The present invention relates generally to connectors for use in telecommunication networks such as voice, data or video networks. More specifically, to a connector system in which only certain plugs can mate with certain receptacles to provide discriminating access to particular information networks.
A need has developed to limit user access in data networks for security or other purposes. In recent years, buildings/offices are being equipped with different information networks, each having access to different data. It is important to restrict access to these networks to only authorized users. While some restrictions may be achieved using software approaches, such as passwords, the applicants have identified the need to restrict access further using some type of “physical barrier” to the networks. The present invention fulfills this need among others.
The following presents a simplified summary of the invention in order to provide a basic understanding of some aspects of the invention. This summary is not an extensive overview of the invention. It is not intended to identify key/critical elements of the invention or to delineate the scope of the invention. Its sole purpose is to present some concepts of the invention in a simplified form as a prelude to the more detailed description that is presented later.
The present invention provides a connector system which uses physical barriers to prevent unauthorized users from connecting to data networks. More specifically, the applicants recognize that the best protection against unauthorized users “hacking” into data networks containing confidential information is to prevent them from even connecting to the network. This can be accomplished using physical barriers which prevent plugs from mating with receptacles. To this end, the present invention facilitates discriminating mating among similar, but different, plugs and receptacles by using a system of geometrically matched connector components which allows certain combinations of plugs and receptacles—i.e., mating pairs—to mate, while preventing other combinations from mating. Thus, the connector system of the present invention imparts physical security to a particular data network by ensuring that only authorized users who possess a particular connector component can physically connect to the particular data network.
In a preferred embodiment, the network comprises: (a) a set of optical plugs, each plug having a housing and a ferrule, the housing having a front and back orientation and having a front face defining an opening, the ferrule being disposed within the opening, the housing defining a first keying element on the front face around the opening, the keying element for each optical plug of the set of optical plugs being different; and (b) a set of optical receptacles, each receptacle having an opening to receive the plug and a ferrule-receiving portion to receive the ferrule, the ferrule-receiving portion defining a second keying element to cooperate with the first keying element, the second keying element for each receptacle of the set of the optical receptacles being different and being adapted to cooperate with one and only one of the first keying elements, wherein plugs and receptacles having keying elements that cooperate are mating pairs.
Having the keying element located on the face of the plug provides for a number of benefits. First, these features can be molded with a relatively small change to the mold dies. Specifically, the opening around the ferrule is typically defined in the molding process by a core pin which is inserted into the outer mold. Changing core pin configurations is a relatively inexpensive and easy step compared to altering the configuration of the outer molds. Therefore, as mentioned above, the connector system of the present invention provides for a variety of different plug configurations with only slight modifications to the molding process.
Having the security features on the front face of the plug also provides for an early indication of non-mateability. Specifically, since the features are located on essentially the leading edge of the plug, they are positioned optimally to “stub” as soon as possible when a plug is inserted into a non-mating receptacle. The applicants recognize that interference between connector components which are non-mating should be made as soon as possible to minimize the possibility of coupling light between connectors. That is, if close enough, optical connectors are able to couple, albeit with high loss, even if the connectors are not mechanically engaged. This condition can be meliorated by preventing the light carrying elements from getting too close—hence the desire to stub early. Stubbing early also provides an early signal to the user that the plug is non-mating and avoids the tendency of trying to force a plug into a non-mating receptacle.
Additionally, by locating the keying feature on the leading surface of the plug, the corresponding keying feature on the receptacle may be located internally and still provide an early indication of non-mateability. This is beneficial since it is desirable to locate the keying feature of the receptacle internally to minimize the ability of the keying feature to be tampered with or otherwise overridden. As discussed below, this is of particular importance in the configuration of the MT-RJ and LC connectors in which the plug defines the slot and the receptacle defines the key. If the key is removed, the security feature is breached. Having the key located within the receptacle reduces this risk.
Yet another benefit of having the keying features located on the front face of the plug is the visual indication the plug provides with respect to its keying features. That is, one can readily determine the keying configuration of the plug by visual inspection of its front face. There is no need to look into an opening to inspect the internal geometry of the plug to determine its keying configuration.
Another aspect of the present invention is an economical process for producing the plugs by altering their geometry at their front end though a simple mold modification. In a preferred embodiment, the process comprises: (a) molding a first housing for a first plug of a set of plugs using a core pin to define an opening having a first keying element in a first position; and (b) molding a second housing for a second plug of the set of plugs by adjusting only the core pin to define the opening having a first keying element in a second position different than the first position.
Yet another embodiment of the present invention is a multi-connector assembly in which two or more of the connectors have different secure features. In one embodiment, the connector system comprising a multi-plug connector, each plug having a housing and a ferrule, the housing having a front and back orientation and having a front face defining an opening, the ferrule being disposed within the opening, the housing defining a first keying element on the front face around the opening, at least two housings of the multi-plug connector having different the first keying elements.
a)-6(c) show top perspective, front and rear views, respectively, of an MT-RJ connector plug having security features of the present invention.
a) and 7(b) show top perspective and front views, respectively, of an MT-RJ connector receptacle.
a) and (b) show duplex and quad connectors having receptacles with the same security features.
a) and (b) show duplex and quad connectors having receptacles with different security features.
