Backup and restoration of operation control data in a heating, ventilation and air conditioning network

Information

  • Patent Grant
  • 8762666
  • Patent Number
    8,762,666
  • Date Filed
    Wednesday, October 21, 2009
    15 years ago
  • Date Issued
    Tuesday, June 24, 2014
    10 years ago
Abstract
The disclosure provides an a system and method of backing up operating control data about a device connected to a controller in a network. In an embodiment, the network includes a storage system for the data about the device is in the controller; a first subsystem for determining that the data should be transferred to the device; and a second subsystem for transferring the data to the device for use.
Description
TECHNICAL FIELD

This application is directed, in general, to distributed-architecture heating, ventilation and air conditioning (HVAC) systems, more specifically, to a memory scheme, data recovery, and programming in an HVAC network.


BACKGROUND

Climate control systems, also referred to as HVAC systems (the two terms will be used herein interchangeably), are employed to regulate the temperature, humidity and air quality of premises, such as a residence, office, store, warehouse, vehicle, trailer, or commercial or entertainment venue. The most basic climate control systems either move air (typically by means of an air handler or, or more colloquially, a fan or blower), heat air (typically by means of a furnace) or cool air (typically by means of a compressor-driven refrigerant loop). A thermostat is typically included in the climate control systems to provide some level of automatic temperature control. In its simplest form, a thermostat turns the climate control system on or off as a function of a detected temperature. In a more complex form, a thermostat may take other factors, such as humidity or time, into consideration. Still, however, the operation of a thermostat remains turning the climate control system on or off in an attempt to maintain the temperature of the premises as close as possible to a desired setpoint temperature. Climate control systems as described above have been in wide use since the middle of the twentieth century.


SUMMARY

One aspect provides a system for backing up operating control data about a device connected to a controller in a network. In an embodiment, the network comprises a storage system for the data about the device in the controller, a first subsystem for determining that the data should be transferred to the device; and a second subsystem for transferring the data to the device for use.


Another aspect provides a method for backing up operating control data for a device connected to a controller in a network. In an embodiment, the method comprises the steps of: transferring the data from the device to the controller, storing the data in the controller, determining that the data should be transferred back to the device for use, and transferring the data from the controller to the device for use.


Yet another aspect provides a subnet controller. In an embodiment, the subnet controller is configured to store back-up information for a device of subnet of an HVAC system. The system comprises a device memory storage configured to store said back-up information for the device coupled to the subnet of said HVAC system. The system further comprises a memory selector configured to: a) select at least a subset of said back-up information, and b) convey said at least of subset of back-up information to the at least one HVAC device.





BRIEF DESCRIPTION

Reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:



FIG. 1 is a high-level block diagram of an HVAC system within which a device abstraction system and method may be contained or carried out;



FIG. 2 is a high-level block diagram of one embodiment of an HVAC data processing and communication network 200;



FIG. 3A is a diagram of a series of steps in an event sequence that depicts a device commissioning in an HVAC network having an active subnet controller;



FIG. 3B is a diagram of a series of steps that occur in relation to a commissioning of a subnet including an addressable unit;



FIG. 3C is a diagram of the above series of steps of FIG. 3B to be followed by a subnet controller to synchronize with a device of the HVAC system;



FIG. 4 illustrates an exemplary flow for device replacement and commissioning that can use back-up information;



FIG. 5A is an illustration of an embodiment of a high level block diagram of a subnet with an information back-up in a subnet controller;



FIG. 5B illustrates an exemplary flow of a method of storing back-up information within a subnet controller;



FIG. 6 illustrates an exemplary diagram wherein a plurality of devices can be flash programmed concurrently by a user interface/gateway of the HVAC network of FIG. 1;



FIG. 6A illustrates an exemplary flow of a method for programming a non-volatile memory in an HVAC device;



FIG. 6B illustrates a high-level block diagram of an embodiment of a data transfer between a device and a user interface/gateway;


FIGS. 6C1 and 6C2 illustrate a boot-loader device loading in an non-volatile memory (“NVM”);



FIG. 7A illustrates one embodiment of a memory structure used in an HVAC device;



FIG. 7B illustrates an exemplary flow of a method to store memory into protected areas of an HVAC device;



FIG. 7C illustrates an exemplary embodiment of a flow of flash programming an HVAC device of FIG. 7B in more detail;



FIG. 8A illustrates an exemplary flow of a method for conveying information from an HVAC device to an RFID reader; and



FIG. 8B illustrates a high-level block diagram of an embodiment of a system for transmitting information from an HVAC device to an RFID reader coupled to a board installed within the HVAC device.





DETAILED DESCRIPTION

As stated above, conventional climate control systems have been in wide use since the middle of the twentieth century and have, to date, generally provided adequate temperature management. However, it has been realized that more sophisticated control and data acquisition and processing techniques may be developed and employed to improve the installation, operation and maintenance of climate control systems.


Described herein are various embodiments of an improved climate control, or HVAC, system in which at least multiple components thereof communicate with one another via a data bus. The communication allows identity, capability, status and operational data to be shared among the components. In some embodiments, the communication also allows commands to be given. As a result, the climate control system may be more flexible in terms of the number of different premises in which it may be installed, may be easier for an installer to install and configure, may be easier for a user to operate, may provide superior temperature and/or relative humidity (RH) control, may be more energy efficient, may be easier to diagnose and perhaps able to repair itself, may require fewer, simpler repairs and may have a longer service life.



FIG. 1 is a high-level block diagram of an HVAC system, generally designated 100. The HVAC system may be referred to herein simply as “system 100” for brevity. In one embodiment, the system 100 is configured to provide ventilation and therefore includes one or more air handlers 110. In an alternative embodiment, the ventilation includes one or more dampers 115 to control air flow through air ducts (not shown.) Such control may be used in various embodiments in which the system 100 is a zoned system. In the context of a zoned system 100, the one or more dampers 115 may be referred to as zone controllers 115. In an alternative embodiment, the system 100 is configured to provide heating and therefore includes one or more furnaces 120, typically associated with the one or more air handlers 110. In an alternative embodiment, the system 100 is configured to provide cooling and therefore includes one or more refrigerant evaporator coils 130, typically associated with the one or more air handlers 110. Such embodiment of the system 100 also includes one or more compressors 140 and associated condenser coils 142, which are typically associated in one or more so-called “outdoor units” 144. The one or more compressors 140 and associated condenser coils 142 are typically connected to an associated evaporator coil 130 by a refrigerant line 146. In an alternative embodiment, the system 100 is configured to provide ventilation, heating and cooling, in which case the one or more air handlers 110, furnaces 120 and evaporator coils 130 are associated with one or more “indoor units” 148, e.g., basement or attic units.


For convenience in the following discussion, a demand unit 155 is representative of the various units exemplified by the air handler 110, furnace 120, and compressor 140, and more generally includes an HVAC component that provides a service in response to control by the control unit 150. The service may be, e.g., heating, cooling, or air circulation. The demand unit 155 may provide more than one service, and if so, one service may be a primary service, and another service may be an ancillary service. For example, for a cooling unit that also circulates air, the primary service may be cooling, and the ancillary service may be air circulation (e.g. by a blower).


The demand unit 155 may have a maximum service capacity associated therewith. For example, the furnace 120 may have a maximum heat output (often expressed in terms of British Thermal Units, or BTU), or a blower may have a maximum airflow capacity (often expressed in terms of cubic feet per minute, or CFM). In some cases, the addressable unit 155 may be configured to provide a primary or ancillary service in staged portions. For example, blower may have two or more motor speeds, with a CFM value associated with each motor speed.


One or more control units 150 control one or more of the one or more air handlers 110, the one or more furnaces 120 and/or the one or more compressors 140 to regulate the temperature of the premises, at least approximately. In various embodiments to be described, the one or more displays 170 provide additional functions such as operational, diagnostic and status message display and an attractive, visual interface that allows an installer, user or repairman to perform actions with respect to the system 100 more intuitively. Herein, the term “operator” will be used to refer collectively to any of the installer, the user and the repairman unless clarity is served by greater specificity.


One or more separate comfort sensors 160 may be associated with the one or more control units 150 and may also optionally be associated with one or more displays 170. The one or more comfort sensors 160 provide environmental data, e.g. temperature and/or humidity, to the one or more control units 150. An individual comfort sensor 160 may be physically located within a same enclosure or housing as the control unit 150. In such cases, the commonly housed comfort sensor 160 may be addressed independently. However, the one or more comfort sensors 160 may be located separately and physically remote from the one or more control units 150. Also, an individual control unit 150 may be physically located within a same enclosure or housing as a display 170. In such embodiments, the commonly housed control unit 150 and display 170 may each be addressed independently. However, one or more of the displays 170 may be located within the system 100 separately from and/or physically remote to the control units 150. The one or more displays 170 may include a screen such as a liquid crystal display (not shown).


Although not shown in FIG. 1, the HVAC system 100 may include one or more heat pumps in lieu of or in addition to the one or more furnaces 120, and one or more compressors 140. One or more humidifiers or dehumidifiers may be employed to increase or decrease humidity. One or more dampers may be used to modulate air flow through ducts (not shown). Air cleaners and lights may be used to reduce air pollution. Air quality sensors may be used to determine overall air quality.


Finally, a data bus 180, which in the illustrated embodiment is a serial bus, couples the one or more air handlers 110, the one or more furnaces 120, the one or more evaporator coils 130, the one or more condenser coils 142 and compressors 140, the one or more control units 150, the one or more remote comfort sensors 160 and the one or more displays 170 such that data may be communicated therebetween or thereamong. As will be understood, the data bus 180 may be advantageously employed to convey one or more alarm messages or one or more diagnostic messages.



FIG. 2 is a high-level block diagram of one embodiment of an HVAC data processing and communication network 200 that may be employed in the HVAC system 100 of FIG. 1. One or more air handler controllers (“AHCs”) 210 may be associated with the one or more air handlers 110 of FIG. 1. One or more integrated furnace controllers (“IFCs”) 220 may be associated with the one or more furnaces 120. One or more damper controller modules 215, also referred to as a zone controller module 215, may be associated with the one or more dampers 114 the interface the one or more dampers to the data bus 180. One or more AC controllers 225 may be associated with one or more evaporator coils 130 and one or more condenser coils 142 and compressors 140 of FIG. 1. The network 200 includes an active subnet controller (“aSC”) 230a and an inactive subnet controller (“iSC”) 230i. The aSC 230a is responsible for configuring and monitoring the system 100 and for implementation of heating, cooling, air quality, ventilation or any other functional algorithms therein. Two or more aSCs 230a may also be employed to divide the network 200 into subnetworks, or subnets, simplifying network configuration, communication and control. The iSC 230i is a subnet controller that does not actively control the network 200. In some embodiments, the iSC 230i listens to all messages passed over the data bus 180, and updates its internal memory to match that of the aSC 230a. In this manner, the iSC 230i may backup parameters stored by the aSC 230a, and may be used as an active subnet controller if the aSC 230a malfunctions. Typically there is only one aSC 230a in a subnet, but there may be multiple iSCs therein, or no iSC at all. Herein, where the distinction between an active or a passive SC is not germane the subnet controller is referred to generally as an SC 230.


A user interface (UI) 240 provides a means by which an operator may communicate with the remainder of the network 200. In an alternative embodiment, a user interface/gateway (UI/G) 250 provides a means by which a remote operator or remote equipment may communicate with the remainder of the network 200. Such a remote operator or equipment is referred to generally as a remote entity. A comfort sensor interface 260 may provide an interface between the data bus 180 and each of the one or more comfort sensors 160.


Each of the components 210, 220, 225, 230a, 230i, 240, 250, 260 may include a general interface device configured to interface to the bus 180, as described below. (For ease of description any of the networked components, e.g., the components 210, 220, 225, 230a, 230i, 240, 250, 260, may be referred to generally herein as a device 290. In other words, the device 290 of FIG. 2 is a proxy for any of a furnace, a heat pump, a subnet controller, etc, and that device's associated interface means.) The data bus 180 in some embodiments is implemented using the Bosch CAN (Controller Area Network) specification, revision 2, and may be synonymously referred to herein as a residential serial bus (RSBus) 180. The data bus 180 provides communication between or among the aforementioned elements of the network 200. It should be understood that the use of the term “residential” is nonlimiting; the network 200 may be employed in any premises whatsoever, fixed or mobile. In wireless embodiments, the data bus 180 may be implemented, e.g., using Bluetooth™ or a similar wireless standard.


Turning now to FIG. 3A, illustrated is a diagram 300 of a series of steps that occur in relation to a commissioning of the unit 155. The diagram 300 includes an enter state 301, a device commissioning state 303, and an exit state 305. The HVAC system 100 can be described as being partitioned into a plurality of subnets, each subnet controlled by its own active subnet controller 230a.


Device commissioning can generally be defined as setting operational parameters for a device in the network of the HVAC system, including its installation parameters. Generally, device commissioning 300 is used by the subnet controller 230 when it is active to: a) set operating “Installer Parameters” for a networked device, such as air handlers 110, (henceforth to be referred to collectively, for the sake of convenience, as the unit 155, although other devices are also contemplated), b) to load UI/Gs 240, 250 with names and settings of “Installer Parameters and Features” of the units 155, c) to configure replacement parts for the units 155, and d) to restore values of “Installer Parameters and Features” in units 155 if those “Parameters and Features” were lost due to memory corruption or any other event. Device commissioning is a process used in the HVAC system 100, either in a “configuration” mode or in a “verification” mode.


In the “configuration” mode, the unit 155 shares its information with the subnet controller 230a in an anticipation of being employable in the HVAC system 100, and an appropriate subnet. Generally, the commissioning process 300 provides a convenient way to change or restore functional parameters, both for the subnet controller 230a and the unit 155.


In both the “verification” mode and the “configuration” mode, the unit 155 is checked for memory errors Or other configuration or programming errors. There are differences in device 260 behavior between the “configuration” mode and in the “verification” mode, to be detailed below.


The “subnet startup” mode programs the subnet controller 230 to be active. The “subnet startup” mode enables subnet communications, (i.e., communication within a subnet), and also deactivates a “link” sub-mode. A “link” mode may be generally defined as a mode that allows a number of subnets to work together on the same HVAC network 100, and that assigns subnet numbers for each subnet to allow this communication.


The “installer test” mode is employed when an installer installs and tests aspects and units 155 of the HVAC system 100. The “normal operations” mode is an ongoing operation of devices 260 of the HVAC system 100 in a normal use.


More specifically, the device commissioning state machine 300 can be employed with: a) the “configuration” mode, which is invoked when transitioning to the commissioning state from the “subnet startup mode” or “installer test” mode, or the “normal mode”, or b) a “verification” mode. The “verification” mode is invoked when transitioning to the commissioning state from the “subnet startup” mode.


The following describes an illustrative embodiment of a process of commissioning 300 the HVAC unit 155, first for a “configuration” mode, and then for a “verification” mode. The process of commissioning differs from a “subnet startup,” in that commissioning requires that the network configuration, including configuration and activation of subnet controllers 230, has already been completed before the commissioning 300 of the device 260 can start. Please note that there can be more than one subnet controller 230 on a subnet, but only subnet controller 230a is active at any one time.


In one embodiment, in order to enter into the state 320 of the process 300 in the “configuration” mode, the unit 155 receives either: a) an “aSC” (‘active subnet controller’) Device Assignment message”, having “Assigned State” bits set to “Commissioning”; or b) a receipt of an “aSC Change State” message, with “New aSC State” bits set to “Commissioning,” from the active subnet controller 230a. For both “configuration” and “verification” modes, an “aSC Device Assignment” message can be generally regarded as a message that assigns the unit 155 to a particular active subnet controller 230a. For both “configuration” and “verification” modes, an “aSC Change State” message can be generally regarded as a message that starts and ends employment of the commissioning state diagram 300 for the units 155 and all other devices on the subnet.


In the state 320 in the configuration mode, all units 155 respond to the “aSC Device Assignment” message with their respective “Device Status” messages, indicating that the units 155 are now in commissioning process 300 due to their response to this previous message. For both “configuration” and “verification” modes, the “Device Status” message can be generally defined as message that informs the active subnet controller 230a of what actions are being taken by the unit 155 at a given time.


However, alternatively, in other embodiments, in the state 320 in the “configuration” mode, if the units 155 are instead busy, as indicated by “aSC Acknowledge” bits of the “Device Status” message sent to the subnet controller 230a set as a “Control Busy,” the active subnet controller 230a will wait for the busy units 155 to clear their “Control Busy” bits before proceeding with further elements of the Commissioning 320 process. The units 155 then resend their “Device Status” messages as soon as they are no longer busy.


From this point on, all units 155 send their “Device Status” messages periodically and on any status change, both during and after the commissioning 300. If the unit 155 does not clear its “Control Busy” bits within a minute (indicating its control is no loner busy), the active subnet controller 230a sends an “Unresponsive Device2” alarm for each such unit 155. If in “configuration” mode, the active subnet controller 230a remains in the waiting mode indefinitely, until the unit 155 responds correctly, or the subnet is reset manually or after a timeout is reached. In “verification” mode the active subnet controller 230a proceeds further to exit the state.


