This document relates generally to Access Control Systems (“ACSs”) for restricted areas. More particularly, this document relates to ACSs using a wearable access sensor implementing an energy harvesting technique.
There are many ACSs known in the art. One such ACS comprises a plurality of Access Control Readers (“ACRs”) mounted at exits and/or entries of restricted areas. For example, an ACR may be disposed adjacent to a doorway through which access to a restricted room is gained. A badge worn by a person is used to gain access to a restricted room via the ACR. In this regard, the badge comprises a Low Frequency (“LF”) passive Radio Frequency Identifier (“RFID”) communication device disposed thereon or therein. The LF passive RFID communication device typically operates at a frequency of 125 kHz. The ACR is a near field device with a detection range of about 5 cm or less. Throughout a given time period, the ACS tracks which entries a given person passes through for purposes of entering a restricted area. However, the ACS does not track when the person leaves each visited restricted area within the given time period.
Another conventional ACS employs beacons and wireless communication devices (e.g., mobile phones) which communicate via Bluetooth technology. A personal identifier is stored on the wireless communication device, and communicated to the beacon when the person is in proximity thereto. In response to the reception of the personal identifier, the ACS would allow the person to have access to the restricted area.
The present disclosure concerns systems and methods for operating a Wearable Access Sensor (“WAS”). The methods comprise capturing RF energy by the WAS being worn by a person. The RF energy is emitted within a surrounding environment from equipment disposed at an access point of a restricted area. The RF energy is passed through a switch that is normally in a position which provides an electrical connection between an antenna of the WAS and a full wave rectifier of the WAS. The WAS then performs operations to convert the RF energy into direct current for generating electric power. The electric power is supplied to an energy storage device (e.g., a super capacitor) of the WAS for charging the energy storage device to a pre-determined voltage level. Power is supplied from the energy storage device to a controller of the WAS when a voltage level of the energy storage device is equal to or greater than the pre-determined voltage level.
In some scenarios, the methods also comprise: generating and sending a switch control signal from the controller to the switch to cause the switch to change positions such that the switch is disconnected from the antenna and connected to a transceiver of the WAS; and communicating information from the WAS to a wireless edge device. The information comprises user credentials that are useful for authenticating a user such that the user can be granted or denied access to the restricted area.
In those or other scenarios, the power is supplied from the energy storage device to the controller via a voltage converter. The voltage converter changes the pre-determined voltage level to a sub-threshold voltage level. More particularly, the voltage converter increases or decreases a voltage level of a signal received from the energy storage device to a sub-threshold voltage level. The sub-threshold voltage level is at least one order of magnitude below a normal operating range for the WAS. The voltage level change is performed prior to supplying the power from the energy storage device to the controller. The normal operating range of a voltage level may be within 1.2 Volts to 3.6 Volts. The sub-threshold voltage level may be within 200 milli-Volts to 600 milli-Volts.
In those or yet other scenarios, a directionality of the WAS's movement is determined based on at least one of a rate of change of a charging voltage of the energy storage device and a detected direction of travel of the WAS in relation to the access point.
Embodiments will be described with reference to the following drawing figures, in which like numerals represent like items throughout the figures, and in which:
It will be readily understood that the components of the embodiments as generally described herein and illustrated in the appended figures could be arranged and designed in a wide variety of different configurations. Thus, the following more detailed description of various embodiments, as represented in the figures, is not intended to limit the scope of the present disclosure, but is merely representative of various embodiments. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by this detailed description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Reference throughout this specification to features, advantages, or similar language does not imply that all of the features and advantages that may be realized with the present invention should be or are in any single embodiment of the invention. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present invention. Thus, discussions of the features and advantages, and similar language, throughout the specification may, but do not necessarily, refer to the same embodiment.
Furthermore, the described features, advantages and characteristics of the invention may be combined in any suitable manner in one or more embodiments. One skilled in the relevant art will recognize, in light of the description herein, that the invention can be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the invention.
