0083] The quenching section of connecting conduit 5 , wherein the liquid mist is injected, may be situated above, below or next to the gasification reactor, provided that it is downstream of the gasification reactor 2 . Preferably the quenching section of connecting conduit 5 is placed above the gasification reactor 2 ; to this end the outlet of the gasification reactor 2 may be placed at the top of the gasification reactor.
[0084] The person skilled in the art will readily understand that the present invention may be modified in various ways without departing from the scope as defined in the claims. Features in each claim may be combined with features of any other claim. | A gasification system that comprises a gasification reactor and a synthesis gas cooling vessel, and its use. The gasification reactor comprises a pressure shell for maintaining a pressure higher than atmospheric pressure; a slag bath located in a lower part of the pressure shell; and a gasifier wall arranged inside the pressure shell. The gasifier wall defines a gasification chamber wherein during operation the synthesis gas can be formed, a lower open part of the gasifier wall which is in fluid communication with the slag bath and an open upper end of the gasifier wall which is in fluid communication with the synthesis gas cooling vessel via a connecting conduit. The synthesis gas cooling vessel comprises an inlet for hot synthesis gas; an outlet for cooled synthesis gas; and means to directly contact liquid water with the hot synthesis gas as formed in the gasification reactor in use. | 2 |
BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention relates to the field of products manufactured from fiber-reinforced elastomeric resin, particularly to techniques for fabricating such products, especially rotor blades formed in one cycle at elevated temperature and pressure.
2. Description of the Prior Art
Conventional helicopter rotor blades, fabricated of composite materials having fiber-reinforced elastomeric resin, require multiple cure cycles at elevated temperature and pressure lasting several hours in order to form the shape of the components of the blade assembly. During these cure cycles, the resin of the composite material polymerizes to optimal structural stiffness and strength, provided temperature is controlled and varied over the length of the cycle in accordance with a defined schedule usually set by the manufacturer's specifications. Positive pressure applied to the material helps to force air from the components to ambient atmosphere outside the tool in which the components are formed.
This technique requires carefully sizing many laminae of composite material in a precured condition cut from raw stock to precise dimensions. Each component requires a molding tool, into which precured laminae are placed, sealed by a plastic bag enveloping the tool, and pressurized during the cure cycle. Usually the components are cured in an autoclave or large furnace having a sealed chamber whose pressure is increased in order to induce air to escape the laminae during the cure cycle. This process requires careful control of temperature and pressure to the requirements of the cure cycle. Typically temperature is raised to 250 degrees F and pressure to 85 psi.
U.S. Pat. No. 4,095,322 describes a rotor blade fabricated from composite material of fiber-reinforced resin. The method of fabrication requires several cure cycles at high temperature and pressure to form individual components and a final cure cycle during which the components are held in position and bonded to form an assembly. The structure of the rotor blade and aft fairing, a subassembly of the blade assembly, described in U.S. Pat. No. 4,316,701 are compatible with the fabrication method of the '322 patent.
However, various resins and bonds produced by different manufacturers require different cure cycle conditions to satisfy manufacturer's specifications and to realize optimal structural properties. A fabricator using diverse materials must carefully control operation of the autoclave so that products being cured and/or bonded there are compatible with the temperature cycle being used.
A rotor blade fabricated in the conventional way includes a leading edge shell forming the nose or leading edge of the airfoil and root end areas, and a heel channel forming the rear closure of the spar. Each of these components requires a separate cure and molding tool to produce acceptable dimensional tolerance control and physical properties. After these components are fabricated, they are bonded to other components to form subassemblies, which are subsequently placed in a molding tool or fixture and bonded to other subassemblies while other components are being cured.
For example, the spar heel channel is bonded to the forward face of a formed honeycomb core to produce one subassembly. The spar packs are bonded to the leading edge shell to produce a subassembly comprising the forward portion of the airfoil contour. Thereafter, the spar-leading edge subassembly is bonded to the heel-core subassembly to form the major portion of the blade, exclusive of the trailing edge. A trailing edge block is fabricated separately and then bonded to the rearward edge of the core, or formed and bonded integrally with the core in a single cure cycle.