In the “configuration” mode, each unit 155 remembers all of its optional sensors that are currently attached to it. Furthermore, each unit 155 may store a local copy in its non-volatile memory (“NVM”) of all of any other unit features that it is dependent on. A unit 155 feature can be generally defined as any datum that is fixed and cannot be changed by the installer, serviceman or the home owner. Changing of a “Feature” value normally involves reprogramming of the units 155 firmware.


In at least some embodiments, a feature is something that is fixed value that is hard-wired into a device. In other words, no installer or home owner can change it. Features are programmed into the unit 155 during a manufacturing or an assembly process. Features can be recovered in a home, during a Data non-volatile memory (“NVM”) recovery substate of Commissioning state only—the recovery substate happens automatically and without installer or user intervention. In a further embodiment, parameters can be changed by the installers only. In a yet further embodiment, the HVAC system 100 employs “variables”—those can be changed by the installers and also the home owners.


In some embodiments, a “Parameter List” is normally a Feature that contains a special list of specific parameters included in the unit 155. Parameter values can be changed, and their state can be changed also (from enabled to disabled and vice-versa), but their presence is set once and for all in a given firmware version. Therefore, a list of Parameters (not their values) is also fixed, and is thus treated as a “Feature.”


However, although elements of the “configuration” mode commissioning and “verification” mode commissioning are similar, when the active subnet controller 230a is in “verification” mode instead of in “configuration” mode, the active subnet controller 230a can exit commissioning 300 regardless of the value of the alarms of the units 155. However, alternatively, if the active subnet controller 230a is in “configuration” mode, the active subnet controller 230a will not exit from its commissioning state 300 for as long as at least one unit's 155 “aSC Acknowledge” flags are set to “Control Busy.” In one embodiment of the “verification” mode, the active subnet controller 230a timeouts the installation and resets the subnet to default parameters.


In the “verification” mode, assuming the unit 155 operates with a non-corrupted (original or restored copy) NVM, each unit 155 checks any of its attached sensors to see if they match with the parameters that were present in a most recent configuration of the unit 155. In some embodiments, alarms are generated by the unit 155 for missing or malfunctioning sensors as soon as the faulty condition is detected, to be employed by the user interfaces and gateways present on the subnet to notify the installer or homeowner of the encountered problem. The unexpected absence of certain sensors may inhibit the operation of the unit 155 or the subnet. This is normally manifested by the signaling of the appropriate Service Bits in the Device Status message used by the active subnet controller 230a, to determine the operational viability or health of the subnet's systems.


In some embodiments, the device commissioning process 300 then transitions into a state 305, and then ends, upon either: a) the last unit 155 receiving all of unit 155 parameters that it is dependent on, when in “verification” mode; or b) upon a request by a user, when in “configuration” mode. The active subnet controller 230a then proceeds to ensure that no subnet unit 155 has its “aSC Acknowledge” flag set to a “Control Busy” state. The “aSC Acknowledge” flag not being set indicates that all of a non-volatile memory of a given unit 155 had been written to with the necessary parameters. If no “Control Busy” state is detected, the active subnet controller 230a then issues the “aSC Change State” message, which forces the unit 155 from a commissioning state to a non-commissioning state, in either a “configuration” or a “verification” mode.


In some embodiments, when the unit 155 in the process 300 fails its NVM data integrity check in an “NVM Check State,” and the active subnet controller is unable to perform NVM Recovery, the unit 155 instead employs its default data stored in its non-volatile (Flash) memory and/or uses default calculations to initialize the data dependent on other devices in the system. The other device data to be used for commissioning could have been obtained in either the “verification” or “configuration” mode. For data or other parameters that were not transferred or generated as part of that commissioning 300 session, default values are used.


In one embodiment, upon a detection of a system configuration error, such as a missing device whose features or parameters the unit 155 depends upon, it uses the locally stored copy of the other device's features that it depends upon, and ignores any potential feature value conflicts. In another embodiment, the unit 155 uses the locally stored copy of other parameters of the unit 155 that it depends on and ignores any potential dependent parameter value conflicts. In other words, the unit 155 employs a first installed parameter as a template for a second installed parameter on a second device. In a third embodiment, the unit 155 will change its parameter or feature values only if explicitly instructed by the active subnet controller 230 or the UI/G 240, 250.


Turning now to FIG. 3B, illustrated is an HVAC device state machine 310 illustrated for a subnet, including the unit 155, in more detail. Solid lines indicate normal state transitions when the subnet is transitioning from one state to another state, green lines indicate a subroutine call and red lines, alternating dotted and dashed lines indicate unexpected yet valid transitions. All states other than state 326 represent device states, and the state 326 represents a message handling routine.


As is illustrated in the present embodiment, a reset state 312 of a subnet advances to a NVM CRC check 316 for a given device (such as unit 155). If the device fails the test, the device advances to a NVM programming 318. If the device passes, however, then in subnet startup 320, the device is assigned an address (Equipment Type number) and some features and parameters of the unit 155 may be shared with the subnet. Then, in substate 324, device commissioning as described in FIG. 3A occurs. This then leads to an installer test state 328. This, in turn, then leads to a link mode startup 330, as described above. Finally, then in a step 334, normal system operation occurs, although system can reset to state 312 or be brought to states 314 or 332 via diagnostic messages handled in a state 326.


In a further embodiment, during the NVM CRC check 316, the state machine 310 can advance to a NVM programming state 318. This can occur due to such factors as a failure of a non-volatile memory, or an initial programming of the NVM. In a yet further embodiment, each of these units 155 is programmed to deal with one form of a diagnostic message regarding system errors in a state 326, and from there to testing the device 160 itself in an OEM test mode 332.


Turning now to FIG. 3C, illustrated is a state flow diagram 340 for the active subnet controller 230a in relation to the unit 155. Generally, is the responsibility of the active subnet controller 230a to implement proper state transitions. The other units 155 follow the explicit direction of the aSC 230a for all valid transactions. These state diagrams are included to help ensure that a state of the unit 155 is the same as the subnet controller. The SC 230a is responsible for device synchronization. If the unit 155 is detected out of synch with the rest of the system, the aSC 230a, in some embodiments, immediately tries to bring the unit 155 to the current system state, if possible.


If an addressable unit 155 is detected in subnet startup 344, the subnet controller 230a applies asynchronous startup rules, which generally pertain to how many parameters are to be passed between device 290 of the addressable unit 155 and the active subnet controller 230a.


If an addressable unit 155 is detected in commissioning 345, installer test 346, link mode 347 or normal operation 348 substates, the unit 155, in some embodiments, is brought to the current state via a resend of an “aSC Change State” message, which involves transitioning from a first current aSC state to a second current aSC state.


In some embodiments, if a unit 155 is detected in OEM Test or Soft Disabled state, the unit 155 shall be reset by the active subnet controller 230a in a step 342. If a unit 155 is detected in “Hard Disabled” or “NVM Programming” state, the active subnet controller 230a assumes that it is not available on the subnet.


In a further embodiment, inactive subnet controllers 230i are required to keep the most up to date subnet and HVAC system configuration information. Inactive subnet controllers 230i listen to all UI/G and aSC messages and continuously update their non-volatile memory to attempt to be as consistent as possible with the settings stored in active subnet controller 230a.


Programming and Configuration


Turning now to FIG. 4, illustrated is one embodiment of an RSBus Error Frame 400 that can be employed during a detection of an error condition of the units 155 over the RS bus 180 of the network 200, although over Error Frames are employable. In one embodiment, messages within the HVAC system 100 follow a format based on the “Bosch CAN2.0B standard” of the extended frame with a 29-bit identifier. A single message frame 400 includes the “Start of Frame bit,” (“SOF”) the “Arbitration Field,” the “Control Field,” the “Data Field,” the “CRC Field,” the “ACK Field” and the “End of Frame” Field. Each message frame starts with a dominant SOF bit (logical 0). All units 155 on the network ready to transmit messages may synchronize on the “start” bit generated by the unit 155 that initializes the transmission. Please note that in the following descriptions, “devices” and “units” may be used interchangeably.


Corrupted Data Memory Handling


All units 155 coupled to the RSbus 180 (“RSbus devices”) typically can have rewritable non-volatile memory (“NVM”) to support the CAN protocol implementation. Following will be a description of actions that can take place when the non-volatile memory of the unit 155, and later to be discussed the 230a, is corrupted.


In one embodiment, all protocol related unit 155 settings stored in its own EEPROM in its own NVM memory, are also backed up by all subnet controllers 230, both active and inactive, on the subnet. In a further embodiment, units 155 can back up some application specific data in the subnet controllers 230. This can happen in form of special feature numbers that are part of the “Feature Manifest” in the “Commissioning” state 300, discussed above. In case of a NVM memory corruption, such as can occur as an electrically erasable programmable read-only memory (“EEPROM”) corruption within the unit 155, there are exemplary steps that are taken to ensure best possible data integrity, as will be discussed below.


As will be discussed below, in one embodiment, if the unit 155 has an internal copy of its own EEPROM settings to facilitate its memory recovery, the recovery of the back-up memory within the unit 155 is transparent to the behavior of the device in the system, which means that the unit 155 is able to work correctly (using the backed up correct values) before sending out a “Device Startup” message.


Generally, the actions to recover back-up data in a case of memory corruption are undertaken by the unit 155 in conjunction with the active subnet controller 230a. There are four exemplary failure modes that are typically possible:


a. The unit 155 loses its data but is able to recover them from an internal back-up. (Also discussed above.)


b. The unit 155 is unable to retrieve the values on its own. The active subnet controller 230a has previously stored correct values for the unit 155. The active subnet controller 230a can therefore relay the backed-up data to the unit 155.


c. The active subnet controller 230a has corrupted back-up data, and it therefore recovers uncorrupted back-up data from the unit 155.


d. If both the active subnet controller 230a and the device 110 are unable to retrieve previous data, the unit 155 shall revert to the default settings and update the active subnet controller 230a.


In one embodiment, the actions undertaken by the device and the active subnet controller 230a upon receiving a message from the device 155 indicating internally unrecoverable corruption of its parameters in the above scenarios are as follows:


a. In this case, there is no message indication of the problem and the unit 155 can attempt to recover the data from its internal back-up in a manner totally invisible to other addressable RSBus units 155, as discussed above. As discussed above, no indication is typically given to the active subnet controller 230a and control follows a “normal” mode of operation. If in “Verification Mode”, typically there is no need to perform full “Feature Manifest,” “Non-Communicating Check” and “Parameter Scan” in Commissioning by the active subnet controller 230a.


b. In this case, the unit 155 can start with its “DEVICE Startup message” sent on a selected Subnet (subnet “0”), using the default equipment type (“ET”), with the CF6 flag cleared. Generally, regarding the CF6 flag, within the device 110, CF6=0 if the unit 155 has failed the Data CRC check (all RSBus Data are invalid and are returned to default values)—as a result, CF0 flag is reset. Generally, the Control Serial Number is the serial number of the control board put inside of equipment. Equipment serial number can be the serial number of the furnace, or heat pump, or so on that contains the control board.


In one embodiment, the unit 155 responds to all subnet controller Coordinator messages with the same message until a new ET and Subnet ID are assigned to the unit 155. As long as the NVM data is not recovered within the unit 155, the CF6 flag of the unit 155 remains reset. The active subnet controller 230a can still recognize the device, using its “DD”, and can assign, in one embodiment, the same “ET” and “Subnet ID” to it as it had before. Immediately after recognizing that the unit 155 cannot retrieve its own NVM data, the unit 155 starts to recover all of its lost data, by retrieving their default values stored in the device flash. In the meantime, the active subnet controller 230a, upon entering “Commissioning” within the flows 310 or 340, shall reprogram the unit 155 with the data from its back-up. If so attempted, the unit 155 typically accepts the active subnet controller 230 data in place of its own default values.


c. This scenario typically only matters in “Verification” employment of the diagram 310, as in “configuration” mode the active subnet controller 230a can update its internal back-up data from all devices 155 anyway. Thus, in “Verification,” the active subnet controller initiates a full “Feature Manifest,” “Non-Communicating Check Scan” and “Parameter Scan” on the particular devices 155 that the active subnet controller 230a lost data from within its own memory, in place of the abbreviated version that normally happens during “Verification.”


d. In this case the unit 155 can retrieve its default values and, when in “Verification,” the active subnet controller shall proceed with the full “Feature Manifest,” “Non-Communicating Check Scan” and “Parameter Scan” on the particular devices that it lost data from, in place of the abbreviated version that normally happens during Verification.


Data NVM Recovery State


The active subnet controller 230a enters this commissioning state substate typically only when the unit 155 has reported a loss of its internal NVM settings (e.g. corruption of the EEPROM cyclical redundancy check (“CRC”)) and the active subnet controller 230a contains a valid previously backed up version of the unit 155 data, wherein the unit 155 had been previously successfully configured in the presence of the active subnet controller 230a. This checking by the unit 155 can happen, for example, in the NVM CRC check of state 316 of flow 310.


In one embodiment, the unit 155 can be recognized by the active subnet controller 230a when its DD matches exactly the DD for the stored back-up data and its Equipment Type (“ET”) is of the same type as the Equipment Type stored in the active subnet controller 230.


In one embodiment, the active subnet controller 230 provides features and parameters in the exact same order as the device specified in its feature or parameter manifest, respectively. This is achieved by inquiring the device for its respective “Feature Manifest Features List”, its “Non-Communicating Scan Parameters List” and its “Parameter Scan Parameter List,” and using the order the units 155 provides, without inquiring about the Feature or Parameter values, to supply these respective Features or Parameters in the same exact order.


Upon entering the “Data NVM Recovery” sub state, the active subnet controller 230a performs full “Feature Scan” and full “Parameter Scan” in both “Configuration” and “Verification” Modes, as discussed regarding FIG. 3A, above. There are three possible cases here:


a) active subnet controller 230a has corrupted its own copies of several units 155 Parameters—only for that one device. In some embodiments, the active subnet controller 230 keeps separate CRCs for each device data;


b) active subnet controller 230a has its entire EEPROM corrupted; and


c) the unit 155 has its EEPROM corrupted.


The following actions can be taken, after receiving the message indication of NVM data corruption from the unit 155:


a) the active subnet controller 230a forces this specific unit 155 to go through “Full Feature Manifest” and “Full Parameter Scan”, other devices are unaffected;


b) the active subnet controller 230a forces all units 155 to go through “Full Feature Manifest” and “Full Parameter Scan;”


c) the active subnet controller 230a forces this specific unit 155 to go through “Full Feature Manifest” and “Full Parameter Scan,” other devices 155 are unaffected.


Replacement Check State


In one embodiment, the network 200 automatically commissions replacement units 155 in a place, such as a customer home. When in “configuration” mode within the diagram 340, and the active subnet controller 230a determines that the unit 155 is missing and that a physically different, yet compatible unit 155 was put into the subnet with a “CF5” flag set, it prompts a user, via the U/IG 250 (which, for the duration of the description, can also alternatively mean the user interface 240), to decide whether the new unit 155 should have the parameters of the missing unit 155 copied into it. Generally, when the CF5 flag is set, it is indicative of a replacement part scenario. If affirmed by the user, and the parameters are copied into the unit 155 into it, the active subnet controller 230a proceeds to also store in the new unit 155, the relevant equipment-related features such as “Equipment Serial Number,” “Equipment Part Number” and its capacity as well as previously set “Parameter” values.


In one embodiment, the active subnet controller 230a checks the device compatibility by requesting the unit's 155 “Compatible Devices List” feature and checking the part numbers contained within it against the “Control Part Number” of the missing control. If there are any problems with programming any specific features or parameters of the new unit 155, the active subnet controller 230a prompts the user as to this issue, yet still attempts to program the remaining information into the unit 155.


Turning now to FIG. 4, illustrated is an exemplary method flow 400 of active subnet controller 230a behavior for identifying a replacement unit 155 and also for commissioning the replacement unit 155. In a step 401, the active subnet controller receives a new “DD.” In a step 403, the active controller 230a subnet determines whether the device 155 is entering a configuration state. If not, a step 405 is entered, and the new unit 155 is soft-disabled, and the flow ends.


However, in one embodiment, if the unit 155 is entering into a configuration state, it is then determined by the active subnet controller 230a if there are at least two of the same type units 155 present. If not, the flow 400 advances to a step 413. However, if two devices are present, the flow 500 advances to a step 409. In a step 409, it is determined if enough equipment types are available. In other words, it is determined whether the active subnet controller 230a can support this many types of devices. If not, the flow advances to step 511, and a too many devices of same type alarm is set off, and the flow ends. However, if a plurality of units 155 can be supported, that in step 413, the devices is accepted into the subnet.


