Disclosure of Invention
It is an object of an aspect of the present application to provide a communication system for a power tool, which aims to provide an improved safety solution.
The application aims at realizing the following technical scheme:
A communication system for a power tool, comprising:
An NFC module associated with the power tool and comprising at least a first memory, wherein the power tool has an energized state and a de-energized state, the first memory being at least readable in both the energized state and the de-energized state;
a processor associated with the power tool and configured to receive instructions from the NFC module and update information in the first memory in a powered-on state, and
A mobile device configured to communicate with the processor through the NFC module and configured to read information from the first memory;
the communication system is configured to prevent the mobile device from writing instructions into the NFC module in a power-off state.
In the above communication system for a power tool, optionally, the NFC module further includes a second memory configured to be readable and writable in a power-on state and not usable in a power-off state;
wherein the mobile device communicates with the processor through the second memory, the mobile device first writes information to the second memory, the processor reads information in the second memory in a powered-on state, and then updates information in the first memory.
In the above communication system for a power tool, optionally, the first memory is a charged erasable programmable read-only memory, and the second memory is a random access memory or a fast transfer mode buffer, wherein a read-write speed of the second memory is greater than a read-write speed of the first memory.
In the communication system for a power tool described above, optionally, the processor is configured to send feedback information to the mobile device through the second memory after updating the information in the first memory, the mobile device is further configured to receive feedback information from the processor from the second memory and then read the information from the first memory.
In the above communication system for a power tool, the feedback information may optionally include system setting modification confirmation information.
In the above communication system for a power tool, optionally, before the mobile device communicates with the processor, a security detection step is performed to confirm that the mobile device has a preset authority, wherein the security detection step includes a real-time handshake and/or data encryption.
In the above communication system for a power tool, optionally, the NFC module further includes a third memory configured to be readable in both the power-on state and the power-off state, and configured to record the state of the power tool.
In the above communication system for a power tool, the mobile device is optionally further configured to read the state of the power tool through the third memory prior to communicating with the processor, to not perform further operations in the power-off state, and to allow the mobile device to communicate with the processor in the power-on state.
In the above communication system for a power tool, optionally, the third memory includes one or more registers, at least one of the registers being configured to represent whether the power tool is in a power-off state or in a power-on state.
In the communication system for a power tool described above, optionally, the communication of the mobile device with the processor includes transmitting one or more system setting update information, the processor being configured to update the system settings in accordance with the system setting update information and then copy the updated system settings to the first memory.
Detailed Description
Preferred embodiments of the present application will be described in detail below with reference to the accompanying drawings. Those skilled in the art will appreciate that these descriptions are merely illustrative, exemplary, and should not be construed as limiting the scope of the application.
First, terms of top, bottom, upward, downward, and the like are defined with respect to directions in the drawings. These orientations are relative concepts and will therefore vary depending on the location and state in which they are located. These and other directional terms should not be construed as limiting.
Furthermore, it should also be noted that, for any individual feature described or implied in the embodiments herein or any individual feature shown or implied in the figures, these features (or their equivalents) can be combined further to obtain other embodiments not directly mentioned herein.
It should be noted that in different drawings, the same reference numerals indicate the same or substantially the same components.
Fig. 1 is a schematic diagram of a conventional manner of interacting a power tool with a mobile device. The power tool 10 may include a processor 200 and be associated with the NFC module 100. The NFC module 100 may include a first memory 110 configured to be readable and writable in both a powered-on state and a powered-off state. The mobile device 300 may communicate with the processor 200 through the NFC module 100. Arrows A1 to A5 in fig. 1 show the information transfer direction of the interaction. In particular, arrow A1 represents the mobile device 300 transferring data to the first memory 110, such as sending instructions to modify the system settings. Arrow A2 represents the processor 200 reading data from the first memory 110, e.g. reading instructions to modify the system settings, and writing into the temporary data storage area 210. Arrow A3 represents the processor 200 performing an operation according to an instruction to modify the system settings, such as modifying the system settings in the source data 220. Arrow A4 represents the memory 200 writing the modified system settings into the first memory 110, and arrow A5 represents the mobile device 300 reading the modified system settings from the first memory 110. Arrow A5 is shown as a double-headed arrow because the mobile device 300 sends a read instruction before reading data from the first memory 110.