Reference throughout this specification to “one embodiment”, “an embodiment”, or similar language means that a particular feature, structure, or characteristic described in connection with the indicated embodiment is included in at least one embodiment of the present invention. Thus, the phrases “in one embodiment”, “in an embodiment”, and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
As used in this document, the singular form “a”, “an”, and “the” include plural references unless the context clearly dictates otherwise. Unless defined otherwise, all technical and scientific terms used herein have the same meanings as commonly understood by one of ordinary skill in the art. As used in this document, the term “comprising” means “including, but not limited to”.
The present invention may be implemented on one or any combination of hardware, firmware and software. The present invention may also be implemented as instructions contained in or on a machine-readable medium, which may be read and executed by one or more processors to enable performance of the operations described herein. A machine-readable medium may include any mechanism for storing, transmitting and/or receiving information in a form readable by a machine (e.g., a computer). For example, a machine-readable medium may include a tangible storage medium, such as but not limited to, Read Only Memory (“ROM”), Random Access Memory (“RAM”) and/or a flash memory device. A machine-readable medium may also include a propagated signal which has been modulated to encode the instructions, such as but not limited to electromagnetic, optical or acoustical carrier wave signals.
The term “wireless” and its derivatives may be used to describe circuits, devices, systems, methods, techniques, communications channels, etc., that communicate data by using modulated electromagnetic radiation through a non-solid medium. The term does not imply that the associated devices do not contain any wires, although in some scenarios they might not.
The present disclosure provides a novel ACS implementing a method for controlling access to restricted areas. An exemplary architecture 100 for the novel ACS is provided in
Accordingly, ACS 100 is generally configured to manage the entrance and exit of people through at least one secure area 118. In this regard, each secure area is entered and exited via an access point, such as a doorway 102. Exit and entrance antennas 106, 108 are disposed on front and back surfaces of the same structural wall or different structural walls located adjacent to the access point 102. For example, the entrance antenna 108 is disposed on a front sidewall surface 130 of a structural wall 132 located adjacent to the doorway 102. In contrast, the exit antenna 106 is disposed on a back sidewall surface (not shown in
A WAS 114 is assigned to each individual authorized for accessing restricted areas of a business entity. The WAS 114 comprises a wearable communications device that can be worn by the person 116 to which it is assigned. As shown in
In some scenarios, the WAS 114 runs at a sub-threshold power or voltage level. The term “sub-threshold”, as used herein, means that a power level and/or voltage level falls at least one order of magnitude below a normal operating range for a given device. For example, traditional processing systems normally operate at a power level of approximately 3 milli-Watts and/or a voltage level within 1.2 Volts to 3.6 Volts. In contrast, the WAS 114 runs at a sub-threshold power level at approximately 3 micro-Watts and/or a voltage level within 200 milli-Volts to 600 milli-Volts.
For example, the WAS 114 may include a diode junction (or rectifier) to rectify an incoming signal and a transistor to switch the incoming signal to/from a transceiver. In conventional RFID devices, the input voltage needed to operate the diode junction and transistor is of a threshold voltage level (e.g., 1.5-3.0 Volts, 0.7 Volts for the diode junction and 0.6 Volts for the transistor). In contrast, the input voltage needed to operate the diode junction and transistor of the WAS 114 is of a sub-threshold voltage level (e.g., 0.6 Volts) which is lower than the threshold voltage level (e.g., 1.5-3.0 Volts) of conventional RFID devices. For example, in the present solution, 0.3-0.4 Volts may be supplied to the diode bridge and 0.2-0.3 Volts may be supplied to the transistor. In effect, the operating voltage required to operate the WAS 114 is substantially reduced (e.g., from 1.5-3.0 Volts to 0.2-0.6 Volts) as compared to that of conventional RFID devices. In some scenarios, the diode bridge employed by the present solution comprise low drop out diodes which enable active rectification at less than 20 milli-Volts compared to conventional diodes which enable rectification at 300-700 milli-Volts.
In this regard, the WAS 114 comprises an energy harvesting circuit 220 and a voltage converter 290, as shown in
The voltage converter 290 comprises an electric power converter which changes the output voltage of an electrical power source, such as the energy harvesting circuit 220. The voltage converter 290 includes, but is not limited to, an inverter, a semiconductor switch (e.g., a transistor), passive components (e.g., inductors, capacitors, resistors, and/or diodes), and/or a transformer to change the voltage of AC power. In all scenarios, the voltage converter 290 raises or lowers the level of an input voltage received from the energy harvesting circuit 220 to the sub-threshold voltage level (e.g., 0.6 Volts).