Next, in step 415, it is determined whether a networked HVAC devices “ET” is in a same range as a missing device. If it is, then in a step 417, the new unit 155 is assigned with the missing devices ET, and the flow advances to a step 421. However, if not in the same range, then the new device is assigned with the next lowest (or highest if the device is a gateway), and advances to a step 431.


In step 421, the commissioning stage of the unit 155 begins. In step 421, it is determined whether the CF5 flag of the device 155 is set. When the CF5 flag is zero, and the DD does not match, this means that new equipment is added to the subnet and it should not be reprogrammed, hence no replacement scenario is triggered in “commissioning.” If the “CF5” flag is not set, the flow 400 advances again to step 431, otherwise the flow advances into a step 423.


In step 423, in one embodiment, it is determined whether the new part is a compatible replacement for the old part. If not, the flow 400 again advances to step 431. If yes, the flow 400 advances to a step 425. In step 425, a choice is displayed to a user, that shows the both the active subnet controller 230a old back-up copy and the new serial and part numbers. In a step 427, it is determined whether the user selects the old control serial and part numbers from the old back-up copy provided by the active subnet controllers 230a, or the new numbers. If the user does not employ the old values provided by the active subnet controller 230a, the flow 500 advances to step 431. If yes, the flow advances to step 429. In step 531, the newly found part is treated as a new device.


However, in a step 429, the active subnet controller 230a copies the back-up serial and part numbers into the device 155, as well as other pertinent information. In a step 433, the active subnet controller 230a keeps the old unit 155 settings until an active subnet controller 230a “Change State” is invoked into an “Installer Test” mode. Both steps 431 and 433 advance to step 435, wherein the replacement check ends.


Turning now to FIG. 5A, illustrated is a high level block diagram of an embodiment of a subnet 540 with a non-volatile memory back-up included within a subnet controller 542 of the HVAC network 200. The subnet controller 542 includes a back-up memory for devices 544 and a memory conveyor 545. The back-up data can be conveyed over the RSbus 180 to a HVAC device 546, 548, each have a NVM memory 547, 549, respectively.


Generally, in the system 540, a back-up system configuration and other information for the subnet 540 is stored into the subnet controller 542, which can be active or inactive. The back-up data includes various setup data (which is typically non-volatile data) for each device 546, 548 that has data that is typically modified or received by the subnet controller 230, such as during the commissioning 300 process.


The back-up of data between the subnet controller 542 and the devices 546, 538 can occur in at least two scenarios: a) the device 546, and/or 548 is replaced with a same or equivalent device, wherein an equivalent device can be generally defined as having compatible parameters to be modified by the subnet controller, such as discussed regarding flow 400, above; and b) there is non-volatile data corruption within the device 546, 548 or the subnet controller 542. The subnet controller 230 can be an active or inactive subnet controller 230.


Turning now to FIG. 5B, illustrated is an embodiment of flow for a method 550 for transferring back-up information between a subnet controller and a coupled device in a subnet of the HVAC network 200.


After a start step 552, in one embodiment, in a step 555, back-up information is stored for the unit 155 in a coupled subnet controller of a subnet of the HVAC system 100. In a step 560, it is determined whether a memory corruption, correlating to the non-volatile information for the device, has occurred in the subnet controller 230. If not, the method 550 advances to a step 570. If yes, the method 550 advances to step 565.


In a step 565, it is determined whether a memory corruption has occurred in the device 155. If no corruption has occurred, the method 550 conveys the back up information from the device 155 to the subnet controller 230, and the steps stop in step 595. If corruption has occurred, the device restores its own value from back-up and then conveys this value to the subnet controller 230, and the steps stop in step 595.


In the step 570, it is determined with the unit 155 has been replaced by a unit of a compatible type. If yes, back-up information is conveyed to the device in a step 590, and the method 500 ends in the stop step 595. If not, however, in a step 580, it is determined whether a memory corruption has occurred in the unit 155. If no, the method 550 stops in a step 595. If yes, again in the step 590, back-up information is conveyed to the device 155, and the steps stop in the step 595.


Turning now to FIG. 6, illustrated is a state diagram 600 illustrating that, in some embodiments, a UI/G 601 can flash program memory of multiple HVAC devices/addressable units 602, 603. In one embodiment, up to 32 HVAC devices' 155 application code can be programmed over the bus 180. This diagram is generally directed towards NVM programming. NVM programming serves to update the program and happens from the UI/G, and the active subnet controller 230a is typically not involved.


Typically, RSBus units 155 are required have a flash memory, which offer more functionality than one time-programmable or masked memory. Flashing can be generally defined as programming a non-volatile memory that can, nonetheless, be written over with a late flash. Furthermore, the units 155 are typically able to be flashed over the RSBus 180 in an installation factory, and the units 155 typically have the ability to be flashed over the RSBus 180 in the field, after they were put on the market. These two scenarios are different, as they affect different areas of the flash memory space.


In one embodiment, flashable space can be divided into at least three segments that contain a separate code and two data areas—supplier and manufacturer data areas, as shown in FIG. 7A, to be discussed below: “Example HVAC Device Memory Structure.”


During the build of the code area in its factory, a supplier typically flashes the code area with the most up to date version of the code, as well as the first one of the data areas—the supplier data area, which includes data only relevant to the control, such as “Device Designator,” “Control Part” and “Serial Number,” etc. leaving the installer data area, such as manufacturer data, set to all zeros. If a controller board is then used as a component of an installer built product, all installer equipment related information (including the Serial and Part Number of the equipment the controller board is put in) needs to be flashed into the installer data area at an installation plant. It is typically up to the supplier to choose to the right technology to store the two data areas—they can either be stored in the microcontroller flash memory, or possible in an on- or off-board EEPROM.


Turning now to FIG. 6A, illustrated is an exemplary flow 605 for programming a non-volatile memory in an HVAC device/addressable unit. NVM flashing flow 605 supports flashing of application/firmware code in units 155 over the RSBus 180. The unit 155 can be flashed by the UIG 250 or a computer connected to RSBus 180 through the gateway 250.


Generally, the NVM flashing flow 605 uses “class 6” diagnostic messages to enter and exit the “NVM Bootloader” in a step 620, to be discussed below. Generally, Class 1 messages to/from UI/G, class 3—broadcast, class 5 to/from SC and class 6 diagnostic (does not require valid ET or SID)—to/from UI/G.


The NVM flashing flow 605 can use “class 1” messages for flashing target devices. “Class 6” messages use Device Designator bits to address each specific device, so that even un-configured or disabled units 155 send and receive class 6 diagnostic messages. Each unit 155 enters boot loader mode 625 for flashing application code in its non-volatile memory. The target device 155 can enter boot loader in the following ways:


1. In one embodiment, upon reset 607, each device/addressable unit can calculate the checksum of the application code in a step 610. If there is a mismatch between the stored checksum and the calculated checksum, the target unit 155 enters boot loader mode in a step 625. The device shall broadcast a Device Request “UI/G Info On CRC Error” message every one minute until the user interface/gateway 250 responds by sending an “UI/G Request Device Enter Bootloader Mode” message. The unit 155 sends this message with connection status in connection initialization mode. A “Subnet ID” value is incremented for every message sent starting from 0. It is set to 0 after the maximum value of Subnet ID is reached (i.e. 3). The “CRC Error on Reset” bit is then set to 1. The UIG 250 ignores the connection number field if “CRC Error on Reset” bit is set to 1.


2. In one embodiment, the UI/G 250 can command the unit 155 to enter boot loader mode using command and response messages for connection establishment and password authentication. The target addressable unit 155 then completes its existing operation and then enter Bootloader mode 625. After bootloader mode 625, the device then enters either the NVM application programming mode 630 or the NVM feature programming mode 635. However, if the CRC check passes for CRC, the unit 155 enters into the application mode, and awaits the “Class 6” diagnostic messages in state 620, before entering into state 625.


Generally, the user interface/gateway 250 maintains device information for all the current devices it is trying to flash. For each unit 155 it will record information such as:


a. Device Designator;


b. Connection status;


c. Connection number; and


d. Cycle number.


In one embodiment, the UI/G 250 keeps a record of the device's total size of Flash available for application code, expressed in bytes, and in some further embodiments, also size of the available RAM. This information is retrieved from the unit 155 using command and response “Class 6” messages prior to actual flashing, such as illustrated in state 620. The UI/G 250 can verify that there is sufficient flash size on the units 155 prior to attempting to enter the bootloader mode 625.


In one embodiment, the UI/G 250 establishes a connection and assigns a unique connection number to each device 155. The command and response messages responsible for NVM Flashing within units 155 can follow 2 rules:


A. UI/G 250 or the target addressable unit 155 will wait for a maximum of 3 seconds to get a response.


B. The UI/G 250 or the target device 155 will update its response (to a command) in a CAN transmit buffer of the UIG 250 or the device 155 within 100 milliseconds.


Connection establishment can be performed by exchanging messages between UIG 250 and the target device 230 as described below, as also referenced the FIG. 6A:


1. In one embodiment, the UI/G 250 sends a bootloader entry command to the target device 155 (Message: “UI/G Request Device Enter Bootloader Mode”). The UI/G 250 updates the connection status field in this message to connection initialization mode. In one embodiment, the unit 155 does not accept any further bootloader entry commands until the unit 155 connection status is reset to “no connection”. The UI/G 250 Device Designator and the target device's 110 Subnet ID are provided to the target units 155 by the UI/G 250 in this message. The UI/G 250 can assign a unique connection number to the target units 155.


2. In one embodiment, the unit 155 authenticates the UI/G 250 by requesting it to send password (Message: “Device Request Password”). The unit 155 also provides the available size of NVM memory, required for programming Application code.


3. In one embodiment, the UI/G 250 responds by sending a password string in the message data (Message: “UI/G Send Password”). After validating the password, the unit 155 stops executing its current application, and will instead start executing Boot loader code. The password string can be encrypted using the encryption/decryption algorithm. If the password does not match, the device 155 typically responds with “Device UI/G Bootloader Status” message in NVM Programming mode.


In one embodiment, if the log-in process into the NVM bootloader was initiated as a result of NVM CRC Check failure, such as in the step 610, the unit 155 then proceeds to periodically resend the “Device UI/G Bootloader Status” messages. If the log-in process was initiated from the application, such as in step 615, the device then exits NVM Programming state 630, goes back to the interrupted application and resumes normal operation.


4. In one embodiment, the unit 155 acknowledges the UIG 250 by updating the connection status to connection established mode (Message: “Device Acknowledge Bootloader Mode”). The unit 155 estimates a maximum allowable data it can store in its RAM buffer before flashing it to NVM. The unit 155 provides its RAM buffer size (Packet size) in this message.


Steps to disconnect an established connection in one or various embodiments:


1. Once the flashing is complete, the UI/G 250 sends a command to exit boot loader mode (Message: “UI/G Request Device Exit Bootloader”).


2. The connection between the target device 155 and the UIG 250 is disconnected if the UI/G 250 request to exit boot loader mode. The target unit 155 sends an acknowledgement and performs a self-reset (Message: “Device Acknowledge UI/G Exit Bootloader”).


Turning now to FIG. 6B, illustrated is one embodiment of a code segmentation to be used when programming or reprogramming a Non-Volatile Memory of a device. Generally, the UIG 250 and the target unit 155 follow a segmented message transfer protocol to send application code over the RSBus network 180. The UI/G 250 divides application code in to smaller packets and each packet will be further divided into messages. The Packet Size is defined by the target unit 155 and is sent to the UI/G 250 using a “Device Acknowledge Bootloader Mode” message. In each cycle, one packet will be transferred and the cycle count will be incremented by one.



FIG. 6B illustrates shows an embodiment of a segmentation procedure 640 for flashing an application code 645 in units 155. In one embodiment, the application code 645 can be divided in to 65536 packets. In one embodiment, the maximum size of each packet can be up to 4093 bytes (as 2 bytes are required to define the Packet Size). In one embodiment, the segmented message transfer protocol supports flashing of 255.812 Megabytes of application code 645 in to the target unit 155.


In one embodiment, the UI/G 250 uses the “UI/G Send Segmented NVM Flashing Data Transfer Protocol” message to send Packets to the unit 155. After each Transfer Protocol session (i.e. each cycle) the unit 155 sends the “Device UI/G Bootloader Status” message, indicating a status of the received packet. Upon receipt of an error, the UI/G 250 takes corrective action immediately after the end of TP session. Some Exemplary “Flashing Errors and Status Values” are described as below:


1=Cycle transfer complete;


2=Incorrect password;


3=Wrong connection number;


4=Device connection status already in initialization mode or connection established mode;


5=Device connection timed out;


6=Wrong application target;


7=Wrong cycle number;


8=Insufficient application memory size;


9=Wrong connection status;


10=NVM flashing complete;


129=Wrong TP sequence number; and


130=CRC error after NVM flashing.


In a case of a communication timeout with the UIG 250, the unit 155 can send its “Device UI/G Bootloader Status” message as soon as the time-out occurs, and then every one minute after that until a new attempt to establish a session is undertaken by the UI/G 250.


In one embodiment, once all the packets are written to its own NVM, the target unit 155 can perform a CRC check on the flashed application code. The target device/addressable unit 155 can send an acknowledgement with the Error and Status value equal to NVM flashing complete. In a further embodiment, the boot loader may copy NVM flashing subroutines/functions in RAM. Each unit 155 may reset after flashing is complete; and when it passes the CRC check, it shall start running the application code.


Turning now to FIGS. 6C1 and 6C2, illustrated are exemplary “UIG and Target Device Flashing Initialization Sequence” and a “UIG and Target Device Application Code Sequence”, respectively. Generally, while in the Bootloader Mode, maintaining of a time stamp and alarm logging are optional, as they might be limited by the amount of memory available. In one embodiment, the alarms are still issued as specified, with their time stamp value set to 0 if no time clock is available. Similarly, if no ET was set for the device, the default Equipment Type value is used—this is normally its lowest possible value for this device type.


In one embodiment, to communicate with the UI/G 250 while in the state, the device uses the UIID obtained from the UI/G messages addressed to it. In one embodiment, the “Equipment Type” for each UIG 250 is its UIID offset by +0x70 (ET=UIID+0x70). For the initial device messages that are not solicited by the UI/G 250, the device assumes the default Gateway UIID value of 15 (i.e. ET=0x7F).


In some embodiments, for all point-to-point “class 1” and “class 5” messages within the Bootloader the unit 155 uses the same ET number. The ET is the arithmetic sum of a fixed number and the assigned Connection number. While sending the alarms, the device 155 uses its default (lowest possible value) ET number unless previously assigned otherwise (when entering the state from other than failed CRC Check).


Turning now to FIG. 7A, illustrated is an exemplary HVAC device memory structure 700 for use in unit 155 of the HVAC network 200 of the HVAC system 100. Generally, the memory structure 700 allows for an efficient, non-volatile memory management in embedded HVAC devices that can be either initially programmed or restored. In a further embodiment, the structure 700 allows for it firmware to be updated without affecting data stored in previous revisions in the firmware.


In one embodiment, the structure 700 includes a flash memory 703 to retain program code and constant data. The structure 700 also includes an EEPROM memory 704 to store all application data. In the illustrated embodiment, the structure 700 employs a Harvard architecture microprocessor (or microcontroller.) In an alternative embodiment, for a von Neumann type microprocessor (or microcontroller), a code memory space 705 and a data memory space 715 are combined.


In some embodiments, proprietary information is stored into a memory area 725, such as a page, during equipment assembly process in a manufacturing plant and includes factory programmable features. This data is stored in the flash memory 703, so that writing application data 730 within the EEPROM data memory 704 does not erase these values. In one embodiment, a difference between data stored in the application data 730 and data stored in the data memory space 715 of flash memory 703 is that data memory space 703 is data used by the program to set parameters for the device 155, whereas the memory 704 is used for to store this program and may additionally include manufacturer type information, i.e., information that exists in the device 155 before it is installed.


In a further embodiment, a bootloader memory area 710 contains a protected bootloader program that can not be flashed. The protected area of the memory 703 can further include a protected space, a protected page 720. The protected space 720 can include the DD, which can be based off of the unique 32 bit MAC address value, a control serial number, a control part number, and anything else explicitly requested to be stored in a device 155 by a supplier specification.


For units 155 that are to be assembled at a factory, the manufacturer data space 725, which can be a protected data page, contains information that is to be programmed into the memory system 700, such as a unit model number and an unit serial number that the unit 155 is a part of. Generally, the supplier data page 725 is programmed during a factory test by the assembler when a replacement part is put into an existing unit by an assembler at a factory or in the field by an installer. In a further embodiment, all manufacturer-programmed features are stored as application data 730 in the area 704, separate from the factory programmed features. The default parameter values are also permanently stored in the NVM, in section 715 (for von Neumann device architectures memory spaces 705 and 715 are one and the same.) The current values of these manufacturer parameters are typically stored in EEPROM.


In one embodiment, if firmware were to be upgraded in the structure 700, the new firmware version reads the previous NVM 715 values, and can add new values to these features, without destroying existing data. In some embodiments, all device features stored in the flash memory 703 are to protected, which is achieved by storing them in their own memory flash areas.