Time, complexity and cost to produce rotor blades using multiple cure and bonding cycles are prohibitive.
SUMMARY OF THE INVENTION
The principal structural components of a rotor blade according to the present invention are made of fiber-reinforced composite material. These components include a spar, fairing skins, spar wraps, splices and doublers cut as lamina from raw stock into flat sheets in the precured condition. Each lamina of the requisite dimensions is laid upon other such lamina of the component in sufficient number until the desired thickness dimension of the component being fabricated is produced. During the process of laying-up the laminae sequentially, the material and direction of the reinforcing fibers can be varied intentionally among the components and within a particular component so that the finished product has the structural properties associated with the intended fiber direction.
A noseblock and a trailing edge block are precompacted to drive air from the composite and to form the desired shapes and sizes of these members in the precured condition.
A core of honeycomb, formed by passing a rotating drum of abrasive material across the core, is prepared using forming templates having the contour of the trailing portion of an airfoil.
Molding tools, one tool having the contour of the upper blade surface and another tool having the contour of the lower blade surface, each tool adapted for assembly together so that their inner surfaces envelop the outer blade surface, are formed and adapted to receive the components of the blade therein.
The uncured components are placed in the proper order and position in one molding tool, the other tool is placed over the first tool, and the unit is sealed. Preferably the tool having the upper blade contour is placed on a worktable with its inner surface facing upward. The upper fairing skins and the noseblock are placed in the tool. A member, comprising a mandrel of styrofoam extending the length of the blade and supporting a flexible sealed rubber bag, has certain components applied to the outer surface of the bag. The upper spar pack, upper spar wraps, a leading edge splice and heel splice are placed on the bag before it is located within the tool. Then the bag and mandrel, with certain components located on the bag, are placed in the tool. The lower spar packs and lower spar wraps are placed over the lower surface of the bag. The forward edges of the upper and lower spar wraps are draped over the noseblock and the rearward edges of the spar wraps are brought into abutting contact at the heel of the spar.
The formed core, covered with adhesive sheet and a layer of foam adhesive at its forward face, is placed in the tool behind the spar heel. The precompacted trailing edge block is placed behind the core and covered with filler strips that overlap the fairing skins. Suitable strips of foam bond are located over the spar Packs below the skins to fill space otherwise Potentially vacant and to support a local area of the skins above the foam. The lower fairing skins are then placed over the contents of the tool, and the portion of the molding tool having the lower blade contour is placed over the lower skins and pressed downward against stop surfaces to a predetermined position relative to the tool portion that contains the blade components.
The stiffened flexible bag, located in the tool between upper and lower spar packs, is pressurized. Heated oil passing through plates adjacent the tool heats the tool and its contents to the required temperature. The temperature of the assembly is raised and controlled variably in accordance with a cure cycle that polymerizes the composite and bonds the components. After the tool and cured blade cool sufficiently, the fabricated blade is removed from the tool, selvage strips are removed from the leading edge and excess resin clinging to the blade surface is removed.
A rotor blade manufactured by the method of this invention requires substantially fewer tools, includes fewer parts, and is fabricated in less time and at lower cost than with conventional techniques. The components of the assembly are bonded mutually and formed to shape concurrently during one cure cycle; consequently, multiple curing cycles of components and bonding cycles to form subassemblies are eliminated. The product that results is structurally sound, dimensionally accurate, and of high quality.
BRIEF DESCRIPTION OF THE DRAWING
The invention is described in more detail with reference to the embodiments illustrated in the following drawings.
FIG. 1 is an isometric illustration of a rotor blade viewed from above its upper surface from the root toward the tip.
FIG. 2 is a cross section of a rotor blade made from fiber-reinforced composite material by the techniques of this invention.
FIG. 3 is a cross section of a rotor blade located in two molding tool portions, whose inner surfaces have the size and contour of the surface of the rotor blade when the tool portions are positioned as shown during the cure cycle.