Reducing the required operating voltage of the WAS 114 means a lower field level (volts per meter) is required for a given antenna size. In addition, running the WAS 114 at a sub-threshold power or voltage level means an Integrated Circuit (“IC”) 280 of the WAS 114 operates more slowly than normal super-threshold ICs, but runs at 100-1000 times lower current. Furthermore, operating the WAS 114 at sub-threshold levels allows the output antenna power of the antennas 106, 108 to be significantly lowered as compared to conventional non sub-threshold based RFID systems.
The IC 280 of the WAS 114 can implement components 212, 220 and 290. The IC 280 can be created by (1) changing the processing parameters for the mask set during fabrication, (2) changing the implantation rules for dopants and/or (3) changing processing parameters. However, the IC can be made on regular CMOS fabrication lines without affecting the normal operating of the line. This allows most FAB lines to create sub-threshold electronics on their standard lines using the normal mask processes used in fabrication.
Normally, running the IC 280 at half the voltage would cut the current by half as well as result in an IC operating at one quarter of the power. However, in this situation, the required power is reduced by 25-250 times more because of lower circuit losses and a slower operating speed. This lower power allows the very low input voltages into a voltage booster 290 to supply sufficient power to operate the IC.
The advantages of running the IC 280 at a sub-threshold power or voltage level are substantial. For example, the IC 280 is ideally suited to working with energy harvesting devices which are notorious for supplying very low power and voltages. Just as important is the IC's 280 use with resulting inlays or RFID devices. Since the operating power of the IC 280 is substantially reduced, the read range for a given sized inlay is ten to fifteen times larger as compared to that of conventional RFID devices. For example, an inlay that is only one centimeter long can operate like a conventional inlay that is ten to fifteen centimeters long. Notably, the size of the antenna 202 can be reduced as compared to that of conventional RFID devices, while still maintaining the larger read range. The size reduction of the inlay and antenna provide significant advantages when placing the IC 280 in/on packaging or incorporating the IC 280 into a wearable item.
Referring again to
In some scenarios, the energy storage device 262 comprises a super capacitor. The switch 250 includes a Field Effect Transistor (“FET”) switch. The FET switch may comprise a Heterostructure FET (“HFET”) which without applied power directly couples the antenna 202 to the energy harvesting electronics. The present invention is not limited to the particulars of these scenarios.
During operation, RF energy is emitted within a surrounding environment from equipment disposed at an access point of a restricted area. Upon entering into the RF field which corresponds to the antenna operating frequency, the energy harvesting circuit 220 charges up the energy storage device 262 (e.g., a super capacitor) to a pre-determined voltage level. In this regard, it should be understood that the switch 250 is normally in a position which provides an electrical connection or closed circuit between the antenna 202 and the full wave rectifier 252, as shown in
The captured RF energy is passed through the switch 250 by virtue of the switches characteristics described above. The energy harvester power manager 258 converts the received RF energy into direct current for generating electric power. The electric power is supplied to the energy storage device 262 (e.g., a super capacitor) for charging the same to the pre-determined voltage level. A graph is provided in
When the energy storage device 262 is charged to the pre-determined voltage level, power is supplied from the energy storage device 262 to the controller 206 via the energy harvester power manager 258. The controller 206 generates and sends a switch control signal 266 to the switch 250. The switch control signal 266 includes a command to cause the switch 250 to change positions. In effect, the switch 250 is disconnected from the energy harvesting circuit 220, whereby an open circuit is formed between the antenna 202 and the full wave rectifier 252. The switch 250 is connected to the transceiver 204 so as to allow communication of information from the WAS 114 to a nearby communications device. Next, the controller 206 initiates communications with the wireless edge device such that user credentials are passed from the WAS 114 to the wireless edge device. The wireless edge device processes the user credentials for authenticating the user. If the user is not authenticated, then (s)he is denied access to the restricted area. In contrast, if the user is authenticated, then (s)he is granted access to the restricted area.