Turning now to FIG. 7B, illustrated is an exemplary method 730 for flashing data into a device having an embodiment of the device memory structure. After a start step 732, in a step 735, a code area is flashed in an HVAC device/addressable unit by a supplier. In a step 740, a first data area in an HVAC device is flashed by the control board supplier. In a step 745, a second data area is flashed during final equipment assembly of the HVAC device. The method 730 stops in a step 747.


In some embodiments, all units 155 have flash memories that are flashable with employment of the method 640. Furthermore, the units 155 are flashed over the RSBus 180 in a assembly factory, and the units 155 also further have an ability to be flashed over the RSBus 180 in the field, after they are put on market, and can also be performed through the UI/G 250 over the Internet, as can other interactions with the HVAC system 100. The flashable memory space is divided into at least three segments that contain a separate code and two data areas—supplier and equipment manufacturer (such as manufacturer data areas), as discussed above regarding FIG. 7A.


In one embodiment, during the build in its factory, the supplier flashes the code area with a most up to data version of the code, such as in step 735, as well as the first one of the data areas, such as in step 740. In one embodiment, the supplier data includes the device designator, a control part, and a serial number, and leaves the installer data area all zeros. If the control part information is used as a component of an installer-built product, the supplier equipment-related information (including the serial and part number of the equipment the controller is programmed in) is flashed in a step 745 into the equipment manufacturer data area, at the equipment manufacturer's factory or in the field. In a further embodiment, the supplier can choose a technology to store the various data areas—they can either be stored in a microcontroller flash memory, or in an alternative, in an on-or-off board EEPROM.


Turning now to FIG. 7C, illustrated is an exemplary flashing of a memory area of a memory device of a unit 155, illustrated in more detail.


Turning now to FIG. 7C, illustrated is an exemplary flow of a method 750 for loading parameters into a protected memory of the structure 700 of the unit 155. After a start step 755, in a step 760, bootloader code is stored into a protected flash memory of an HVAC device. In a step 765, a device designator is stored into the protected flash memory of the HVAC device. In a step 770, a control serial number is stored in the protected flash memory of the HVAC device. In a step 775, a control part number is stored into the protected flash memory of the HVAC device.


In a step 780, other explicitly requested device information is stored into the protected flash memory of the HVAC device. In a step 785, application data is stored into a separate EEPROM memory of the HVAC device. In a step 790, a bootloader code is invoked to flash code into the HVAC device. The method stops in a step 795.


Turning now to FIG. 8A, illustrated is an exemplary method 800 for reading an RFID that is coupled to control board of a HVAC device/addressable unit. In some embodiments, HVAC networks 200 include control boards that can be changed out if they are faulty. When the boards are changed out and replaced, an installer sets jumpers or flips switches to configure a new board to work properly. Employment of RFID tags can help with this, as this information, received by an RFID reader from an RFID tag, can be used by the installer to install the board into an HVAC device.


First, an RFID tag may be installed close to where the control board will be installed within the HVAC device. The control board is equipped with an RFID reader. When power is applied to the board, it sends out a radio-frequency that powers the RFID tag, and the RFID will then transmit setting information that are associated with the unit to the control board. This information will then be used by the control board or the installer to install or otherwise configure the board. In some embodiments, this can allow one type of control board to be used with multiple type units, as the control board configures itself based upon the information it receives from the RFID. The RFID does not need batteries, and is only powered when the control board requests the unit information.


In the exemplary method 800, after a start step 805, an RFID device is installed in a HVAC device in a step 810. In a step 815, an HVAC control board for a device that includes an RFID reader is installed. In a step 820, the board is powered up, and the RFID reader also is powered up. In a step 825, the RFID reader reads the RFID information transmitted by the RFID tag within the HVAC device. In a step 830, the method stops. In a further embodiment of the method 800, the board employs the information read by the RFID reader to configure itself.


Turning now to FIG. 8B, illustrated is a system 850 including a HVAC device 855, an RFID tag 860, an installed control board 865 for the HVAC device 855, and an RFID reader 870. In one embodiment, when the control board 865 is installed in the HVAC device 855, or is otherwise interested in device 855 information, the RFID reader 870, installed within the controller board, reads the RFID tag 860, and this information is conveyed to the control board 870 to be used for commissioning, which can include as initial set-up or replacement.


Those skilled in the art to which this application relates will appreciate that other and further additions, deletions, substitutions and modifications may be made to the described embodiments.

Claims
  • 1. A system for restoring operating control data to a networked heating ventilation and air conditioning (HVAC) device coupled to an HVAC system controller in a network, comprising: a storage system located within the controller and configured to store the operating control data;a first subsystem configured to determine whether the operating control data in the storage system and in the HVAC device are corrupted; anda second subsystem configured to convey the operating control data in the HVAC device to the storage system when only the operating control data in the storage system is corrupted and to convey the operating control data in the storage system to the HVAC device when only the operating control data in the HVAC device is corrupted,wherein the HVAC device is configured to restore the operating control data therein with a default value and convey the default value to the storage system when both the operating control data in the storage system and the HVAC device are corrupted.
  • 2. The system of claim 1, wherein the controller is a subnet controller configured to selectively operate as one of an active subnet controller and an inactive subnet controller.
  • 3. The system of claim 2, wherein the controller is an active subnet controller.
  • 4. The system of claim 1, wherein the controller is an active subnet controller and further comprising an inactive subnet controller coupled to the subsystem.
  • 5. The system of claim 4, wherein the active and inactive subnet controllers are each configured to store the operating control data.
  • 6. The system of claim 1, wherein the second subsystem interconnects a user interface and the device.
  • 7. The system of claim 1, wherein the second subsystem interconnects the controller and the device.
  • 8. The system of claim 1, wherein the default value is an internal copy of default operating control data in the HVAC device.
  • 9. A method for backing up operating control data of a networked heating ventilation and air conditioning (HVAC) device to an HVAC system controller in a network, comprising the steps of: transferring the operating control data in the HVAC device to the controller;storing the operating control data in the controller;determining whether the operating control data in the controller and in the HVAC device are corrupted;transferring the operating control data in the HVAC device to the controller when only the operating data in the controller is corrupted;transferring the operating control data in the controller to the HVAC device when only the operating data in the HVAC device is corrupted; andrestoring the operating control data in the HVAC device to a default value and conveying the default value to the controller when both the operating control data in the controller and in the HVAC devices are corrupted.
  • 10. The method of claim 9, wherein the method is performed with a user interface or gateway.
  • 11. The method of claim 9, wherein the method is performed with an active subnet controller.
  • 12. The method of claim 9, wherein the controller is a subnet controller.
  • 13. The method of claim 9, wherein the controller has non-volatile memory, and wherein storing the data includes storing the data in the non-volatile memory.
  • 14. The method of claim 13, wherein the storing is performed while commissioning said HVAC device.
  • 15. The method of claim 14, wherein the commissioning is not terminated before said data is stored in the non-volatile memory.
  • 16. The method of claim 9, wherein the steps are performed in a commissioning process involving network configuration.
  • 17. The method of claim 9, wherein the steps are performed in a commissioning process involving network verification.
  • 18. The method of claim 9, wherein the default value is an internal copy of default operating control data in the HVAC device.
  • 19. An heating ventilation and air conditioning (HVAC) subnet controller configured to store back-up information for a networked HVAC device of a networked HVAC system subnet, comprising: a device memory storage configured to store the back-up information for a first HVAC device coupled to the subnet of the HVAC system; anda memory selector configured to: a) select a subset of the back-up information; andb) convey the subset of the back-up information to a second HVAC device coupled to the subnet when operating data of the second device is corrupted and the subset of the back-up information is not corrupted,wherein the second HVAC device is configured to restore the operating control data with to a default value and convey the default value to the subnet controller when both the operating control data and the subset of the back-up information are corrupted.
  • 20. The subnet controller of claim 19, wherein the subnet controller is configured to selectively operate as one of an active subnet controller and an inactive subnet controller.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. Provisional Application Ser. No. 61/167,135, filed by Grohman, et al., on Apr. 6, 2009, entitled “Comprehensive HVAC Control System” and U.S. Provisional Application Ser. No. 61/852,676, filed by Grohman, et al., on Apr. 7, 2009, and is also a continuation-in-part application of application Ser. No. 12/258,659, filed by Grohman on Oct. 27, 2008 now abandoned, entitled “Apparatus and Method for Controlling an Environmental Conditioning Unit,” all of which are commonly assigned with this application and incorporated herein by reference. This application is also related to the following U.S. patent applications, which are filed on even date herewith, commonly assigned with this application and incorporated herein by reference: Ser. No.InventorsTitle12/603,464Grohman, “Alarm and Diagnostics System and Methodet al.for a Distributed-Architecture Heating,Ventilation and Air ConditioningNetwork”12/603,534Wallaert,“Flush Wall Mount Controller and In-Setet al.Mounting Plate for a Heating,Ventilation and Air Conditioning System”12/603,449Thorson, “System and Method of Use for a Useret al.Interface Dashboard of a Heating,Ventilation and Air ConditioningNetwork”12/603,382Grohman“Device Abstraction System and Methodfor a Distributed-Architecture Heating,Ventilation and Air ConditioningNetwork”12/603,526Grohman, “Communication Protocol System andet al.Method for a Distributed-ArchitectureHeating, Ventilation and AirConditioning Network”12/603,527Hadzidedic“Memory Recovery Scheme and DataStructure in a Heating, Ventilation andAir Conditioning Network”12/603,490Grohman“System Recovery in a Heating,Ventilation and Air ConditioningNetwork”12/603,473Grohman, “System and Method for Zoning aet al.Distributed-Architecture Heating,Ventilation and Air ConditioningNetwork”12/603,525Grohman, “Method of Controlling Equipment in aet al.Heating, Ventilation and AirConditioning Network”12/603,431Mirza, et“General Control Techniques in aal.Heating, Ventilation and AirConditioning Network”