However, the above transmission modes present potential risks. For example, in the event that the power tool 10 is shut down or loses power, the data in the first memory 110 may still be readable by the mobile device 300. The mobile device 300 may also issue instructions to the first memory 110, but these instructions are not processed by the processor 200, and the first memory 110 is not refreshed by the processor 200 to reflect the instructions issued by the mobile device 300. In this case, the state of the power tool 10 obtained by the mobile device 300 may be inaccurate. In addition, delays in data updates present a potential security risk. For example, the instructions in the first memory 110 may be modified, but the processor 200 does not perform operations, nor update the data in the first memory 110. A potential attacker may use this feature to develop a cracking tool or a destructive tool, for example using a counterfeit mobile device 300 to send undesired instructions to the power tool 10, with damaging consequences.
It should be noted that, for the sake of clarity, NFC module 100 and processor 200 are shown with dashed outlines. However, the NFC module 100 and the processor 200 are actually solid modules and may have a clear outer profile.
Fig. 2 is a schematic diagram illustrating one embodiment of a communication system for a power tool in accordance with the present application. The communication system may include an NFC module 100, a processor 200, a mobile device 300, and the like.
The power tool 10 may be any suitable tool including, but not limited to, a power drill, a power saw, and the like. The power tool 10 may have a suitable outer profile, and the outer profile is schematically shown in fig. 2 with solid lines. The power tool 10 may be associated with the NFC module 100 and the processor 200. The power tool 10 may have at least two states, such as an energized state and a de-energized state. It will be readily appreciated that in the energized state, the power tool 10 draws power from a power source, not shown, and the processor 200 is energized and operable. In the power loss state, the energy transmission between the power tool 10 and the power source is cut off, and the processor 200 is stopped and inoperable.
NFC module 100 may be any suitable NFC device, such as an NFC tag or the like. In one embodiment, the NFC module 100 may be attached to the power tool 10, disposed external or internal to the power tool 10. In one embodiment, NFC module 100 may be an ST25DV series NFC tag of an intentional semiconductor. In fig. 1-3, NFC module 100 is shown separate from power tool 10, such illustration being for clarity purposes. It is readily understood that the NFC module 100 may be attached to the power tool 10 and be part of the power tool 10.
The NFC module 100 may include a first memory 110 and a second memory 120. The first Memory 110 may be a charged erasable programmable read-Only Memory (EEPROM) and is readable in both a powered-on state and a powered-off state. In one embodiment, the first memory 110 is writable in both a powered-on state and a powered-off state. The first memory 110 may store a series of data including, but not limited to, usage data of the power tool, a battery state of the power tool, a setting of the power tool, and the like.
The second memory 120 may be a buffer, such as a fast transfer mode buffer, for example, a fast transfer mode buffer of ST25DV series NFC tags of an artificial semiconductor or FastTransferBuffer modules. In one embodiment, the second memory 120 may be a 256-bit half-duplex buffer, and may be a random access memory (Random Access Memory, abbreviated as RAM). The second memory 120 is operable and readable only in the powered-on state and will not be operable in the powered-off state. The second memory 120 may store temporary data including, but not limited to, instructions from the mobile device 300, and the like.
The processor 200 may be disposed within the power tool 10 or associated with the power tool 10. In one embodiment, the processor 200 may be a micro control unit (Microcontroller Unit, abbreviated MCU). Processor 200 may include a temporary data storage area 210 and source data 220. The processor 200 may be configured to modify the source data 220 according to instructions stored in the temporary data storage area 210 and update the modified source data into the first memory 110.
The mobile device 300 may be any suitable device including, but not limited to, a smart phone, a tablet, a Personal digital assistant (Personal DIGITAL ASSISTANT, abbreviated PDA), a wearable device, and the like. The mobile device 300 may include necessary hardware for reading the NFC module 100, a display screen, not shown, a processor and memory, etc. In one embodiment, mobile device 300 may be a handheld device that is held by a user and may be installed with an Application (abbreviated APP). The application may be an application that is compatible with the power tool 10 and may be configured to perform a series of operations on the power tool 10, such as modifying settings of the power tool 10. The application may also be configured to display the status of the power tool 10, such as displaying a series of data from the first memory 110, including, but not limited to, usage data of the power tool, battery status of the power tool, settings of the power tool, etc.
In use, the NFC module 100, processor 200 and mobile device 300 may follow a series of operational sequences, which are schematically illustrated by arrows A1' to A7 in fig. 2.