Referring again to
At the access point 102, the reader 104 determines the directionality of the WAS 114 emitting the SRC reply signal. This determination is made based on RSSI measurements of the power present in the SRC reply signal received by an antenna 106 or 108 from the WAS 114. The RSSI measurements specify the signal strength of the SRC reply signal received at antenna 106 or antenna 108, and whether the signal strength is increasing or decreasing during a given period of time. If the signal strength of the SRC reply signal is increasing during the given period of time, then the WAS 114 is deemed to be traveling towards to the respective antenna 106 or 108. In contrast, if the signal strength of the SRC reply signal is decreasing during the given period of time, then the WAS 114 is deemed to be traveling away from the respective antenna 106 or 108.
However, such determinations are not sufficient to detect whether the person is attempting to enter or exit the restricted area. Accordingly, additional motion sensors 120, 122 are employed herein. The motion sensors may be provided at the access point 102. A first motion sensor 122 is disposed on the front sidewall surface 130 of the structural wall 132 located adjacent to the access point 102. In contrast, a second motion sensor 122 is disposed on a back sidewall surface (not shown in
Notably, the present invention is not limited to the motion sensor configuration shown in
In turn, the reader 104 forwards the information received from the motion sensor(s) 120, 122 to the DPS 112 via network 110. Similarly, reader 104 communicates information to the DPS 112 indicating the directionality of the WAS 114 (i.e., whether the WAS 114 is traveling towards or away from the antenna 106 or 108). The DPS 112 may be located in the same facility as the reader 104 or in a different facility remote from the facility in which the reader 104 is disposed. As such, the network 110 may comprise an Intranet and/or the Internet. Additionally, each exit and/or entrance to a restricted area in each facility of a business entity may have access control sensory systems 104-108, 120, 122 disposed thereat so as to define a distributed network of access control sensor systems.
At the DPS 112, the information is used to determine whether or not the person is attempting to enter or exit the access point 102. For example, if the information indicates that the WAS 114 is traveling towards the entrance antenna 108 and the person is moving in direction 124, then a determination is made that the person desires to enter the restricted area via access point 102. In contrast, if the information indicates that the WAS 114 is traveling towards antenna 106 and the person is moving in direction 126, then a determination is made that the person desires to exit the restricted area via the access point 102. If the information indicates that the WAS 114 is traveling away from the antenna 108, then a determination is made that the person is not trying to enter the restricted area. Similarly, if the information indicates that the WAS 114 is traveling away from the antenna 106, then a determination is made that the person is not trying to exit the restricted area.
The DPS 112 may also analyze patterns of motion defined by the information to determine whether or not the person desires to enter or exit the access point 102. For example, if the information indicates that the person 116 is traveling in a direction 124, 136 or 138 towards the access point 102 during a first period of time and then travels in a direction 126, 136 or 138 away from the access point 102 during an immediately following second period of time, then a determination is made that the person does not want to gain access to the restricted area, but is simply passing by the access point. In contrast, if the information indicates that the person 116 is traveling at a first speed in a direction 124, 136 or 138 towards the access point 102 during a first period of time and then slows down as (s)he approaches the access point, a determination is made that the person does want to gain access to the restricted area. Similarly, if the information indicates that the person 116 is traveling at a first speed in a direction 124, 136 or 138 towards the access point 102 during a first period of time and stops upon reaching the access point, a determination is made that the person does want to gain access to the restricted area.
Upon determining that the person does not want to enter or exit the restricted area, the DPS 112 simply logs the unique identifier, the directionality information, the motion direction information, the speed/velocity information, and/or the results of the information analysis in a data store (not shown in
The data logging allows the DPS 112 to track the access points through which the person enters and exits, and the time of such entering and exiting. This historical information is useful for a variety of reasons. For example, the historical information can be used to determine when employees arrive at and/or leave work, whereby the need for conventional employee time-attendance systems requiring each employee to manually clock-in upon arrival at work and clock-out upon leaving work is no longer necessary. The historical information can also be used to identify individuals who gained access to a restricted area when a possible theft occurred or when equipment was removed from the restricted area.