FIG. 4 is an isometric view at a spanwise cross section showing a representative length of the components of a rotor blade according to this invention, each component spaced in elevation and chordwise from adjacent components, a transverse edge of each component located spanwise at the plane where the section is taken.
DESCRIPTION OF THE PREFERRED EMBODIMENT
Referring first to FIG. 1, the rotor blade 10 includes a root end 12 adapted for attachment to supporting structure in the form of a metal fitting 14, an airfoil portion 16 extending to the tip 18, and a transition portion 20 located between the root and airfoil. Fitting 14 has upper and lower arms 22, 24 overlapping outer surfaces of the root, each arm having bolt holes aligned with corresponding holes drilled through the blade after fabrication. A bolted mechanical connection is made at each bolt hole between the root and fitting. The fitting extends radially inward from the end of the blade to a rotor hub connection that prevents translations of the blade relative to the rotor hub but permits flapwise and chordwise flexure and torsional displacement. The hub includes bearings, partially spherical in form and made of alternating shims of elastomer and metal, the bearings defining three mutually perpendicular axes about which the blade is supported to permit the flexural and torsional displacements.
The portion of the blade length that extends from the outer end of the root to the tip is an airfoil designed to produce aerodynamic lift as the ambient airstream passes over the blade surface. FIG. 2 shows that the upper surface is substantially coutoured and cambered, the leading edge 28 is drooped in relation to the mean chord line, and the lower surface 30 is contoured but flat relative to the upper surface. The span of the blade is large relative to its other dimensions: the width or chord may be 20-36 inches, the span or length may be 300-360 inches, and the airfoil thickness or depth may be 1.5-3.5 inches.
The main structural member is a spar comprising an upper spar pack 32 and a lower spar pack 34, each pack extending spanwise from root to tip and chordwise from the vicinity of the leading edge to approximately one-third of the blade width. The reinforcing fibers of the spar, principally fiber glass and a smaller volume of graphite, are substantially unidirectional and directed along the span. The thickness of the spar packs increases along the span from tip to root and tapers chordwise at the forward and rearward edges.
The airfoil portion 16 includes a fairing 36 extending spanwise from the radially inner end of the transition portion to the tip, and chordwise from the spar heel to a trailing edge block 38. Aerodynamic lift, developed across the chord of the airfoil, is carried as a shear load by a fairing core 40 made of Nomex honeycomb, the cells of which are hexagagonal in cross section having an axis directed substantially perpendicular to the mean chord line, located midway between the upper and lower contours of the fairing. This honeycomb core, manufactured commercially by Hexcell Corporation, is of thin-walled plastic supplied in the form of a compact monolithic rectangular block, in which the cells are not formed, but instead are folded into thin sheets stacked on edge side-by-side. The core is expanded by application of tension force directed spanwise and chordwise until the cells are hexagonal and dimensionally accurate. The core is expanded first to the correct cell size and shape so that it extends spanwise the distance from root to tip and chordwise the distance from the spar heel to the trailing edge. Then the contour of the core is formed by abrasion material, such as sandpaper, rotating on a drum moving across the honeycomb core guided by contour templates. Alternatively, while in block form, the contour of the fairing is formed to shape and size and then the core is expanded. With either forming technique, the depth of the core contour is formed slightly smaller than the depth of fairing, so that the thicknesses of the fairing skins and adhesive sheet between the skins and core is accommodated in the molding tools. When the tools are closed, some pressure between the tool and fairing skins helps to perfect the cure of the fairing skins and assures adequate wetting of the core by the adhesive to bond the skins to the core.
In cross section, trailing edge block 38 is a wedge located behind the core extending from the transition portion to the tip. The reinforcing fibers of the trailing edge block are directed spanwise and may include fibers having a higher modulus of elasticity, such as graphite or boron, than other reinforcing fibers of the blade so that blade chordwise bending stiffness is sufficiently large to satisfy the dynamic requirements of the rotor system.