US Referenced Citations (1318)
Number Name Date Kind
4048491 Wessman Sep 1977 A
4187543 Healey et al. Feb 1980 A
4231352 Bowden et al. Nov 1980 A
4262736 Gilkeson et al. Apr 1981 A
4296464 Woods et al. Oct 1981 A
4381549 Stamp et al. Apr 1983 A
4464543 Kline et al. Aug 1984 A
4482785 Finnegan et al. Nov 1984 A
4497031 Froehling et al. Jan 1985 A
4501125 Han Feb 1985 A
4606042 Kahn et al. Aug 1986 A
4616325 Heckenbach et al. Oct 1986 A
4694394 Costantini Sep 1987 A
4698628 Herkert et al. Oct 1987 A
4703325 Chamberlin et al. Oct 1987 A
4706247 Yoshioka Nov 1987 A
4723239 Schwartz Feb 1988 A
4829447 Parker et al. May 1989 A
4841450 Fredriksson Jun 1989 A
4843084 Parker et al. Jun 1989 A
4873649 Grald et al. Oct 1989 A
4884214 Parker et al. Nov 1989 A
4887262 van Veldhuizen Dec 1989 A
4888728 Shirakawa et al. Dec 1989 A
4889280 Grald et al. Dec 1989 A
4931948 Parker et al. Jun 1990 A
4941143 Twitty et al. Jul 1990 A
4942613 Lynch Jul 1990 A
4947484 Twitty et al. Aug 1990 A
4947928 Parker et al. Aug 1990 A
4953083 Takata et al. Aug 1990 A
4955018 Twitty et al. Sep 1990 A
4967567 Proctor et al. Nov 1990 A
4978896 Shah Dec 1990 A
4991770 Bird et al. Feb 1991 A
4996513 Mak et al. Feb 1991 A
5006827 Brueton et al. Apr 1991 A
5018138 Twitty et al. May 1991 A
5039980 Aggers et al. Aug 1991 A
5042997 Rhodes Aug 1991 A
5058388 Shaw et al. Oct 1991 A
5061916 French et al. Oct 1991 A
5065813 Berkeley et al. Nov 1991 A
5086385 Launey et al. Feb 1992 A
5103896 Saga Apr 1992 A
5105366 Beckey Apr 1992 A
5115967 Wedekind May 1992 A
5128855 Hilber et al. Jul 1992 A
5165465 Kenet Nov 1992 A
5170935 Federspiel et al. Dec 1992 A
5180102 Gilbert et al. Jan 1993 A
5181653 Foster et al. Jan 1993 A
5184122 Decious et al. Feb 1993 A
5191643 Alsenz Mar 1993 A
5195327 Kim Mar 1993 A
5197666 Wedekind Mar 1993 A
5197668 Ratz et al. Mar 1993 A
5203497 Ratz et al. Apr 1993 A
5220260 Schuler Jun 1993 A
5230482 Ratz et al. Jul 1993 A
5259553 Shyu Nov 1993 A
5274571 Hessee et al. Dec 1993 A
5276630 Baldwin et al. Jan 1994 A
5277036 Dieckmann et al. Jan 1994 A
5278957 Chan Jan 1994 A
5279458 DeWolf et al. Jan 1994 A
5297143 Fridrich et al. Mar 1994 A
5314004 Strand et al. May 1994 A
5323385 Jurewicz et al. Jun 1994 A
5323619 Kim Jun 1994 A
5327426 Dolin, Jr. et al. Jul 1994 A
5329991 Mehta et al. Jul 1994 A
5337952 Thompson Aug 1994 A
5341988 Rein et al. Aug 1994 A
5355323 Bae Oct 1994 A
5361982 Liebi et al. Nov 1994 A
5374200 Giroux Dec 1994 A
5383116 Lennartsson Jan 1995 A
5384697 Pascucci Jan 1995 A
5414337 Schuler May 1995 A
5417368 Jeffery et al. May 1995 A
5420572 Dolin, Jr. et al. May 1995 A
5434965 Matheny et al. Jul 1995 A
5440895 Bahel et al. Aug 1995 A
5444626 Schenk Aug 1995 A
5444851 Woest Aug 1995 A
5448180 Kienzler et al. Sep 1995 A
5448561 Kaiser et al. Sep 1995 A
5449047 Schivley, Jr. Sep 1995 A
5449112 Heitman et al. Sep 1995 A
5450570 Richek et al. Sep 1995 A
5452201 Pieronek et al. Sep 1995 A
5460327 Hill et al. Oct 1995 A
5463735 Pascucci et al. Oct 1995 A
5469150 Sitte Nov 1995 A
5475364 Kenet Dec 1995 A
5481481 Frey et al. Jan 1996 A
5481661 Kobayashi Jan 1996 A
5488834 Schwarz Feb 1996 A
5491649 Friday, Jr. et al. Feb 1996 A
5502818 Lamberg Mar 1996 A
5511188 Pascucci et al. Apr 1996 A
5513324 Dolin, Jr. et al. Apr 1996 A
5515267 Alsenz May 1996 A
5520328 Bujak, Jr. May 1996 A
5522044 Pascucci et al. May 1996 A
5530643 Hodorowski Jun 1996 A
5537339 Naganuma et al. Jul 1996 A
5539778 Kienzler et al. Jul 1996 A
5544036 Brown et al. Aug 1996 A
5544809 Keating et al. Aug 1996 A
5550980 Pascucci et al. Aug 1996 A
5551053 Nadolski et al. Aug 1996 A
5555269 Friday, Jr. et al. Sep 1996 A
5555509 Dolan et al. Sep 1996 A
5559407 Dudley et al. Sep 1996 A
5559412 Schuler Sep 1996 A
5566879 Longtin Oct 1996 A
5572658 Mohr et al. Nov 1996 A
5574848 Thomson Nov 1996 A
5579221 Mun Nov 1996 A
5581478 Cruse et al. Dec 1996 A
5592058 Archer et al. Jan 1997 A
5592059 Archer Jan 1997 A
5592628 Ueno et al. Jan 1997 A
5596437 Heins Jan 1997 A
5598566 Pascucci et al. Jan 1997 A
5600782 Thomson Feb 1997 A
5613157 Davidson et al. Mar 1997 A
5613369 Sato et al. Mar 1997 A
5617282 Rall et al. Apr 1997 A
5621662 Humphries et al. Apr 1997 A
5628201 Bahel et al. May 1997 A
5630325 Bahel et al. May 1997 A
5631825 van Weele et al. May 1997 A
5634590 Gorski et al. Jun 1997 A
5675756 Benton et al. Oct 1997 A
5675830 Satula Oct 1997 A
5684463 Diercks et al. Nov 1997 A
5684717 Beilfuss et al. Nov 1997 A
5699243 Eckel et al. Dec 1997 A
5706190 Russ et al. Jan 1998 A
5711480 Zepke et al. Jan 1998 A
5720604 Kelly et al. Feb 1998 A
5722822 Wilson et al. Mar 1998 A
5726900 Walter et al. Mar 1998 A
5729442 Frantz Mar 1998 A
5737529 Dolin, Jr. et al. Apr 1998 A
5748923 Eitrich May 1998 A
5751572 Maciulewicz May 1998 A
5751948 Dolan et al. May 1998 A
5754779 Dolin, Jr. et al. May 1998 A
5761083 Brown, Jr. et al. Jun 1998 A
5764146 Baldwin et al. Jun 1998 A
5772326 Batko et al. Jun 1998 A
5772732 James et al. Jun 1998 A
5774322 Walter et al. Jun 1998 A
5774492 Orlowsik, Jr. et al. Jun 1998 A
5774493 Ross Jun 1998 A
5777837 Eckel et al. Jul 1998 A
5782296 Mehta Jul 1998 A
5784647 Sugimoto Jul 1998 A
5786993 Frutiger et al. Jul 1998 A
5787027 Dolan et al. Jul 1998 A
5791332 Thompson et al. Aug 1998 A
5793646 Hibberd et al. Aug 1998 A
5801942 Nixon et al. Sep 1998 A
5802485 Koelle et al. Sep 1998 A
5803357 Lakin Sep 1998 A
5809063 Ashe et al. Sep 1998 A
5809556 Fujisawa et al. Sep 1998 A
5810245 Heitman et al. Sep 1998 A
5816492 Charles et al. Oct 1998 A
5818347 Dolan et al. Oct 1998 A
5819845 Ryu et al. Oct 1998 A
5822512 Goodrum et al. Oct 1998 A
5826038 Nakazumi Oct 1998 A
5829674 Vanostrand et al. Nov 1998 A
5841654 Verissimo et al. Nov 1998 A
5848887 Zabielski et al. Dec 1998 A
5854744 Zeng et al. Dec 1998 A
5856972 Riley et al. Jan 1999 A
5860411 Thompson et al. Jan 1999 A
5860473 Seiden Jan 1999 A
5862052 Nixon et al. Jan 1999 A
5862411 Kay et al. Jan 1999 A
5864581 Alger-Meunier et al. Jan 1999 A
5873519 Beilfuss Feb 1999 A
5878236 Kleineberg et al. Mar 1999 A
5883627 Pleyer Mar 1999 A
5884072 Rasmussen Mar 1999 A
5887651 Meyer Mar 1999 A
5892690 Boatman et al. Apr 1999 A
5896304 Tiemann et al. Apr 1999 A
5900674 Wojnarowski et al. May 1999 A
5903454 Hoffberg et al. May 1999 A
5912877 Shirai et al. Jun 1999 A
5914453 James et al. Jun 1999 A
5915101 Kleineberg et al. Jun 1999 A
5924486 Ehlers et al. Jul 1999 A
5927398 Maciulewicz Jul 1999 A
5930249 Stademann et al. Jul 1999 A
5933655 Vrabec et al. Aug 1999 A
5934554 Charles et al. Aug 1999 A
5937942 Bias et al. Aug 1999 A
5946209 Eckel et al. Aug 1999 A
5962989 Baker Oct 1999 A
5971597 Baldwin et al. Oct 1999 A
5973594 Baldwin et al. Oct 1999 A
5974554 Oh Oct 1999 A
5976010 Reese et al. Nov 1999 A
5983353 McHann, Jr. Nov 1999 A
5983646 Grothe et al. Nov 1999 A
5993195 Thompson Nov 1999 A
6006142 Seem et al. Dec 1999 A
6011821 Sauer et al. Jan 2000 A
6021252 Faris et al. Feb 2000 A
6028864 Marttinen et al. Feb 2000 A
6032178 Bacigalupo et al. Feb 2000 A
6035024 Stumer Mar 2000 A
6046410 Wojnarowski et al. Apr 2000 A
6049817 Schoen et al. Apr 2000 A
6052525 Carlson et al. Apr 2000 A
6053416 Specht et al. Apr 2000 A
6061600 Ying May 2000 A
6061603 Papadopoulos et al. May 2000 A
6078660 Burgess Jun 2000 A
6082894 Batko et al. Jul 2000 A
6092280 Wojnarowski Jul 2000 A
6095674 Verissimo et al. Aug 2000 A
6098116 Nixon et al. Aug 2000 A
6101824 Meyer et al. Aug 2000 A
6110260 Kubokawa Aug 2000 A
6115713 Pascucci et al. Sep 2000 A
6138227 Thewes et al. Oct 2000 A
6141595 Gloudeman et al. Oct 2000 A
6145501 Manohar et al. Nov 2000 A
6145751 Ahmed Nov 2000 A
6147601 Sandelman et al. Nov 2000 A
6151298 Bernhardsson et al. Nov 2000 A
6151529 Batko Nov 2000 A
6151625 Swales et al. Nov 2000 A
6151650 Birzer Nov 2000 A
6155341 Thompson et al. Dec 2000 A
6160477 Sandelman et al. Dec 2000 A
6160484 Spahl et al. Dec 2000 A
6160795 Hosemann Dec 2000 A
6167338 De Wille et al. Dec 2000 A
6169937 Peterson Jan 2001 B1
6169964 Alsa et al. Jan 2001 B1
6170044 McLaughlin et al. Jan 2001 B1
6177945 Pleyer Jan 2001 B1
6179213 Gibino et al. Jan 2001 B1
6182130 Dolin, Jr. et al. Jan 2001 B1
6188642 Schoniger et al. Feb 2001 B1
6190442 Redner Feb 2001 B1
6208905 Giddings et al. Mar 2001 B1
6208924 Bauer Mar 2001 B1
6211782 Sandelman et al. Apr 2001 B1
6216066 Goebel et al. Apr 2001 B1
6227191 Garloch May 2001 B1
6232604 McDaniel et al. May 2001 B1
6237113 Daiber May 2001 B1
6240326 Gloudeman et al. May 2001 B1
6241156 Kline et al. Jun 2001 B1
6252890 Alger-Meunier et al. Jun 2001 B1
6254009 Proffitt et al. Jul 2001 B1
6266205 Schreck et al. Jul 2001 B1
6269127 Richards Jul 2001 B1
6271845 Richardson Aug 2001 B1
6282454 Papadopoulos et al. Aug 2001 B1
6285912 Ellison et al. Sep 2001 B1
6292518 Grabb et al. Sep 2001 B1
6298376 Rosner et al. Oct 2001 B1
6298454 Schleiss et al. Oct 2001 B1
6298551 Wojnarowski et al. Oct 2001 B1
6304557 Nakazumi Oct 2001 B1
6307331 Bonasia et al. Oct 2001 B1
6324008 Baldwin et al. Nov 2001 B1
6324854 Jayanth Dec 2001 B1
6336065 Gibson et al. Jan 2002 B1
6343236 Gibson et al. Jan 2002 B1
6349306 Malik et al. Feb 2002 B1
6349883 Simmons et al. Feb 2002 B1
6353775 Nichols Mar 2002 B1
6359220 Schiedegger et al. Mar 2002 B2
6363422 Hunter et al. Mar 2002 B1
6370037 Schoenfish Apr 2002 B1
6374373 Helm et al. Apr 2002 B1
6377283 Thomas Apr 2002 B1
6385510 Hoog et al. May 2002 B1
6390806 Dempsey et al. May 2002 B1
6393023 Shimizu et al. May 2002 B1
6400996 Hoffberg et al. Jun 2002 B1
6405104 Dougherty Jun 2002 B1
6408228 Seem et al. Jun 2002 B1
6411701 Stademann Jun 2002 B1
6411857 Flood Jun 2002 B1
6412435 Timmons, Jr. Jul 2002 B1
6415395 Varma et al. Jul 2002 B1
6418507 Fackler Jul 2002 B1
6423118 Becerra et al. Jul 2002 B1
6424872 Glanzer et al. Jul 2002 B1
6424874 Cofer Jul 2002 B1
6427454 West Aug 2002 B1
6429845 Unseld et al. Aug 2002 B1
6430953 Roh Aug 2002 B2
6434715 Andersen Aug 2002 B1
6435418 Toth et al. Aug 2002 B1
6437691 Sandelman et al. Aug 2002 B1
6437805 Sojoodi et al. Aug 2002 B1
6441723 Mansfield et al. Aug 2002 B1
6442952 Roh et al. Sep 2002 B2
6448896 Bankus et al. Sep 2002 B1
6449315 Richards Sep 2002 B2
6450409 Rowlette et al. Sep 2002 B1
6453374 Kovalan et al. Sep 2002 B1
6454177 Sasao et al. Sep 2002 B1
6462654 Sandelman et al. Oct 2002 B1
6478084 Kumar et al. Nov 2002 B1
6493661 White et al. Dec 2002 B1
6497570 Sears et al. Dec 2002 B1
6498844 Stademann Dec 2002 B1
6501995 Kinney et al. Dec 2002 B1
6504338 Eichorn Jan 2003 B1
6505087 Lucas et al. Jan 2003 B1
6508407 Lefkowitz et al. Jan 2003 B1
6526122 Matsushita et al. Feb 2003 B2
6535123 Sandelman et al. Mar 2003 B2
6535138 Dolan et al. Mar 2003 B1
6539489 Reinert Mar 2003 B1
6540148 Salsbury et al. Apr 2003 B1
6542462 Sohraby et al. Apr 2003 B1
6543007 Bliley et al. Apr 2003 B1
6545660 Shen et al. Apr 2003 B1
6546008 Wehrend Apr 2003 B1
6552647 Thiessen et al. Apr 2003 B1
6554198 Hull et al. Apr 2003 B1
6560976 Jayanth May 2003 B2
6564348 Barenys et al. May 2003 B1
6567476 Kohl et al. May 2003 B2
6572363 Virgil, Jr. et al. Jun 2003 B1
6574215 Hummel Jun 2003 B2
6574234 Myer et al. Jun 2003 B1
6574581 Bohrer et al. Jun 2003 B1
6575233 Krumnow Jun 2003 B1
6580950 Johnson et al. Jun 2003 B1
6587039 Woestemeyer et al. Jul 2003 B1
6587739 Abrams et al. Jul 2003 B1
6587884 Papadopoulos et al. Jul 2003 B1
6594272 Ketcham et al. Jul 2003 B1
6595430 Shah Jul 2003 B1
6600923 Dzuban Jul 2003 B1
6608560 Abrams Aug 2003 B2
6609127 Lee et al. Aug 2003 B1
6615088 Myer et al. Sep 2003 B1
6615594 Jayanth et al. Sep 2003 B2
6618394 Hilleary Sep 2003 B1
6619555 Rosen Sep 2003 B2
6621507 Shah Sep 2003 B1
6622926 Sartain et al. Sep 2003 B1
6628993 Bauer Sep 2003 B1
6633781 Lee et al. Oct 2003 B1
6636771 Varma et al. Oct 2003 B1
6639939 Naden et al. Oct 2003 B1
6640145 Hoffberg et al. Oct 2003 B2
6640890 Dage et al. Nov 2003 B1
6643689 Rode et al. Nov 2003 B2
6644557 Jacobs Nov 2003 B1
6647317 Takai et al. Nov 2003 B2
6650949 Fera et al. Nov 2003 B1
6651034 Hedlund et al. Nov 2003 B1
6658373 Rossi et al. Dec 2003 B2
RE38406 Faris et al. Jan 2004 E
6681215 Jammu Jan 2004 B2
6688387 Wellington et al. Feb 2004 B1
6704688 Aslam et al. Mar 2004 B2
6708239 Ellerbrock et al. Mar 2004 B1
6715120 Hladik et al. Mar 2004 B1
6715302 Ferragut, II Apr 2004 B2
6715690 Hull et al. Apr 2004 B2
6717513 Sandelman et al. Apr 2004 B1
6717919 Ketcham et al. Apr 2004 B1
6718384 Linzy Apr 2004 B2
6722143 Moon et al. Apr 2004 B2
6725180 Mayer et al. Apr 2004 B2
6725398 Varma et al. Apr 2004 B1
6728369 Burgess Apr 2004 B2
6732191 Baker et al. May 2004 B1
6735196 Manzardo May 2004 B1
6735282 Matsushita et al. May 2004 B2
6735965 Moon et al. May 2004 B2
6738676 Hirayama May 2004 B2
6741915 Poth May 2004 B2
6744771 Barber et al. Jun 2004 B1
6745106 Howard et al. Jun 2004 B2
6747888 Klein Jun 2004 B2
6758050 Jayanth et al. Jul 2004 B2
6758051 Jayanth et al. Jul 2004 B2
6763040 Hite et al. Jul 2004 B1
6763272 Knepper Jul 2004 B2
6765993 Cueman Jul 2004 B2
6768732 Neuhaus Jul 2004 B1
6774786 Havekost et al. Aug 2004 B1
6779176 Chambers, II et al. Aug 2004 B1
6783079 Carey et al. Aug 2004 B2
6789739 Rosen Sep 2004 B2
6791530 Vernier et al. Sep 2004 B2
6795935 Unkle et al. Sep 2004 B1
6798341 Eckel et al. Sep 2004 B1
6801524 Eteminan Oct 2004 B2
6804564 Crispin et al. Oct 2004 B2
6810333 Adedeji et al. Oct 2004 B2
6814299 Carey Nov 2004 B1
6814660 Cavett Nov 2004 B1
6816071 Conti Nov 2004 B2
6817757 Wallace Nov 2004 B1
6819802 Higgs et al. Nov 2004 B2
6822202 Atlas Nov 2004 B2
6823680 Jayanth Nov 2004 B2
6824069 Rosen Nov 2004 B2
6826454 Sulfstede Nov 2004 B2
6826590 Glanzer et al. Nov 2004 B1
6832118 Heberlein et al. Dec 2004 B1
6833787 Levi Dec 2004 B1
6833844 Shiota et al. Dec 2004 B1
6840052 Smith et al. Jan 2005 B2
6842117 Keown Jan 2005 B2
6842808 Weigl et al. Jan 2005 B2
6845918 Rotondo Jan 2005 B2
6850992 Heinrich et al. Feb 2005 B2
6851948 Dempsey et al. Feb 2005 B2
6853291 Aisa Feb 2005 B1
6854444 Plagge et al. Feb 2005 B2
6865449 Dudley Mar 2005 B2