Notably, the above described access control system overcomes certain drawbacks of conventional access control systems. For example, in the present invention, authorized individuals do not need to take any manual actions (e.g., swiping a card) to gain access to restricted areas. In effect, the need for certain access control equipment (e.g., card readers) has been eliminated, thereby reducing the overall cost of implementing the present access control system 100.
In other scenarios, the WAS 114 operates in both an energy harvesting mode and a communications mode. In the energy harvesting mode, the energy harvesting circuit 220 collects energy every time WAS 114 passes by an access point. The collected energy is stored in the energy storage device 222 (e.g., a capacitor). Once the energy storage device 222 is charged to an operating voltage level of the SRC device 212, the mode of the WAS 114 is changed from the energy harvesting mode to the communications mode. Thereafter, an SRC identifier signal is sent to the reader 104 via antenna 202 at the access point 102. The SRC identifier signal comprises the unique identifier 210. Information 214 indicating the rate of change of the charging voltage of the energy storage device 222 (e.g., a capacitor) may also be sent from the WAS 114 to the reader 104 via the SRC identifier signal. The rate of change information 214 specifies directionality of the WAS 114. At a later time, the reader 104 communicates the unique identifier 210 and/or rate of change information 214 to the DPS 112.
Notably, the motion sensors 120, 122 are also employed along with the multi-mode WAS 114 (i.e., the WAS configured to operate in both an energy harvesting mode and a communications mode). The motion sensors 120, 122 are used to determine the direction and/or speed/velocity of travel of the person 116 in proximity to the access point 102. Information specifying the person's direction and/or speed/velocity of travel is provided from the motion sensors 120, 122 to the reader 104.
At the DPS 112, a determination is made as to whether the person is authorized to access the restricted area based on the unique identifier 210 and/or whether the person is attempting to enter or exit the restricted area based on the rate of change information 214. If the person is attempting to enter the restricted area and is not authorized to access the restricted area, then the DPS 112 simply logs information indicating that the person was in proximity of the access point at a particular time. In contrast, if the person is attempting to enter the restricted area and is authorized to access the restricted area, then the DPS 112 causes the door opening actuator 128 to be actuated. The DPS 112 also logs information specifying that access to the restricted area was provided to the person at a particular time.
In this scenario, the reader 104 is simply an edge connect module that controls the door opening actuator. As a result, the need for an interrogation reader (e.g., an RFID reader) is eliminated, thereby reducing the overall cost required to implement system 100.
Referring now to
At the reader, actions are performed to obtain RSSI measurement data specifying the power present in the SRC reply signal over a given period of time, as shown by step 310. The RSSI measurement data is used by the reader to determine if the signal strength of the SRC reply message is increasing. Notably, this determination can alternatively be performed by a DPS (e.g., DPS 112 of
If the signal strength of the SRC reply signal is decreasing [312:NO], then step 314 is performed where first information is generated indicating that the WAS is traveling away from the antenna. In contrast, if the signal strength of the SRC reply signal is increasing [312:YES], then step 316 is performed where second information is generated indicating that the WAS is traveling towards the antenna.