Structural continuity across the butt joint between the trailing edge block 38 and honeycomb core 40 is enhanced by upper and lower trailing edge filler strips 42, 44, which extend chordwise from a front edge that overlaps the core to a back edge that overlaps the fairing skins. The reinforcing fibers of strips 42, 44 are generally cross plies of laminates directed at positive and negative angles of 45 degrees with respect to the longitudinal axis of the blade, the proportion being nearly equally divided between the two angular directions. Alternatively, one-half of the fibers are directed parallel to the longitudinal axis of the blade and one-half are directed transversely thereto.
A sheet of unpolymerized epoxy adhesive 46, 48 is located between the upper and lower surfaces of the fairing core and the upper fairing skin 50 and lower fairing skin 52, respectively.
When the components are assembled in the molding tool and heated, the adhesive and epoxy resin in the laminates of fiber-reinforced material polymerize and mutually bond. Polymerization is evidenced physically by the stiffening and strengthening of adhesive and resin, creation of a high strength bond among contiguous components, wetting and mutual bonding of the fibers by the resin in which they are carried, and disappearance of the tacky adherence characteristic of adhesive and resin. When the materials from which the components are formed are shipped by the manufacturer to the fabricator and before the components are cured in the molding tool, the resin in the laminates of the fiber reinforced composite material and the adhesive are partially polymerized (the uncured condition). In this condition, they are tacky and adhere readily to other laminates of the assembly. This attribute assures dimensional stability and location of lamina during the process of forming the various components to a desired thickness and laying each component on another component inside the molding tool.
The upper and lower fairing skins 50, 52 comprise multiple laminates of woven fiber glass, whose reinforcing fibers alternately are directed parallel and perpendicular to the longitudinal axis of the blade, the proportion being substantially equally divided between the two angular directions. Alternatively, one-half of the fibers are directed parallel to the longitudinal axis of the blade and one-half are directed transversely thereto, or at positive and negative 45 degree angles with respect to this axis. The fairing skins extend spanwise from root to tip and chordwise beyond the leading edge 28 from the forward edge of selvage strips 56, 58 to the edge of a semicircular hook 60 located behind trailing edge block 38.
A noseblock 62 having the contour of the airfoil near the leading edge is located ahead of the spar and extends spanwise from root to tip. The noseblock is precompacted before insertion in the molding tool to accomodate metal cylindrical leading edge rods 64 that extend in combination from the inboard end of the airfoil portion 16 to the vicinity of the blade tip 18. The noseblock is fabricated of multiple layers of fiber-reinforced resin composite material. As this material is inserted in a tool where it is formed to shape, ambient air is forced periodically from the material by applying pressure directed toward the material along the entire length of the noseblock. This process is called precompaction.
Located below the upper fairing skin 50 and above upper spar pack 32 are first and second spar wraps 66, 68. Located between the lower fairing skin 52 and lower spar pack 34 are third and fourth spar wraps 70, 72. Spar wraps 66, 70, which include doublers 67, 71 overlapping the selvage strips, are in mutual contact along the blade length and across the width of the selvage strips 56, 58 after the cure, but they are removed at the leading edge radius following removal of the blade from the molding tool after curing. Spar wraps 66, 70 extend chordwise over noseblock 62 from the front edge of selvage strips 56, 58 rearward around the spar heel to a butt joint 74 located at the mid-depth of the airfoil thickness, where all rearward edges of the spar wraps abut mutually. Spar wraps 68, 72 extend chordwise from a butt joint located ahead of the noseblock at the leading edge radius, where all forward edges of the spar wraps 68, 72 abut mutually, around the spar heel to butt joint 74 located at the mid-depth of the airfoil thickness, where all the rearward edges of the spar wraps abut mutually. The spar wraps extend spanwise from root to tip.
Spar wraps 66, 68, 70, 72 comprise multiple laminae, whose reinforcing fibers are partially of HM graphite alternately directed at positive and negative 45 degree angles with respect to the longitudinal axis of the blade, and partially of woven fiber glass directed parallel and perpendicular to the longitudinal axis, the proportion of each material being substantially equally divided between the angular directions.