In general, arrow A1' represents the mobile device 300 transferring data to the second memory 120, such as sending instructions to modify the system settings. Arrow A2' represents the processor 200 reading data from the second memory 120, e.g., reading instructions to modify system settings, and writing into the temporary data storage area 210. Arrow A3 represents the processor 200 performing an operation according to an instruction to modify the system settings, such as modifying the system settings in the source data 220. Arrow A4 represents the memory 200 writing the modified system settings into the first memory 110, and arrow A5 represents the mobile device 300 reading the modified system settings from the first memory 110. Arrow A5 is shown as a double-headed arrow because the mobile device 300 sends a read instruction before reading data from the first memory 110. In addition, arrow A6 represents the memory 200 sending feedback information to the second memory 120, such as feedback information confirming that the system settings have been modified successfully. In one embodiment, memory 200 may be configured to perform the operation represented by arrow A6 after the operation represented by arrow A4 is completed. Arrow A7 represents the mobile device 300 reading information from the second memory 120, such as reading the feedback information described above.
In one embodiment, the mobile device 300 may be configured to first attempt to read information from the second memory 120, such as feedback information that confirms that the system settings have been modified successfully, and then the mobile device 300 reads the modified system settings from the first memory 110.
If the power tool 10 is in a powered down state, the second memory 120 will not be available. At this time, if the mobile device 300 tries to send the modification instruction, the mobile device 300 will find the second memory 120 unreadable and give feedback to the user, for example, inform the user that the operation can be performed only after the power-on of the power tool 10 is started, and ask the user to continue the operation after the power-on of the power tool 10. The above procedure can prevent the user from writing instructions to the NFC module 100 in the power-off state of the power tool 10, thereby avoiding potential display errors and security risks.
In addition, the second memory 120 may have a faster read-write speed than the first memory 110. Therefore, it is allowed to perform more complicated operations between the mobile device 300 and the second memory 120. For example, multiple handshakes may be performed between the mobile device 300 and the second memory 120 to confirm identity or to transfer information between the mobile device 300 and the second memory 120 using encrypted data. In addition, the user identity of the mobile device 300 may also be verified prior to transferring instructions between the mobile device 300 and the second memory 120, thereby ensuring that the mobile device 300 has the corresponding rights. Such an arrangement further improves the security of the overall communication system.
Fig. 3 is a schematic diagram illustrating another embodiment of a communication system for a power tool according to the present application. NFC module 100 may also include a third memory 130. In one embodiment, the third memory 130 may be a separate memory and separate from the first memory 110. In one embodiment, the third memory 130 may include one or more registers, and at least one of the registers may be configured to represent a state of the power tool. For example, a register reading of 0 represents that the power tool is in a power-down state, and a register reading of 1 represents that the power tool is in a power-on state. In one embodiment, the third memory 130 may be a dynamic register of ST25DV series NFC tags of an intentional semiconductor and configured to be dynamically configurable to exhibit an active state.
As shown in fig. 3, in this embodiment, the NFC module 100, the processor 200, and the mobile device 300 may perform additional operations. Arrow A0 represents the mobile device 300 reading data from the third memory 130 to confirm whether the power tool 10 is in a powered-off state or in a powered-on state. In one embodiment, the steps represented by arrows A1 through A5 continue to be performed while the power tool 10 is in the energized state. When the power tool 10 is in a powered-down state, the mobile device 300 does not perform further operations. Conversely, the mobile device 300 will alert the user, such as by a pop-up window, that it is currently inoperable and request the user to power on the power tool 10. Only after the power tool 10 is powered on, the user can perform subsequent operations through the mobile device 300. Thus, in the power-down state, the mobile device 300 does not establish a connection with the processor 200 nor transmit data. In one embodiment, an Application (APP) on the mobile device 300 will prevent further writing of NFC data to the NFC module 100. Such a flow setting prevents the user from further operation in the state of power loss of the power tool 10, thereby improving user experience and safety.
In one embodiment, the NFC module 100 may have a first memory 110, a second memory 120, and a third memory 130. The communication systems and operational steps of fig. 2 and 3 may be used in combination to achieve improved operational experience and security.
In summary, with the above embodiments or their combination, when the power tool 10 is in the power-off state, the communication between the mobile device 300 and the processor 200 will be cut off and the mobile device 300 is prevented from writing instructions to the NFC module 100, thereby improving the accuracy of the state display of the power tool 10 and ensuring the safety performance.
The communication system for the electric tool has the advantages of simplicity, reliability, convenience in manufacturing, good safety performance and the like. By adopting the communication system for the electric tool, the operation experience and the safety of the electric tool are improved.
The present specification discloses the present application with reference to the accompanying drawings and also enables one skilled in the art to practice the application, including making and using any devices or systems, selecting suitable materials, and using any incorporated methods. The scope of the application is defined by the claims and encompasses other examples that will occur to those skilled in the art. Such other examples should be considered to be within the scope of protection as determined by the claimed subject matter, so long as such other examples include structural elements that are not literally different from the claimed subject matter, or include equivalent structural elements with insubstantial differences from the literal languages of the claimed subject matter.