6865596 Barber et al. Mar 2005 B1
6865898 Yamanashi et al. Mar 2005 B2
6866375 Leighton et al. Mar 2005 B2
6868292 Ficco et al. Mar 2005 B2
6868900 Dage et al. Mar 2005 B2
6874691 Hildebrand et al. Apr 2005 B1
6874693 Readio et al. Apr 2005 B2
6876891 Schuler et al. Apr 2005 B1
6879881 Attridge, Jr. Apr 2005 B1
6888441 Carey May 2005 B2
6892121 Schmidt May 2005 B2
6894703 Vernier et al. May 2005 B2
6900808 Lassiter et al. May 2005 B2
6901316 Jensen et al. May 2005 B1
6901439 Bonasia et al. May 2005 B1
6907329 Junger et al. Jun 2005 B2
6909948 Mollmann et al. Jun 2005 B2
6914893 Petite Jul 2005 B2
6918064 Mueller et al. Jul 2005 B2
6920318 Brooking et al. Jul 2005 B2
6925360 Yoon et al. Aug 2005 B2
6931645 Murching et al. Aug 2005 B2
6938106 Ellerbrock et al. Aug 2005 B2
6941193 Frecska et al. Sep 2005 B2
6944785 Gadir et al. Sep 2005 B2
6954680 Kreidler et al. Oct 2005 B2
6955060 Homan et al. Oct 2005 B2
6955302 Erdman, Jr. Oct 2005 B2
6956424 Hohnel Oct 2005 B2
6957696 Krumnow Oct 2005 B1
6963288 Sokol et al. Nov 2005 B1
6963922 Papadopoulos et al. Nov 2005 B2
6965802 Sexton Nov 2005 B2
6967565 Lingemann Nov 2005 B2
6968295 Carr Nov 2005 B1
6973366 Komai Dec 2005 B2
6975219 Eryurek et al. Dec 2005 B2
6975913 Kreidler et al. Dec 2005 B2
6975958 Bohrer et al. Dec 2005 B2
6980796 Cuellar et al. Dec 2005 B1
6981266 An et al. Dec 2005 B1
6983271 Morrow et al. Jan 2006 B2
6983889 Alles Jan 2006 B2
6988011 Varma et al. Jan 2006 B2
6988671 DeLuca Jan 2006 B2
6990381 Nomura et al. Jan 2006 B2
6990540 Dalakuras et al. Jan 2006 B2
6993414 Shah Jan 2006 B2
RE38985 Boatman et al. Feb 2006 E
6994620 Mills Feb 2006 B2
6999473 Windecker Feb 2006 B2
6999824 Glanzer et al. Feb 2006 B2
7000849 Ashworth et al. Feb 2006 B2
7002462 Welch Feb 2006 B2
7003378 Poth Feb 2006 B2
7006460 Vollmer et al. Feb 2006 B1
7006881 Hoffberg et al. Feb 2006 B1
7013239 Hedlund et al. Mar 2006 B2
7017827 Shah et al. Mar 2006 B2
7020798 Meng et al. Mar 2006 B2
7022008 Crocker Apr 2006 B1
7024282 Coogan et al. Apr 2006 B2
7024283 Bicknell Apr 2006 B2
7025281 DeLuca Apr 2006 B2
7027808 Wesby Apr 2006 B2
7029391 Nagaya et al. Apr 2006 B2
7031880 Seem et al. Apr 2006 B1
7032018 Lee et al. Apr 2006 B2
7035719 Howard et al. Apr 2006 B2
7035898 Baker Apr 2006 B1
7036743 Shah May 2006 B2
7043339 Maeda et al. May 2006 B2
7044397 Bartlett et al. May 2006 B2
7047092 Wimsatt May 2006 B2
7051282 Marcjan May 2006 B2
7055759 Wacker et al. Jun 2006 B2
7058459 Weiberle et al. Jun 2006 B2
7058477 Rosen Jun 2006 B1
7058693 Baker, Jr. Jun 2006 B1
7058737 Ellerbrock et al. Jun 2006 B2
7062927 Kwon et al. Jun 2006 B2
7068612 Berkcan et al. Jun 2006 B2
7076962 He et al. Jul 2006 B2
7082339 Murray et al. Jul 2006 B2
7082352 Lim Jul 2006 B2
7083109 Pouchak Aug 2006 B2
7085626 Harrod et al. Aug 2006 B2
7085814 Gandhi et al. Aug 2006 B1
7089087 Dudley Aug 2006 B2
7089088 Terry et al. Aug 2006 B2
7089530 Dardinski et al. Aug 2006 B1
7092768 Labuda Aug 2006 B1
7092772 Murray et al. Aug 2006 B2
7092794 Hill et al. Aug 2006 B1
7096078 Burr et al. Aug 2006 B2
7096285 Ellerbrock et al. Aug 2006 B2
7096465 Dardinski et al. Aug 2006 B1
7099965 Ellerbrock et al. Aug 2006 B2
7100382 Butler et al. Sep 2006 B2
7103000 Rode et al. Sep 2006 B1
7103016 Duffy et al. Sep 2006 B1
7103420 Brown et al. Sep 2006 B2
7110835 Blevins et al. Sep 2006 B2
7114088 Horbelt Sep 2006 B2
7114554 Bergman et al. Oct 2006 B2
7117050 Sasaki et al. Oct 2006 B2
7117051 Landry et al. Oct 2006 B2
7117395 Opaterny Oct 2006 B2
7120036 Kyono Oct 2006 B2
7123428 Yeo et al. Oct 2006 B2
7123774 Dhavala et al. Oct 2006 B2
7127305 Palmon Oct 2006 B1
7127327 O'Donnell Oct 2006 B1
7130409 Beyda Oct 2006 B2
7130719 Ehlers et al. Oct 2006 B2
7133407 Jinzaki et al. Nov 2006 B2
7133748 Robinson Nov 2006 B2
7133749 Goldberg et al. Nov 2006 B2
7135982 Lee Nov 2006 B2
7139550 Cuellar et al. Nov 2006 B2
7142948 Metz Nov 2006 B2
7146230 Glanzer et al. Dec 2006 B2
7146231 Schleiss et al. Dec 2006 B2
7146253 Hoog et al. Dec 2006 B2
7150408 DeLuca Dec 2006 B2
7154866 Shurmantine et al. Dec 2006 B2
7155318 Sharma et al. Dec 2006 B2
7155499 Soemo et al. Dec 2006 B2
7156316 Kates Jan 2007 B2
7162512 Amit et al. Jan 2007 B1
7162883 Jayanth et al. Jan 2007 B2
7163156 Kates Jan 2007 B2
7163158 Rossi et al. Jan 2007 B2
7167762 Glanzer et al. Jan 2007 B2
7168627 Kates Jan 2007 B2
7171579 Weigl et al. Jan 2007 B2
7172132 Proffitt et al. Feb 2007 B2
7172160 Piel et al. Feb 2007 B2
7174239 Butler et al. Feb 2007 B2
7174728 Jayanth Feb 2007 B2
7175086 Gascoyne et al. Feb 2007 B2
7175098 DeLuca Feb 2007 B2
7177926 Kramer Feb 2007 B2
7181317 Amundson et al. Feb 2007 B2
7185262 Barthel et al. Feb 2007 B2
7186290 Sheehan et al. Mar 2007 B2
7187354 Min et al. Mar 2007 B2
7187986 Johnson et al. Mar 2007 B2
7188002 Chapman, Jr. et al. Mar 2007 B2
7188207 Mitter Mar 2007 B2
7188482 Sadegh et al. Mar 2007 B2
7188779 Alles Mar 2007 B2
7191028 Nomura et al. Mar 2007 B2
7194663 Fletcher et al. Mar 2007 B2
7195211 Kande et al. Mar 2007 B2
7197717 Anderson et al. Mar 2007 B2
7200450 Boyer et al. Apr 2007 B2
7203165 Kowalewski Apr 2007 B1
7203575 Maturana et al. Apr 2007 B2
7203776 Junger et al. Apr 2007 B2
7206646 Nixon et al. Apr 2007 B2
7206647 Kumar Apr 2007 B2
7209485 Guse Apr 2007 B2
7209748 Wong et al. Apr 2007 B2
7212825 Wong et al May 2007 B2
7213044 Tjong et a May 2007 B2
7216016 Van Ostrand et al. May 2007 B2
7216017 Kwon et al. May 2007 B2
7216497 Hull et al. May 2007 B2
7218589 Wisnudel et al. May 2007 B2
7218996 Beitelmal et al. May 2007 B1
7219141 Bonasia et al. May 2007 B2
7222111 Budke, Jr. May 2007 B1
7222152 Thompson et al. May 2007 B1
7222493 Jayanth et al. May 2007 B2
7222494 Peterson et al. May 2007 B2
7224366 Kessler et al. May 2007 B2
7225054 Amundson et al. May 2007 B2
7225356 Monitzer May 2007 B2
7228187 Tichy' et al. Jun 2007 B2
7232058 Lee Jun 2007 B2
7233229 Stroupe et al. Jun 2007 B2
7239623 Burghardt et al. Jul 2007 B2
7242988 Hoffberg et al. Jul 2007 B1
7243004 Shah et al. Jul 2007 B2
7244294 Kates Jul 2007 B2
7246753 Hull et al. Jul 2007 B2
7248576 Hoffmann Jul 2007 B2
7251534 Walls et al. Jul 2007 B2
7257813 Mayer et al. Aug 2007 B1
7259666 Hermsmeyer et al. Aug 2007 B1
7260084 Saller Aug 2007 B2
7260451 Takai et al. Aug 2007 B2
7260609 Fuehrer et al. Aug 2007 B2
7260948 Jayanth et al. Aug 2007 B2
7261241 Eoga Aug 2007 B2
7261243 Butler et al. Aug 2007 B2
7261762 Kang et al. Aug 2007 B2
7266775 Patitucci Sep 2007 B2
7266960 Shah Sep 2007 B2
7269962 Bachmann Sep 2007 B2
7272154 Loebig Sep 2007 B2
7272452 Coogan et al. Sep 2007 B2
7272457 Glanzer et al. Sep 2007 B2
7274972 Amundson et al. Sep 2007 B2
7274973 Nichols et al. Sep 2007 B2
7277280 Peng Oct 2007 B2
7277970 Ellerbrock et al. Oct 2007 B2
7278103 Clark et al. Oct 2007 B1
7281697 Reggiani Oct 2007 B2
7287062 Im et al. Oct 2007 B2
7287708 Lucas et al. Oct 2007 B2
7287709 Proffitt et al. Oct 2007 B2
7289458 Gila et al. Oct 2007 B2
7292900 Kreidler et al. Nov 2007 B2
7293422 Parachini et al. Nov 2007 B2
7295099 Lee et al. Nov 2007 B2
7296426 Butler et al. Nov 2007 B2
7299279 Sadaghiany Nov 2007 B2
7299996 Garrett et al. Nov 2007 B2
7301699 Kanamori et al. Nov 2007 B2
7302642 Smith et al. Nov 2007 B2
7305495 Carter Dec 2007 B2
7306165 Shah Dec 2007 B2
7310559 Walko, Jr. Dec 2007 B2
7313465 O'Donnell Dec 2007 B1
7313716 Weigl et al. Dec 2007 B2
7313923 Jayanth et al. Jan 2008 B2
7315768 Dang et al. Jan 2008 B2
7317970 Pienta et al. Jan 2008 B2
7318089 Stachura et al. Jan 2008 B1
7320110 Shah Jan 2008 B2
7324874 Jung Jan 2008 B2
7327376 Shen et al. Feb 2008 B2
7327815 Jurisch Feb 2008 B1
7330512 Frank et al. Feb 2008 B2
7331191 He et al. Feb 2008 B2
7334161 Williams et al. Feb 2008 B2
7336650 Franz et al. Feb 2008 B2
7337191 Haeberle et al. Feb 2008 B2
7337369 Barthel et al. Feb 2008 B2
7337619 Hsieh et al. Mar 2008 B2
7343226 Ehlers et al. Mar 2008 B2
7346404 Eryurek et al. Mar 2008 B2
7346433 Budike, Jr. Mar 2008 B2
7346835 Lobinger et al. Mar 2008 B1
7349761 Cruse Mar 2008 B1
7354005 Carey et al. Apr 2008 B2
7356050 Reindl et al. Apr 2008 B2
7359335 Knop et al. Apr 2008 B2
7359345 Chang et al. Apr 2008 B2
7360002 Brueckner et al. Apr 2008 B2
7360370 Shah et al. Apr 2008 B2
7360717 Shah Apr 2008 B2
7364093 Garozzo Apr 2008 B2
7365812 Lee Apr 2008 B2
7366498 Ko et al. Apr 2008 B2
7366944 Oshins et al. Apr 2008 B2
7370074 Alexander et al. May 2008 B2
7377450 Van Ostrand et al. May 2008 B2
7379791 Tamarkin et al. May 2008 B2
7379997 Ehlers et al. May 2008 B2
7383158 Krocker et al. Jun 2008 B2
7389150 Inoue et al. Jun 2008 B2
7389204 Eryurek et al. Jun 2008 B2
RE40437 Rosen et al. Jul 2008 E
7392661 Alles Jul 2008 B2
7395122 Kreidler et al. Jul 2008 B2
7395137 Robinson Jul 2008 B2
7403128 Scuka et al. Jul 2008 B2
7412839 Jayanth Aug 2008 B2
7412842 Pham Aug 2008 B2
7418428 Ehlers et al. Aug 2008 B2
7424345 Norbeck Sep 2008 B2
D578026 Roher et al. Oct 2008 S
7433740 Hesse et al. Oct 2008 B2
7434744 Garozzo et al. Oct 2008 B2
7436292 Rourke et al. Oct 2008 B2
7436293 Rourke et al. Oct 2008 B2
7436296 Rourke et al. Oct 2008 B2
7436400 Cheng Oct 2008 B2
7437198 Iwaki Oct 2008 B2
7439862 Quan Oct 2008 B2
7441094 Stephens Oct 2008 B2
7446660 Posamentier Nov 2008 B2
7448435 Garozzo Nov 2008 B2
7451937 Flood et al. Nov 2008 B2
7454269 Dushane et al. Nov 2008 B1
7455240 Chapman, Jr. et al. Nov 2008 B2
7457853 Chari et al. Nov 2008 B1
7460933 Chapman, Jr. et al. Dec 2008 B2
7476988 Mulhouse et al. Jan 2009 B2
7516106 Ehlers et al. Apr 2009 B2
7526364 Rule et al. Apr 2009 B2
7567523 Black et al. Jul 2009 B2
7567844 Thomas et al. Jul 2009 B2
7571195 Billingsley et al. Aug 2009 B2
7571355 Shabalin Aug 2009 B2
7574871 Bloemer et al. Aug 2009 B2
7584897 Schultz et al. Sep 2009 B2
7587459 Wewalaarachchi Sep 2009 B2
7593124 Sheng et al. Sep 2009 B1
7593787 Feingold et al. Sep 2009 B2
7604046 Bergman et al. Oct 2009 B2
7624931 Chapman et al. Dec 2009 B2
7641126 Schultz et al. Jan 2010 B2
7650323 Hesse et al. Jan 2010 B2
D610475 Beers et al. Feb 2010 S
7693583 Wolff et al. Apr 2010 B2
7693591 Hoglund et al. Apr 2010 B2
7706923 Amundson et al. Apr 2010 B2
7730223 Bavor et al. Jun 2010 B1
7734572 Wiemeyer et al. Jun 2010 B2
7743124 Holdaway et al. Jun 2010 B2
7747757 Garglulo et al. Jun 2010 B2
7752289 Kikkawa et al. Jul 2010 B2
7761563 Shike et al. Jul 2010 B2
7774102 Butler et al. Aug 2010 B2
7797349 Kosaka Sep 2010 B2
7809472 Silva et al. Oct 2010 B1
7827963 Li et al. Nov 2010 B2
7847790 Bewley et al. Dec 2010 B2
7861941 Schultz et al. Jan 2011 B2
7870080 Budike, Jr. Jan 2011 B2
7886166 Shnekendorf et al. Feb 2011 B2
7898147 Grabinger et al. Mar 2011 B2
7904209 Podgorny et al. Mar 2011 B2
7934504 Lowe et al. May 2011 B2
7949615 Ehlers et al. May 2011 B2
7963454 Sullivan et al. Jun 2011 B2
D642081 Kashimoto Jul 2011 S
7979164 Garozzo et al. Jul 2011 B2
8005576 Rodgers Aug 2011 B2
8024054 Mairs et al. Sep 2011 B2
8032254 Amundson et al. Oct 2011 B2
8042049 Killian et al. Oct 2011 B2
D648641 Wallaert Nov 2011 S
D648642 Wallaert Nov 2011 S
8050801 Richards et al. Nov 2011 B2
8082068 Rodgers Dec 2011 B2
8083154 Schultz et al. Dec 2011 B2
8087593 Leen Jan 2012 B2
8091796 Amundson et al. Jan 2012 B2
8099178 Mairs et al. Jan 2012 B2
8103390 Rodgers Jan 2012 B2
8112181 Remsburg Feb 2012 B2
8116917 Rodgers Feb 2012 B2
8122110 Wilbur et al. Feb 2012 B1
8127060 Doll et al. Feb 2012 B2
8167216 Schultz et al. May 2012 B2
8183995 Wang et al. May 2012 B2
8219249 Harrod et al. Jul 2012 B2
8224491 Koster et al. Jul 2012 B2
8239066 Jennings et al. Aug 2012 B2
8239073 Fausak et al. Aug 2012 B2
8244383 Bergman et al. Aug 2012 B2
8255086 Grohman Aug 2012 B2
8255090 Frader-Thompson Aug 2012 B2
8352081 Grohman Jan 2013 B2
8437877 Grohman May 2013 B2
8452906 Grohman May 2013 B2
8463442 Curry et al. Jun 2013 B2
8463443 Grohman et al. Jun 2013 B2
8548630 Grohman Oct 2013 B2
8564400 Grohman Oct 2013 B2
20010025349 Sharood et al. Sep 2001 A1
20010034586 Ewert et al. Oct 2001 A1
20010048376 Maeda et al. Dec 2001 A1
20010055311 Trachewsky et al. Dec 2001 A1
20020002425 Dossey et al. Jan 2002 A1
20020013897 McTernan et al. Jan 2002 A1
20020016639 Smith et al. Feb 2002 A1
20020022894 Eryurek et al. Feb 2002 A1
20020026476 Miyazaki et al. Feb 2002 A1
20020033252 Sasao et al. Mar 2002 A1
20020048194 Klein Apr 2002 A1
20020053047 Gold May 2002 A1
20020072814 Schuler et al. Jun 2002 A1
20020091784 Baker et al. Jul 2002 A1
20020104323 Rash et al. Aug 2002 A1
20020116550 Hansen Aug 2002 A1
20020123896 Diez et al. Sep 2002 A1
20020124211 Gray et al. Sep 2002 A1
20020143523 Balaji et al. Oct 2002 A1
20020152298 Kikta et al. Oct 2002 A1
20020157054 Shin et al. Oct 2002 A1
20020163427 Eryurek et al. Nov 2002 A1
20020178288 McLeod Nov 2002 A1
20020190242 lillie et al. Dec 2002 A1
20020191026 Rodden et al. Dec 2002 A1
20020191603 Shin et al. Dec 2002 A1
20020198990 Bradfield et al. Dec 2002 A1
20030058863 Oost Mar 2003 A1
20030061340 Sun et al. Mar 2003 A1
20030078677 Hull et al. Apr 2003 A1
20030088338 Phillips et al. May 2003 A1
20030097482 DeHart et al. May 2003 A1
20030108064 Bilke et al. Jun 2003 A1
20030109963 Oppedisano et al. Jun 2003 A1
20030115177 Takanabe et al. Jun 2003 A1
20030116637 Ellingham Jun 2003 A1
20030154355 Fernandez Aug 2003 A1
20030179721 Shurmantine et al. Sep 2003 A1
20030191857 Terrell et al. Oct 2003 A1
20030206100 Richman et al. Nov 2003 A1
20030229784 Cuellar et al. Dec 2003 A1
20040001478 Wong Jan 2004 A1
20040003051 Krzyzanowski et al. Jan 2004 A1
20040003415 Ng Jan 2004 A1
20040024483 Holcombe Feb 2004 A1
20040025089 Haswarey et al. Feb 2004 A1
20040039478 Kiesel et al. Feb 2004 A1
20040059815 Buckingham et al. Mar 2004 A1
20040066788 Lin et al. Apr 2004 A1
20040088069 Singh May 2004 A1
20040095237 Chen et al. May 2004 A1
20040104942 Weigel Jun 2004 A1
20040107717 Yoon et al. Jun 2004 A1
20040111186 Rossi et al. Jun 2004 A1
20040111254 Gogel et al. Jun 2004 A1
20040117330 Ehlers et al. Jun 2004 A1
20040133314 Ehlers et al. Jul 2004 A1
20040133704 Krzyzanowski et al. Jul 2004 A1