Upon completing step 314 or 316, the method 300 continues with step 318. Step 318 involves detecting the direction and/or speed/velocity of motion of the person (e.g., person 116 of
At the DPS, operations are performed to determine whether or not the person is attempting to enter or exit the restricted area using the information received in previous step 322. For example, if the received information indicates that the WAS is traveling towards an entrance antenna (e.g., antenna 108 of
After completing step 324, method 300 continues with decision step 326 of
If it is determined that the person does want to enter or exit the restricted area [326:YES], then optional step 332 is performed. Optional step 332 is performed when the person is attempting to enter the restricted area, and therefore involves comparing the unique identifier with a plurality of unique identifiers stored in a data store to check whether the person is authorized to enter the restricted area. When a person is attempting to exit the restricted area or an authorized person is attempting to enter the restricted area, the DPS performs various actions as shown by steps 334-340. Steps 334-340 involve: causing a request for identification and location information to be sent to a PCD (e.g., PCD 150 of
Upon completing step 340, step 342 is performed where the DPS performs operation to cause actuation of a door opening actuator (e.g., door opening actuation 128 of
Referring now to
When the energy storage device charges to an operating voltage level of an SRC device (e.g., SRC device 212 of
In a next step 416, the direction and/or speed/velocity of motion of the person wearing the WAS is detected. One or more motion sensors (e.g., sensors 120 and/or 122 of
At the DPS, operations are performed in step 422 to determine whether or not the person is attempting to enter or exit the restricted area using the information received in previous step 420. For example, if the received information indicates that the WAS is traveling towards an entrance antenna (e.g., antenna 108 of
After completing step 422, method 400 continues with decision step 424 of
If it is determined that the person does want to enter or exit the restricted area [424:YES], then optional step 427 is performed. Optional step 427 is performed when the person is attempting to enter the restricted area, and therefore involves comparing the unique identifier with a plurality of unique identifiers stored in a data store to check whether the person is authorized to enter the restricted area. When a person is attempting to exit the restricted area or an authorized person is attempting to enter the restricted area, steps 428-434 are performed. These steps involve: causing a request for identification and location information to be sent to a PCD in a person's possession; performing operations by the PCD to obtain information useful for determining its current location within a surrounding environment; relaying the information obtained in step 430 to a remote device; and estimating a location of the PCD.
Upon completing step 434, step 436 is performed. In step 436, the DPS performs actions to cause actuation of a door opening actuator (e.g., door opening actuation 128 of
Additionally, in some scenarios, the WAS may detect no rate of change when the wearer is standing near the access point of a restricted area. For example, let's assume that a person travels towards the access point whereby the WAS detects a rate of change of the energy collected by the energy harvesting circuit thereof. When the person arrives at the access point, (s)he is stopped by another person for a discussion. At this time, the WAS detects no rate of change of the energy collected by the energy harvesting circuit thereof. In response to such a detection, the WAS communicates a signal to the reader (e.g., reader 104 of
Referring now to
If the voltage of the energy storage device (e.g., a capacitor) is equal to or greater than the pre-determined voltage level [516:YES], then steps 518-522 are performed. These steps involve: supplying power from the energy storage device to a controller (e.g., controller 206 of
All of the apparatus, methods, and algorithms disclosed and claimed herein can be made and executed without undue experimentation in light of the present disclosure. While the invention has been described in terms of preferred embodiments, it will be apparent to those having ordinary skill in the art that variations may be applied to the apparatus, methods and sequence of steps of the method without departing from the concept, spirit and scope of the invention. More specifically, it will be apparent that certain components may be added to, combined with, or substituted for the components described herein while the same or similar results would be achieved. All such similar substitutes and modifications apparent to those having ordinary skill in the art are deemed to be within the spirit, scope and concept of the invention as defined.
The features and functions disclosed above, as well as alternatives, may be combined into many other different systems or applications. Various presently unforeseen or unanticipated alternatives, modifications, variations or improvements may be made by those skilled in the art, each of which is also intended to be encompassed by the disclosed embodiments.