Structural continuity across the spar packs and the noseblock is provided by leading edge splice 78, which overlaps and contacts spar wraps 68, 72. Structural continuity across butt joint 74 is provided by heel splice 80, which overlaps and contacts spar wraps 68, 72 and the spar pack thickness that is tapered at the rearward extremity of the spar. Splices 78, 80 comprise multiple laminates whose reinforcing fibers alternately are directed at positive and negative 45 degree angles with respect to the longitudinal axis of the blade, the proportion being substantially equally divided between the two angular directions.
The forward tapered thickness of the spar packs accomodates the cambered airfoil contour and allows the spar to overlap the noseblock. The rearward tapered spar thickness is inclined away from the airfoil contour. Therefore, potential exists for lack of support of the fairing skins below the contour forward of the core in the vicinity of the rear spar tapered thickness. Accordingly, upper and lower bridge splices 82, 84 are located below the fairing skins and over the outer surface of the rear tapered thicknesses of the upper and lower spar packs to provide support for the skins. Bridge splices 82, 84 include multiple laminates whose reinforcing fibers alternately are directed at positive and negative 45 degree angles with respect to the longitudinal axis of the blade, the proportion being substantially equally divided between the two angular directions. Alternatively, one-half of the fibers are directed parallel to the longitudinal axis of the blade and one-half are directed transversely thereto.
Additional support for the fairing skins and a structural bond of the bridge splices to the outer surfaces of the spar packs in this region is provided by upper and lower foam strips 86, 88 (known as "AF 3024 foam bond"). The foam is applied in the form of an uncured strip that expands with application of heat during the cure cycle to fill the space between the fairing skins and corresponding spar pack. An arcuate sheet of uncured AF 3024 foam bond 90, located between the front arcuate face of the core 40 and the rear side of heel splice 80 at butt joint 74, is also applied to the uncured assembly of components. When heat is applied to the tool and its contents, member 90 expands, fills the adjacent cells of the core, and bonds the core to heel splice 80. Alternately, the arcuate foam member 90 may be formed from expanded cured foam, which is bonded during the cure cycle to the core radius, spar heel and adjacent spar wraps 66, 70 by bond material applied to its surfaces in sheet form.
FIG. 3 shows the blade assembly located in a molding tool 92, whose inner surface has the shape of the upper surface of the blade including the airfoil, transition, and root end portions. A complementary molding tool portion 93 having the shape of the lower blade surface is pressed toward tool portion 92 against stop surfaces to establish a predetermined distance of tool 93 relative to tool 92. Tool portions 92, 93 include leading edge flanges on which selvage strips 56, 58 and doublers 67, 71 are held and retained by the pressing contact between the tools against displacement during the cure cycle.
The upper and lower tools are formed in longitudinal sections, joined mutually at bolted flange connections 98, 99. The tool and its contents are heated by high temperature oil flowing through plates adjacent the outer surfaces of the tool.
Pressure is developed within the tool to force the uncured components outward against the tool surface and to force air entrapped in the lamina out of the tool. This action is accomplished by forming a relatively rigid mandrel 100 of solid structural styrofoam having an outer surface slightly smaller than the inner contour of the spar packs 32, 34 and spar wraps 68, 72.
A bag 102 of flexible rubber approximately 0.10 inches thick and sealed against air is placed over the mandrel and extends the full blade length. The mandrel supports the bag, and both are designed for removal from the blade after it is cured. The bag and mandrel are taken from the tool by applying axial force in the direction of the root end. To avoid tearing the bag due to unintentionally bonding the inner surface of the blade to the outer surface of the bag during the cure cycle, a parting agent, such as peel ply, is applied to the bag to prevent creation of such bonds and to facilitate removal against the effect of friction.
The lower tool 92 containing the upper airfoil contour is placed on a worktable with the inner surface of the tool facing upward. One layer of peel ply is placed over the surface to facilitate removal of the cured blade from the tools. The composite material in the precured condition will have been cut from rolls of raw stock into flat laminae having the dimensions of the components in the assembled position and laid one lamina upon another lamina until the thickness dimension is reached.