20040138981 Ehlers et al. Jul 2004 A1
20040139038 Ehlers et al. Jul 2004 A1
20040143360 Kiesel et al. Jul 2004 A1
20040146008 Conradt et al. Jul 2004 A1
20040148482 Grundy et al. Jul 2004 A1
20040156360 Sexton et al. Aug 2004 A1
20040159112 Jayanth et al. Aug 2004 A1
20040189590 Mehaffey et al. Sep 2004 A1
20040204775 Keyes et al. Oct 2004 A1
20040205781 Hill et al. Oct 2004 A1
20040206096 Jayanth Oct 2004 A1
20040210348 Imhof et al. Oct 2004 A1
20040218591 Ogawa et al. Nov 2004 A1
20040222307 DeLuca Nov 2004 A1
20040236471 Poth Nov 2004 A1
20040245352 Smith et al. Dec 2004 A1
20040260427 Wimsatt Dec 2004 A1
20040260812 Rhodes et al. Dec 2004 A1
20040260927 Grobman Dec 2004 A1
20040266491 Howard et al. Dec 2004 A1
20040267385 Lingemann Dec 2004 A1
20040267395 Discenzo et al. Dec 2004 A1
20040267790 Pak et al. Dec 2004 A1
20050005249 Hill et al. Jan 2005 A1
20050007249 Eryurek et al. Jan 2005 A1
20050010759 Wakiyama Jan 2005 A1
20050033707 Ehlers et al. Feb 2005 A1
20050034023 Maturana et al. Feb 2005 A1
20050040247 Pouchak Feb 2005 A1
20050040250 Wruck Feb 2005 A1
20050041033 Hilts et al. Feb 2005 A1
20050041633 Roeser et al. Feb 2005 A1
20050046584 Breed Mar 2005 A1
20050051168 DeVries et al. Mar 2005 A1
20050054381 Lee et al. Mar 2005 A1
20050055427 Frutiger et al. Mar 2005 A1
20050068978 Sexton et al. Mar 2005 A1
20050073789 Tanis Apr 2005 A1
20050076150 Lee et al. Apr 2005 A1
20050080879 Kim et al. Apr 2005 A1
20050081156 Clark et al. Apr 2005 A1
20050081157 Clark et al. Apr 2005 A1
20050090915 Geiwitz Apr 2005 A1
20050096872 Blevins et al. May 2005 A1
20050097478 Killian et al. May 2005 A1
20050103874 Erdman May 2005 A1
20050109048 Lee May 2005 A1
20050116023 Amundson et al. Jun 2005 A1
20050118996 Lee et al. Jun 2005 A1
20050119765 Bergman Jun 2005 A1
20050119766 Amundson et al. Jun 2005 A1
20050119771 Amundson et al. Jun 2005 A1
20050119793 Amundson et al. Jun 2005 A1
20050119794 Amundson et al. Jun 2005 A1
20050120012 Poth et al. Jun 2005 A1
20050125495 Tjong et al. Jun 2005 A1
20050143138 Lee et al. Jun 2005 A1
20050145705 Shah et al. Jul 2005 A1
20050150967 Chapman, Jr. et al. Jul 2005 A1
20050154494 Ahmed Jul 2005 A1
20050159848 Shah et al. Jul 2005 A1
20050159924 Shah et al. Jul 2005 A1
20050161517 Helt et al. Jul 2005 A1
20050166610 Jayanth Aug 2005 A1
20050176410 Brooking et al. Aug 2005 A1
20050182498 Landou et al. Aug 2005 A1
20050192727 Shostak et al. Sep 2005 A1
20050193155 Fujita Sep 2005 A1
20050198040 Cohen et al. Sep 2005 A1
20050223339 Lee Oct 2005 A1
20050229610 Park et al. Oct 2005 A1
20050235661 Pham Oct 2005 A1
20050235662 Pham Oct 2005 A1
20050235663 Pham Oct 2005 A1
20050240312 Terry et al. Oct 2005 A1
20050252673 Kregle et al. Nov 2005 A1
20050256591 Rule et al. Nov 2005 A1
20050256935 Overstreet et al. Nov 2005 A1
20050258257 Thurman et al. Nov 2005 A1
20050258259 Stanimirovic Nov 2005 A1
20050270151 Winick Dec 2005 A1
20050278071 Durham Dec 2005 A1
20050280364 Omura et al. Dec 2005 A1
20050281368 Droba et al. Dec 2005 A1
20050288823 Hesse et al. Dec 2005 A1
20060006244 Morrow et al. Jan 2006 A1
20060009861 Bonasla et al. Jan 2006 A1
20060009863 Lingemann Jan 2006 A1
20060021358 Nallapa Feb 2006 A1
20060021359 Hur et al. Feb 2006 A1
20060027671 Shah Feb 2006 A1
20060030954 Bergman et al. Feb 2006 A1
20060036350 Bohrer et al. Feb 2006 A1
20060036952 Yang Feb 2006 A1
20060041898 Potyrailo et al. Feb 2006 A1
20060045107 Kucenas et al. Mar 2006 A1
20060048064 Vronay Mar 2006 A1
20060058924 Shah Mar 2006 A1
20060063523 McFarland et al. Mar 2006 A1
20060090142 Glasgow et al. Apr 2006 A1
20060090483 Kim et al. May 2006 A1
20060091227 Attridge, Jr. May 2006 A1
20060092977 Bai et al. May 2006 A1
20060105697 Aronstam et al. May 2006 A1
20060106791 Morrow et al. May 2006 A1
20060108432 Mattheis May 2006 A1
20060111816 Spalink et al. May 2006 A1
20060130497 Kang et al. Jun 2006 A1
20060144055 Ahn Jul 2006 A1
20060144232 Kang et al. Jul 2006 A1
20060149414 Archacki, Jr. et al. Jul 2006 A1
20060150027 Paden Jul 2006 A1
20060153247 Stumer Jul 2006 A1
20060155398 Hoffberg et al. Jul 2006 A1
20060158051 Bartlett et al. Jul 2006 A1
20060159007 Frutiger et al. Jul 2006 A1
20060168522 Bala Jul 2006 A1
20060185818 Garozzo Aug 2006 A1
20060186214 Simon et al. Aug 2006 A1
20060190138 Stone et al. Aug 2006 A1
20060192021 Schultz et al. Aug 2006 A1
20060192022 Barton et al. Aug 2006 A1
20060196953 Simon et al. Sep 2006 A1
20060200253 Hoffberg et al. Sep 2006 A1
20060200258 Hoffberg et al. Sep 2006 A1
20060200259 Hoffberg et al. Sep 2006 A1
20060200260 Hoffberg et al. Sep 2006 A1
20060202978 Lee et al. Sep 2006 A1
20060206220 Amundson Sep 2006 A1
20060209208 Kim et al. Sep 2006 A1
20060212194 Breed Sep 2006 A1
20060219799 Schultz et al. Oct 2006 A1
20060229090 LaDue Oct 2006 A1
20060235548 Gaudette Oct 2006 A1
20060236351 Ellerbrock et al. Oct 2006 A1
20060239296 Jinzaki et al. Oct 2006 A1
20060248233 Park et al. Nov 2006 A1
20060250578 Pohl et al. Nov 2006 A1
20060250979 Gauweller et al. Nov 2006 A1
20060267756 Kates Nov 2006 A1
20060276917 Li et al. Dec 2006 A1
20070005191 Sloup et al. Jan 2007 A1
20070008116 Bergman et al. Jan 2007 A1
20070012052 Butler et al. Jan 2007 A1
20070013534 DiMaggio Jan 2007 A1
20070014233 Oguro et al. Jan 2007 A1
20070016311 Bergman et al. Jan 2007 A1
20070016476 Hoffberg et al. Jan 2007 A1
20070019683 Kryzyanowski Jan 2007 A1
20070025368 Ha et al. Feb 2007 A1
20070032909 Tolbert, Jr. et al. Feb 2007 A1
20070033310 Kweon Feb 2007 A1
20070035255 Shuster et al. Feb 2007 A1
20070040040 Mueller Feb 2007 A1
20070043477 Ehlers et al. Feb 2007 A1
20070043478 Ehlers et al. Feb 2007 A1
20070045429 Chapman, Jr. et al. Mar 2007 A1
20070045431 Chapman, Jr. et al. Mar 2007 A1
20070045442 Chapman, Jr. et al. Mar 2007 A1
20070051818 Atlas Mar 2007 A1
20070053513 Hoffberg Mar 2007 A1
20070055407 Goldberg et al. Mar 2007 A1
20070055757 Mairs et al. Mar 2007 A1
20070067062 Mairs et al. Mar 2007 A1
20070067496 Deiretsbacher et al. Mar 2007 A1
20070073973 Hazay Mar 2007 A1
20070080235 Fulton, Jr. Apr 2007 A1
20070083721 Grinspan Apr 2007 A1
20070084937 Ahmed Apr 2007 A1
20070088883 Wakabayashi Apr 2007 A1
20070089090 Riedl et al. Apr 2007 A1
20070090199 Hull et al. Apr 2007 A1
20070093226 Foltyn et al. Apr 2007 A1
20070097993 Bojahra et al. May 2007 A1
20070102149 Kates May 2007 A1
20070109114 Farley et al. May 2007 A1
20070109975 Reckamp et al. May 2007 A1
20070113247 Kwak May 2007 A1
20070114291 Pouchak May 2007 A1
20070119957 Kates May 2007 A1
20070119958 Kates May 2007 A1
20070129820 Glanzer et al. Jun 2007 A1
20070129825 Kargenian Jun 2007 A1
20070129826 Kreidler et al. Jun 2007 A1
20070129917 Blevins et al. Jun 2007 A1
20070130834 Kande et al. Jun 2007 A1
20070130969 Peterson et al. Jun 2007 A1
20070131784 Garozzo et al. Jun 2007 A1
20070135692 Hwang et al. Jun 2007 A1
20070135946 Sugiyama et al. Jun 2007 A1
20070136669 Kwon et al. Jun 2007 A1
20070136687 Pak Jun 2007 A1
20070138307 Khoo Jun 2007 A1
20070138308 Schultz et al. Jun 2007 A1
20070143704 Laird-McConnell Jun 2007 A1
20070143707 Yun et al. Jun 2007 A1
20070157016 Dayan et al. Jul 2007 A1
20070158442 Chapman, Jr. et al. Jul 2007 A1
20070168887 Lee Jul 2007 A1
20070177505 Charrua et al. Aug 2007 A1
20070191024 Kim et al. Aug 2007 A1
20070192731 Townsend et al. Aug 2007 A1
20070194138 Shah Aug 2007 A9
20070204637 Fujii et al. Sep 2007 A1
20070205297 Finkam et al. Sep 2007 A1
20070205916 Blom et al. Sep 2007 A1
20070208461 Chase Sep 2007 A1
20070208549 Blevins et al. Sep 2007 A1
20070213853 Glanzer et al. Sep 2007 A1
20070219645 Thomas et al. Sep 2007 A1
20070220301 Brundridge et al. Sep 2007 A1
20070220907 Ehlers Sep 2007 A1
20070221741 Wagner et al. Sep 2007 A1
20070223500 Lee et al. Sep 2007 A1
20070225868 Terlson et al. Sep 2007 A1
20070225869 Amundson et al. Sep 2007 A1
20070233323 Wiemeyer et al. Oct 2007 A1
20070236156 Lys et al. Oct 2007 A1
20070237032 Rhee et al. Oct 2007 A1
20070238413 Coutts Oct 2007 A1
20070239658 Cunningham et al. Oct 2007 A1
20070240226 Song et al. Oct 2007 A1
20070241203 Wagner et al. Oct 2007 A1
20070242058 Yamada Oct 2007 A1
20070245306 Dameshek et al. Oct 2007 A1
20070257120 Chapman, Jr. et al. Nov 2007 A1
20070257121 Chapman et al. Nov 2007 A1
20070260782 Shaikli Nov 2007 A1
20070260978 Oh et al. Nov 2007 A1
20070266329 Gaudette Nov 2007 A1
20070268667 Moorer et al. Nov 2007 A1
20070271521 Harriger et al. Nov 2007 A1
20070274093 Haim et al. Nov 2007 A1
20070277013 Rexha et al. Nov 2007 A1
20070278320 Lunacek et al. Dec 2007 A1
20070284452 Butler et al. Dec 2007 A1
20070299857 Gwozdz et al. Dec 2007 A1
20070300064 Isaacs et al. Dec 2007 A1
20080003845 Hong et al. Jan 2008 A1
20080004727 Glanzer et al. Jan 2008 A1
20080005428 Maul et al. Jan 2008 A1
20080006709 Ashworth et al. Jan 2008 A1
20080012437 Kabata et al. Jan 2008 A1
20080013259 Barton et al. Jan 2008 A1
20080029610 Nichols Feb 2008 A1
20080031147 Fieremans et al. Feb 2008 A1
20080040351 Jin et al. Feb 2008 A1
20080048045 Butler et al. Feb 2008 A1
20080048046 Wagner et al. Feb 2008 A1
20080054082 Evans et al. Mar 2008 A1
20080055190 Lee Mar 2008 A1
20080056722 Hendrix et al. Mar 2008 A1
20080057872 McFarland et al. Mar 2008 A1
20080057931 Nass et al. Mar 2008 A1
20080058996 Sachdev et al. Mar 2008 A1
20080059682 Cooley et al. Mar 2008 A1
20080062892 Dodgen et al. Mar 2008 A1
20080063006 Nichols Mar 2008 A1
20080065926 Poth et al. Mar 2008 A1
20080072704 Clark et al. Mar 2008 A1
20080073440 Butler et al. Mar 2008 A1
20080077884 Patitucci Mar 2008 A1
20080077886 Eichner Mar 2008 A1
20080082767 Nulkar et al. Apr 2008 A1
20080083009 Kaler et al. Apr 2008 A1
20080083834 Krebs et al. Apr 2008 A1
20080097651 Shah et al. Apr 2008 A1
20080104189 Baker et al. May 2008 A1
20080114500 Hull et al. May 2008 A1
20080120335 Dolgoff May 2008 A1
20080121729 Gray May 2008 A1
20080128523 Hoglund et al. Jun 2008 A1
20080129475 Breed et al. Jun 2008 A1
20080133033 Wolff et al. Jun 2008 A1
20080133060 Hoglund et al. Jun 2008 A1
20080133061 Hoglund et al. Jun 2008 A1
20080134087 Hoglund et al. Jun 2008 A1
20080134098 Hoglund et al. Jun 2008 A1
20080144302 Rosenblatt Jun 2008 A1
20080148098 Chen Jun 2008 A1
20080161976 Stanimirovic Jul 2008 A1
20080161977 Takach et al. Jul 2008 A1
20080161978 Shah Jul 2008 A1
20080167931 Gerstemeier et al. Jul 2008 A1
20080168255 Abou-Emara et al. Jul 2008 A1
20080168356 Eryurek et al. Jul 2008 A1
20080173035 Thayer et al. Jul 2008 A1
20080183335 Poth et al. Jul 2008 A1
20080184059 Chen Jul 2008 A1
20080185976 Dickey et al. Aug 2008 A1
20080186160 Kim et al. Aug 2008 A1
20080192649 Pyeon et al. Aug 2008 A1
20080192745 Spears Aug 2008 A1
20080195254 Jung et al. Aug 2008 A1
20080195581 Ashmore et al. Aug 2008 A1
20080195687 Jung et al. Aug 2008 A1
20080198036 Songkakul et al. Aug 2008 A1
20080215987 Alexander et al. Sep 2008 A1
20080216461 Nakano et al. Sep 2008 A1
20080217418 Helt et al. Sep 2008 A1
20080217419 Ehlers et al. Sep 2008 A1
20080223944 Helt et al. Sep 2008 A1
20080235611 Fraley et al. Sep 2008 A1
20080256475 Amundson et al. Oct 2008 A1
20080264085 Perry et al. Oct 2008 A1
20080272934 Wang et al. Nov 2008 A1
20080281472 Podgorny et al. Nov 2008 A1
20080294274 Laberge et al. Nov 2008 A1
20080294932 Oshins et al. Nov 2008 A1
20090001180 Siddaramanna et al. Jan 2009 A1
20090001182 Siddaramanna et al. Jan 2009 A1
20090049847 Butler et al. Feb 2009 A1
20090052105 Soleimani et al. Feb 2009 A1
20090057424 Sullivan et al. Mar 2009 A1
20090057425 Sullivan et al. Mar 2009 A1
20090062964 Sullivan et al. Mar 2009 A1
20090065597 Garozzo et al. Mar 2009 A1
20090077423 Kim et al. Mar 2009 A1
20090094506 Lakkis Apr 2009 A1
20090105846 Hesse et al. Apr 2009 A1
20090113037 Pouchak Apr 2009 A1
20090119092 Balasubramanyan May 2009 A1
20090132091 Chambers et al. May 2009 A1
20090140056 Leen Jun 2009 A1
20090140057 Leen Jun 2009 A1
20090140058 Koster et al. Jun 2009 A1
20090140061 Schultz et al. Jun 2009 A1
20090140062 Amundson et al. Jun 2009 A1
20090140063 Koster et al. Jun 2009 A1
20090140064 Schultz et al. Jun 2009 A1
20090143879 Amundson et al. Jun 2009 A1
20090143880 Amundson et al. Jun 2009 A1
20090143916 Boll et al. Jun 2009 A1
20090143918 Amundson et al. Jun 2009 A1
20090157529 Ehlers et al. Jun 2009 A1
20090195349 Frader-Thompson Aug 2009 A1
20090198810 Bayer et al. Aug 2009 A1
20090245278 Kee Oct 2009 A1
20090257431 Ramanathan et al. Oct 2009 A1
20090259785 Perry et al. Oct 2009 A1
20090261174 Butler et al. Oct 2009 A1
20090261767 Butler et al. Oct 2009 A1
20090266904 Cohen Oct 2009 A1
20090267540 Chemel et al. Oct 2009 A1
20090271336 Franks Oct 2009 A1
20090287736 Shike et al. Nov 2009 A1
20100011437 Courtney Jan 2010 A1
20100023865 Fulker et al. Jan 2010 A1
20100050075 Thorson et al. Feb 2010 A1
20100050108 Mirza Feb 2010 A1
20100063644 Kansal et al. Mar 2010 A1
20100070086 Harrod et al. Mar 2010 A1
20100070089 Harrod et al. Mar 2010 A1
20100070093 Harrod et al. Mar 2010 A1
20100070907 Harrod et al. Mar 2010 A1
20100073159 Schmickley et al. Mar 2010 A1
20100076605 Harrod et al. Mar 2010 A1
20100100253 Fausak et al. Apr 2010 A1
20100101854 Wallaert et al. Apr 2010 A1
20100102136 Hadzidedic et al. Apr 2010 A1
20100102948 Grohman et al. Apr 2010 A1
20100102973 Grohman et al. Apr 2010 A1
20100106305 Pavlak et al. Apr 2010 A1
20100106307 Grohman et al. Apr 2010 A1
20100106308 Filbeck et al. Apr 2010 A1
20100106309 Grohman et al. Apr 2010 A1
20100106310 Grohman Apr 2010 A1
20100106311 Wallaert Apr 2010 A1
20100106312 Grohman et al. Apr 2010 A1
20100106313 Grohman et al. Apr 2010 A1
20100106314 Grohman et al. Apr 2010 A1
20100106315 Grohman Apr 2010 A1
20100106316 Curry et al. Apr 2010 A1
20100106317 Grohman et al. Apr 2010 A1
20100106318 Grohman et al. Apr 2010 A1
20100106319 Grohman et al. Apr 2010 A1
20100106320 Grohman et al. Apr 2010 A1
20100106321 Hadzidedic Apr 2010 A1
20100106322 Grohman Apr 2010 A1
20100106323 Wallaert Apr 2010 A1
20100106324 Grohman Apr 2010 A1