This application claims priority benefits of U.S. Provisional Patent Application No. 62/086,241 filed on Dec. 2, 2014 and U.S. Provisional Patent Application No. 62/219,294 filed on Sep. 16, 2015. The contents of the listed documents are herein incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
4325146 | Lennington | Apr 1982 | A |
4993068 | Piosenka et al. | Feb 1991 | A |
5365266 | Carpenter | Nov 1994 | A |
5387993 | Heller et al. | Feb 1995 | A |
5502447 | Kumpfbeck et al. | Mar 1996 | A |
5532705 | Hama | Jul 1996 | A |
5763868 | Kubota et al. | Jun 1998 | A |
5947369 | Frommer et al. | Sep 1999 | A |
5960085 | de la Huerga | Sep 1999 | A |
5966227 | Dubois et al. | Oct 1999 | A |
5988645 | Downing | Nov 1999 | A |
6219439 | Burger | Apr 2001 | B1 |
6288644 | Mathews et al. | Sep 2001 | B1 |
6339999 | Newell | Jan 2002 | B1 |
6346886 | De La Huerga | Feb 2002 | B1 |
6788262 | Adams et al. | Sep 2004 | B1 |
6888502 | Beigel et al. | May 2005 | B2 |
6950098 | Brabander et al. | Sep 2005 | B2 |
7119688 | Wildman | Oct 2006 | B2 |
7202789 | Stilp | Apr 2007 | B1 |
7424316 | Boyle | Sep 2008 | B1 |
7450024 | Wildman et al. | Nov 2008 | B2 |
7450077 | Waterhouse et al. | Nov 2008 | B2 |
7629934 | Rhodes et al. | Dec 2009 | B2 |
7696882 | Rahimi et al. | Apr 2010 | B1 |
7849619 | Mosher, Jr. et al. | Dec 2010 | B2 |
7898385 | Kocher | Mar 2011 | B2 |
7982616 | Banerjee et al. | Jul 2011 | B2 |
7983565 | Varshneya et al. | Jul 2011 | B2 |
8267325 | Phaneuf | Sep 2012 | B2 |
8447188 | Scott et al. | May 2013 | B2 |
8497808 | Wang | Jul 2013 | B2 |
8502681 | Bolling et al. | Aug 2013 | B2 |
8599101 | Christie et al. | Dec 2013 | B2 |
8646695 | Worrall et al. | Feb 2014 | B2 |
8674810 | Uysal et al. | Mar 2014 | B2 |
8917214 | Forster | Dec 2014 | B2 |
8985439 | Braun | Mar 2015 | B2 |
9076273 | Smith et al. | Jul 2015 | B2 |
9384608 | Strulovitch et al. | Jul 2016 | B2 |
9514584 | Burge et al. | Dec 2016 | B1 |
9519853 | Tolle | Dec 2016 | B2 |
9600999 | Stenzler | Mar 2017 | B2 |
20020084904 | De La Huerga | Jul 2002 | A1 |
20020140558 | Lian et al. | Oct 2002 | A1 |
20030005193 | Seroussi et al. | Jan 2003 | A1 |
20040085208 | Fukuoka | May 2004 | A1 |
20040246103 | Zukowski | Dec 2004 | A1 |
20050168340 | Mosher et al. | Aug 2005 | A1 |
20050285740 | Kubach et al. | Dec 2005 | A1 |
20060022816 | Yukawa | Feb 2006 | A1 |
20060219778 | Komatsu | Oct 2006 | A1 |
20070182559 | Lawrence et al. | Aug 2007 | A1 |
20080055045 | Swan et al. | Mar 2008 | A1 |
20080074652 | Fouquet et al. | Mar 2008 | A1 |
20090121931 | Katz | May 2009 | A1 |
20090322513 | Hwang et al. | Dec 2009 | A1 |
20100315244 | Tokhtuev et al. | Dec 2010 | A1 |
20100328043 | Jantunen et al. | Dec 2010 | A1 |
20110022121 | Meskins | Jan 2011 | A1 |
20110148602 | Goh et al. | Jun 2011 | A1 |
20110206378 | Bolling et al. | Aug 2011 | A1 |
20110316700 | Kasahara et al. | Dec 2011 | A1 |
20120056719 | Krishna et al. | Mar 2012 | A1 |
20120189312 | Maryfield et al. | Jul 2012 | A1 |
20120234921 | Tiedmann et al. | Sep 2012 | A1 |
20120242481 | Gernandt | Sep 2012 | A1 |
20120242501 | Tran et al. | Sep 2012 | A1 |
20120256492 | Song et al. | Oct 2012 | A1 |