The upper fairing skin 50 is then placed on the tool surface with the selvage strip 56 resting on flange 94 and trailing edge hook 60 located in a spanwise recess 104 having the appropriate size and shape. Care is taken throughout the fabrication process to eliminate air from the assembly, especially in the form of air bubbles sealed by the resin between laminates.
Precured bridge 82 is located in the tool on the inner surface of the upper fairing skin at its correct chordal position. Then spar wrap 66 is placed in the tool over the upper fairing skin 50 and bridge 82.
Next, the rubber bag 102 and styrofoam mandrel 100 are assembled and located outside the tool. Upper spar pack 32, leading edge splice 78 and heel splice 80 are located on the bag at their correct positions. Upper foam strip 86 is placed on the upper spar pack near the heel, and upper spar wrap 68 is placed on the bag 102 over the spar pack so that the rearward edges abut mutually at the trailing edge of the bag over heel splice 80.
Then noseblock 62, with its tungsten leading edge rods 64 installed, is placed in tool 92 after the noseblock is precompacted.
The bag, supported by the mandrel with spar wrap 68, spar pack 32, foam strip 86, and splices 78, 80 applied, is placed carefully as a unit into the tool. Next, the lower spar pack 34, foam strip 88, inner spar wrap 72 and outer spar wrap 70 of the lower contour are placed in their respective positions in the tool. The front edges of spar wraps 68, 72 are placed over the noseblock so that they abut mutually at the leading edge radius. The rear edges of spar wraps 68, 72 are placed over heel splice 80 so that they abut mutually at the mid-depth or mid-thickness of the blade.
Honeycomb core 40, with its surfaces covered by adhesive bonding sheets 46, 48 and arcuate foam adhesive strip 90, are placed in the tool with the arcuate front face of the core adjacent heel splice 80. A strip of foam adhesive is placed on the rear edge of the core.
The precompacted trailing edge block 38 is placed behind the core, and fillers 42, 44 are located so that they overlap the core and core adhesive.
Precured bridge 84 is located in position on the lower fairing skin 52 and the skin is placed in the tool and located such that hook 60 is located in tool recess 104 and selvage strip 58 overlaps strip 56.
A layer of peel ply is applied to the inner surface of each tool portion, and each spanwise section of the lower tool is placed over the layup with the inner surface facing downward. End plates and pressure manifolds are attached to the tool to seal it against passage of air. The tool is loaded by a hydraulic press, the tool flanges grip the selvage strips and doublers, and the lower tool portion is forced by the press to a predetermined distance relative to the upper tool portion. Positive pressure of 70-85 psi is applied to the bag and the temperature of the unit is raised to approximately 250 degrees F. These conditions are maintained for about 120 minutes, whereafter the heat source is removed so that the spar wall temperature drops to 100 degrees. Then bag pressure is exhausted, the contents of the tool are cooled to room temperature, and the cured blade is removed. Strips 56, 58 are cut away from the leading edge, peel ply is stripped from the outer surface, and excessive resin clinging to the surface is removed. | A rotor blade, whose principal structural components are of fiber-reinforced composite material, includes a spar, fairing skins, spar wraps, splices and doublers in the precured condition cut from rolls of raw stock into flat sheets having the dimensions of the components in the assembled position and laid one laminate upon another laminate to the desired thickness dimension. A noseblock and trailing edge block are precompacted and formed to desired shapes and sizes in the precured condition. A honeycomb core, formed to the contour of the trailing portion of an airfoil behind the spar, is prepared. Molding tools, one tool having the contour of the upper blade surface and another tool having the contour of the lower blade surface, each tool adapted for assembly together so that their inner surfaces envelop the outer blade surface, are formed and adapted to receive the components of the blade therein. The components are placed in proper order and position in one molding tool, the other tool is pressed against the first tool, and the unit is sealed. A stiffened flexible bag, located in the tool between upper and lower spar packs, is pressurized. Temperature of the assembly is raised and controlled variably in accordance with a prescribed cycle that polymerizes the composite and bonds the components mutually. | 1 |
Subsets and Splits