20100106325 Grohman Apr 2010 A1
20100106326 Grohman Apr 2010 A1
20100106327 Grohman et al. Apr 2010 A1
20100106329 Grohman Apr 2010 A1
20100106330 Grohman Apr 2010 A1
20100106333 Grohman et al. Apr 2010 A1
20100106334 Grohman et al. Apr 2010 A1
20100106787 Grohman Apr 2010 A1
20100106809 Grohman Apr 2010 A1
20100106810 Grohman Apr 2010 A1
20100106814 Hadzidedic et al. Apr 2010 A1
20100106815 Grohman et al. Apr 2010 A1
20100106925 Grohman et al. Apr 2010 A1
20100106957 Grohman et al. Apr 2010 A1
20100107007 Grohman et al. Apr 2010 A1
20100107070 Devineni et al. Apr 2010 A1
20100107071 Pavlak et al. Apr 2010 A1
20100107072 Mirza et al. Apr 2010 A1
20100107073 Wallaert et al. Apr 2010 A1
20100107074 Pavlak et al. Apr 2010 A1
20100107076 Grohman Apr 2010 A1
20100107083 Grohman Apr 2010 A1
20100107103 Wallaert Apr 2010 A1
20100107109 Filbeck et al. Apr 2010 A1
20100107110 Mirza Apr 2010 A1
20100107111 Mirza Apr 2010 A1
20100107112 Jennings et al. Apr 2010 A1
20100107232 Grohman et al. Apr 2010 A1
20100115364 Grohman May 2010 A1
20100131884 Shah May 2010 A1
20100142526 Wong Jun 2010 A1
20100145528 Bergman et al. Jun 2010 A1
20100145629 Botich et al. Jun 2010 A1
20100168924 Tessier et al. Jul 2010 A1
20100169419 DeVilbiss et al. Jul 2010 A1
20100179696 Grohman et al. Jul 2010 A1
20100211546 Grohman et al. Aug 2010 A1
20100241245 Wiemeyer et al. Sep 2010 A1
20100259931 Chemel et al. Oct 2010 A1
20100264846 Chemel et al. Oct 2010 A1
20100270933 Chemel et al. Oct 2010 A1
20100272102 Kobayashi Oct 2010 A1
20100295474 Chemel et al. Nov 2010 A1
20100295475 Chemel et al. Nov 2010 A1
20100295482 Chemel et al. Nov 2010 A1
20100301768 Chemel et al. Dec 2010 A1
20100301769 Chemel et al. Dec 2010 A1
20100301770 Chemel et al. Dec 2010 A1
20100301771 Chemel et al. Dec 2010 A1
20100301772 Hahnlen et al. Dec 2010 A1
20100301773 Chemel et al. Dec 2010 A1
20100301774 Chemel et al. Dec 2010 A1
20100305761 Remsburg Dec 2010 A1
20100314458 Votaw et al. Dec 2010 A1
20100319362 Hisaoka Dec 2010 A1
20110001436 Chemel et al. Jan 2011 A1
20110001438 Chemel et al. Jan 2011 A1
20110004823 Wallaert Jan 2011 A1
20110004824 Thorson et al. Jan 2011 A1
20110007016 Mirza et al. Jan 2011 A1
20110007017 Wallaert Jan 2011 A1
20110010620 Mirza et al. Jan 2011 A1
20110010621 Wallaert Jan 2011 A1
20110010652 Wallaert Jan 2011 A1
20110010653 Wallaert Jan 2011 A1
20110010660 Thorson et al. Jan 2011 A1
20110032932 Pyeon et al. Feb 2011 A2
20110040785 Steenberg et al. Feb 2011 A1
20110061014 Frader-Thompson et al. Mar 2011 A1
20110063126 Kennedy et al. Mar 2011 A1
20110066297 Saberi et al. Mar 2011 A1
20110137467 Leen et al. Jun 2011 A1
20110160915 Bergman et al. Jun 2011 A1
20110251726 McNulty et al. Oct 2011 A1
20120012662 Leen et al. Jan 2012 A1
20120046792 Secor Feb 2012 A1
20120065805 Montalvo Mar 2012 A1
20120116593 Amundson et al. May 2012 A1
20120181010 Schultz et al. Jul 2012 A1
Foreign Referenced Citations (7)
Number Date Country
0980165 Feb 2000 EP
1956311 Aug 2008 EP
2241836 Oct 2010 EP
2241837 Oct 2010 EP
2117573 Oct 1983 GB
02056540 Jul 2002 WO
2008100641 Aug 2008 WO
Non-Patent Literature Citations (69)
Entry
Related case U.S. Appl. No. 12/603,508, filed Oct. 21, 2009 to Wojciech Grohman, entitled “Alarm and Diagnostics System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,450, filed Oct. 21, 2009 to Wojciech Grohman, entitled “Alarm and Diagnostics System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning Network ”.
Related case U.S. Appl. No. 12/603,382, filed Oct. 21, 2009 to Wojciech Grohman, entitled “Device Abstraction System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning System”.
Related case U.S. Appl. No. 12/603,504, filed Oct. 21, 2009 to Amanda Filbeck et al., entitled “System and Method of Use for a User Interface Dashboard of a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,449, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “System and Method of Use for a User Interface Dashboard of a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,460, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “System and Method of Use for a User Interface Dashboard of a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,526, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “Communication Protocol System and Methof for a Distributed-Architecture Heating, Ventilation and Air Conditioning Network K”.
Related case U.S. Appl. No. 12/603,532, filed Oct. 21, 2009 to Wojciech Grohman, entitled “Communication Protocol System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,475, filed Oct. 21, 2009 to Suresh Kumar Devineni et al., entitled “System and Method of Use for a User Interface Dashboard of a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,362, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “Architecture Heating, Ventilation and Air Conditioning System”.
Related case U.S. Appl. No. 12/603,473, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “System and Method for Zoning a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,407, filed Oct. 21, 2009 to Amanda Filbeck et al., entitled “System and Method for Zoning a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,496, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “Device Abstraction System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning System”.
Related case U.S. Appl. No. 12/603,482, filed Oct. 21, 2009 to Muhammad Mirza et al., entitled “System and Method of Use for a User Interface Dashboard of a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,488, filed Oct. 21, 2009 to Muhammad Mirza et al., entitled “System and Method of Use for a User Interface Dashboard of a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,495, filed Oct. 21, 2009 to Thomas Pavlak et al., entitled “System and Method of Use for a User Interface Dashboard of a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,497, filed Oct. 21, 2009 to Muhammad Mirza et al., entitled “System and Method of Use for a User Interface Dashboard of a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,431, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “General Control Technique in a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,502, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “System and Method of Use for a User Interface Dashboard of a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,489, filed Oct. 21, 2009 to Wojciech Grohman, entitled “System and Method for Zoning a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,527, filed Oct. 21, 2009 to Darko Hadzidedic et al., entitled “Memory Recovery Scheme and Data Structure in a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,479, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “Device Abstraction System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning System”.
Related case U.S. Appl. No. 12/603,536, filed Oct. 21, 2009 to Timothy Wallaert et al., entitled “Communication Protocol System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,509, filed Oct. 21, 2009 to Timothy Wallaert et al., entitled “System and Method of Use for a User Interface Dashboard of a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,464, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “Alarm and Diagnostics System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,528, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “Memory Recovery Scheme and Data Structure in a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,525, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “Method of Controlling Equipment in a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,520, filed Oct. 21, 2009 to Darko Hadzidedic et al., entitled “Alarm and Diagnostics System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,539, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “Communication Protocol System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,420, filed Oct. 21, 2009 to Darko Hadzidedic et al., entitled “Alarm and Diagnostics System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,483, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “Device Abstraction System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning System”.
Related case U.S. Appl. No. 12/603,514, filed Oct. 21, 2009 to Thomas Pavlak et al., entitled “System and Method of Use for a User Interface Dashboard of a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,515, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “Alarm and Diagnostics System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,490, filed Oct. 21, 2009 to Wojciech Grohman, entitled “System Recovery in a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,523, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “Alarm and Diagnostics System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning”.
Related case U.S. Appl. No. 12/603,493, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “System Recovery in a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,547, filed Oct. 21, 2009 to Wojciech Grohman, entitled “Communication Protocol System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,531, filed Oct. 21, 2009 to Wojciech Grohman, entitled “Memory Recovery Scheme and Data Structure in a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,555, filed Oct. 21, 2009 to Wojciech Grohman, entitled “Communication Protocol System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,562, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “Communication Protocol System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,566, filed Oct. 21, 2009 to Wojciech Grohman, entitled “Communication Protocol System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,451, filed Oct. 21, 2009 to Timothy Wallaert, entitled “Alarm and Diagnostics System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,553, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “Communication Protocol System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,487, filed Oct. 21, 2009 to Wojciech Grohman, entitled “System Recovery in a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,558, filed Oct. 21, 2009 to Wojciech Grohman, entitled “Communication Protocol System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,468, filed Oct. 21, 2009 to Wojciech Grohman et al., entitled “Programming and Configuration in a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,560, filed Oct. 21, 2009 to Wojciech Grohman, entitled “Communication Protocol System and Method for a Distributed-Architecture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,519, filed Oct. 21, 2009 to Thomas Pavlak, entitled “System and Method of Use for a User Interface Dashboard of a Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,499 ,filed Oct. 21, 2009 to Jimmy Curry et al., entitled “Alarm and Diagnostics System and Method for a Distributed-Architechture Heating, Ventilation and Air Conditioning Network”.
Related case U.S. Appl. No. 12/603,534, filed Oct. 21, 2009 to Timothy Wallaert et al., entitled “Flush Wall Mount Thermostat and In-Set Mounting Plate for a Heating, Ventilation and Air Conditioning System”.
Related case U.S. Appl. No. 29/345,748, filed Oct. 21, 2009 to Timothy Wallaert et al., entitled “Thin Cover Plate for an Electronic System Controller”.
Related case U.S. Appl. No. 29/345,747, filed Oct. 21, 2009 to Timothy Wallaert et al., entitled “Thin Cover Plate for an Electronic System Controller”.
“Define Track at Dictionary.com ,” http://dictionary.reference.com/browse/track, Mar. 12, 2013, 3 pages.
“Definition of Track by Macmillan Dictionary,” http://www.macmillandictionary.com/dictionary/british/track, Mar. 12, 2013, 4 pages.
“Definition of track by the Free Online Dictionary, Thesaurus, and Encyclopedia,” http://www.thefreedictionary.com/track, Mar. 12, 2013, 6 pages.
Checket-Hanks, B., “Zoning Controls for Convenience's Sakes, High-End Residential Controls Move Into New Areas,” Air Conditioning, Heating & Refrigeration News, ABI /INFORM Global, Jun. 28, 2004, 3 pages.
Leeb, G., “A User Interface for Home-Net,” IEEE Transactions on Consumer Electronics, vol. 40, Issue 4, Nov. 1994, pp. 897-902.
“IPMI-Intelligent Platform Management Interface Specification v1.5,” Document Revision 1.1, Intel Hewlett-Packard NEC Dell, Feb. 20, 2002, 460 pages.
Nash, H., “Fire Alarm Systems for Health Care Facilities,” IEEE Transactions on Industry Applications, vol. 1A-19, No. 5, Sep./Oct. 1983, pp. 848-852.
Bruggeman, E., et al., “A Multifunction Home Control System,” IEEE Transactions on Consumer Electronics, CE-29, Issue 1, 10 pages.
Fischer, H., et al., “Remote Building Management and DDc-Technology to Operate Distributed HVAC-Installations,” The first International Telecommunications Energy Special Conference, TELESCON '94, Apr. 11-15, 1994, pp. 127-132.
Gallas, B., et al., “Embedded Pentium ® Processor System Design for Windows CE,” WESCON 1998, pp. 114-123.
“iView-100 Series {iView/iView-100-40} Handheld Controller User's Manual,” ICP DAS, Mar. 2006, Version 2.0.
“Spectra™ Commercial Zoning System, Engineering Data,” Lennox, Bulletin No. 210366E, Oct. 2002, 33 pages.
Sharma, A., “Design of Wireless Sensors Network for Building Management Systems,” University of California-Berkley, 57 pages.
“Linux Programmer's Manual,” UNIX Man Pages: Login (1), http://unixhelp.ed.ac.uk/CGI/man-cgi?login, Util-linux 1.6, Nov. 4, 1996, 4 pages.
“Field Display for Tridium JACE Controllers Product Data,” HVAC Concepts, Inc. 2005, 22 pages.
“HVAC Concepts,” Jace Network-Installation, 2004, 2 pages.
“Definition of encase,” The Free Dictionary, http://www.thefreedictionary.com/encase, 2013, 2 pages.
Related Publications (1)
Number Date Country
20100106925 A1 Apr 2010 US
Provisional Applications (2)
Number Date Country
61167135 Apr 2009 US
61852676 Apr 2009 US
Continuation in Parts (1)
Number Date Country
Parent 12258659 Oct 2008 US
Child 12603512 US