20120286927 | Hagl | Nov 2012 | A1 |
20130010962 | Buer et al. | Jan 2013 | A1 |
20130027180 | Lakamraju et al. | Jan 2013 | A1 |
20130221938 | Conte et al. | Aug 2013 | A1 |
20140068742 | Phillips | Mar 2014 | A1 |
20140077929 | Dumas et al. | Mar 2014 | A1 |
20140159959 | Rhoads et al. | Jun 2014 | A1 |
20140159975 | Apostolos et al. | Jun 2014 | A1 |
20140226844 | Kerselaers | Aug 2014 | A1 |
20140240087 | Liu et al. | Aug 2014 | A1 |
20140240088 | Robinette | Aug 2014 | A1 |
20140327517 | Portet | Nov 2014 | A1 |
20140354494 | Katz | Dec 2014 | A1 |
20140375429 | Cristache | Dec 2014 | A1 |
20150022321 | Lefevre | Jan 2015 | A1 |
20150041614 | Tran et al. | Feb 2015 | A1 |
20150054696 | Werner et al. | Feb 2015 | A1 |
20150070134 | Nagisetty et al. | Mar 2015 | A1 |
20150078741 | O'Connor et al. | Mar 2015 | A1 |
20150149310 | He et al. | May 2015 | A1 |
20150154486 | McFarthing et al. | Jun 2015 | A1 |
20150168554 | Aharoni et al. | Jun 2015 | A1 |
20150180716 | Aminzade | Jun 2015 | A1 |
20150185160 | Lacoste et al. | Jul 2015 | A1 |
20150188632 | Aoyama et al. | Jul 2015 | A1 |
20150221147 | Daniel-Wayman et al. | Aug 2015 | A1 |
20150250419 | Cooper et al. | Sep 2015 | A1 |
20150264431 | Cheng | Sep 2015 | A1 |
20150280829 | Breuer et al. | Oct 2015 | A1 |
20150339870 | Cojocaru et al. | Nov 2015 | A1 |
20150341114 | Pederson | Nov 2015 | A1 |
20150365166 | Deyle et al. | Dec 2015 | A1 |
20150379791 | Russell et al. | Dec 2015 | A1 |
20160007315 | Lundgreen et al. | Jan 2016 | A1 |
20160014103 | Masters et al. | Jan 2016 | A1 |
20160055692 | Trani | Feb 2016 | A1 |
20160095189 | Vangeel et al. | Mar 2016 | A1 |
20160164607 | Pederson | Jun 2016 | A1 |
20160267760 | Trani | Sep 2016 | A1 |
20160284183 | Trani | Sep 2016 | A1 |
20160294835 | Beaumont et al. | Oct 2016 | A1 |
20160343187 | Trani | Nov 2016 | A1 |
20160344091 | Trani | Nov 2016 | A1 |
20170026118 | Pederson | Jan 2017 | A1 |
20170228953 | Lupovici | Aug 2017 | A1 |
Number | Date | Country |
---|---|---|
203825788 | Sep 2014 | CN |
2495621 | Sep 2012 | EP |
1999041721 | Aug 1999 | WO |
2014113882 | Jul 2014 | WO |
2014210000 | Dec 2014 | WO |
2015023737 | Feb 2015 | WO |
Entry |
---|
Rais, N.H.M., et al., “A Review of Wearable Antenna,” Antennas & Propagation Conference, 2009, LAPC 2009, Loughborough, Published IEEE; 978-1-4244-2720-8; DOI: 10.1109/LAPC.2009.5352373. |
Hall, P.S., et al., “Antennas and Propagation for Body Centric Communications,” Proc. ‘EUCAP 2006’, Nice, France, Nov. 6-10, 2006 (ESA SP-626, Oct. 2006). |
Conway, G.A., et al., “Antennas for Over-Body-Surface Communication at 2.45 GHz,” IEEE Transactions on Antennas and Propagation, vol. 57, No. 4, Apr. 2009, 0018-926X, copyright 2009 IEEE. |
Ito, K., et al., “Wearable Antennas for Body-Centric Wireless Communications,” copyright IEEE 2010; 978-1-4244-6418-0/10. |
Matthews, J.C.G., et al., “Body Wearable Antennas for UHF/VHF,” 2008 Loughborough Antennas & Propagation Conference, 978-1-4244-1894-7/08, copyright 2008 IEEE. |
Number | Date | Country | |
---|---|---|---|
20160156219 A1 | Jun 2016 | US |
Number | Date | Country | |
---|---|---|---|
62219294 | Sep 2015 | US | |
62086241 | Dec 2014 | US |