The present invention relates to a connector system comprising a series of connector components which interconnect with each other in a discretionary way. Referring to
The plug typically contains a conductive element, such a fiber or wire, which mates with a similar element in the receptacle. In fiber optic applications, it is common for the conductive element to be contained in a ferrule, which in turn is housed by the plug. In a preferred embodiment, the ferrule is an MT-type ferrule.
The outer surface of the plug 101 and the inner surface of the tub 102 have first and second geometries, respectively, which cooperate to allow only certain pairs of plugs and receptacles to mate (herein Amating pairs,@ Amating plug and jack,@ or Akeyed pair@), and which physically interfere for all other combinations of plugs and jacks (herein Anon-mating pairs,@Anon-mating plugs and jacks@ or Anon-keyed pairs@), thereby preventing non-mating plugs and jacks from effecting an optical or electrical coupling.
The first and second geometries may embody any known keying mechanism which discriminates between connector components. Such keying mechanisms include, for example, a key and slot relationship between the plug and jack, a receptacle dimensioned to receive only certain sized or shaped plugs, and even a magnetic signature for either attracting (for mating pairs) and repulsing (non-mating pairs). Preferably, the keying mechanism involves just a slight modification to the plug and jack such that essentially the same molds can be used to manufacture connectors of different keyed pairs. Although molding is preferred, it is should be understood that other techniques for producing the first and second geometries can be used including, for example, over molding and machining.
In a preferred embodiment, the invention uses a key and slot mechanism. For simplicity, the term “keying elements” refers collectively to the key and the slot. Specifically, the slot can be embodied in the first or second geometry and the key can be embodied in the other geometry. In the particularly preferred embodiment shown in
This configuration is preferred since the key may cooperate with other Aribs@ on the connector for pre-alignment purposes. More specifically, with particular reference to
In a preferred embodiment, the mating end of the key 104 contains a flat portion shown as 105 and the mating end of the plug 101 has a chamfers 106 on the corners of the edges of the slot 103, while the remainder of the mating end of the plug comprises a flat portion 107. The radius corners on the key 106 and the chamfers on the plug 101 work as a guiding device and provide for the necessary alignment between the key and the slot when the plug is inserted into the tub of the jack. On the other hand, as shown in
The position of the key 104 on the tub 102 and the slot 103 on the plug 101 can be varied in such a manner so that a plurality of mutually-exclusive slot and key positions are formed. In one embodiment, the series of key and slot locations are mutually exclusive so that there is a one-to-one correspondence between jacks and plugs. In another embodiment, certain plugs may be configured to mate with a variety of different jacks. For example, it may be worthwhile to give network administers or people with high security clearance certain Amaster@ plugs which are capable of mating with a number of jacks having different slot positions. Referring to the figures,
The number of possible mutually exclusive mating pairs for a given plug and receptacle is a function of the physical parameters of the plug and the receptacle. More specifically, with reference to
X1−C/2+(D−A)+Δ<=F/2 (1)
X2+B/2<A/2−W (2)
X1a+Clear1+Z=X1b (3)
wherein:
These relationships must be satisfied for the mating pairs to mate and for the non-mating pairs to definitely not mate. Specifically, for a mating pair, Relationship (1) requires that half the ferrule width must be no less than X1 less one half of C added to the difference between the width of the tub opening D less the width of the plug added to the difference between the centerline of the ferrule within the plug and the centerline of the plug. This ensures that the key is not positioned outside of the area on which at least a portion of the ferrule will reside. By adhering to this parameter, the key will have some overlap with the ferrule, and thus will provide for pre-alignment of the ferrule in the same manner as do the ribs on the three sides of the ferrule without the key.
Relationship (2) requires that X2 added to one-half of dimension B is less than one-half of dimension A less W. This assures that the slot resides on the plug within the confines of the plug walls.
Finally, according to Relationship (3), for each mutually exclusive position, the distance X1 for the first connector in the system (X1a) added to Clear1 added to a predefined interference interval Z would correspond to the distance X1 for the next slot/key position (X1b) Z is the minimum distance required to ensure that the flat portion of the key does not contact the flat portion of the plug 107 when a user attempts to mate the two portions of a connecter which is intended to mate.
By way of example, four mutually exclusive locations for locating the slot on the plug housing and the key on the tub are defined below for an MT-RJ connector. The MT-RJ connector has the following dimensions:
Based on these MT-RJ dimensions, it has been found that the following X1 key positions satisfy the relationships above:
For example,
Although the data above indicates four mutually exclusive positions, it should be understood that additional positions are possible within the parameters of the MT-RJ connector. Additionally, it should be understood that the combinations of various key positions can be used to increase the number of permutations of mating pairs. For example, in addition to the four mating pairs listed above, additional mating pair configurations may obtained from the following combinations of key positions:
In a preferred embodiment, the key and slot components are combined with the industry standard MT-RJ connector.
a)-(c) show the plug 602 of the MT-RJ connector combined with the slot 601 of the present invention.
To provide a simple and readily apparent indication to the user of which plugs mate with which receptacles, it is preferable to mark mating pairs with indicia or color to indicate their compatibility. In a preferred embodiment, the components of a mating pair are a similar color different from all others used in the connector system.
Referring to
Although the LC connector system described above is a single-fiber ferrule rather than a multifiber ferrule, the general keying features are essentially the same as those described above with respect to the MT-RJ connector. Further, the keying features of the plug 800 and receptacle 900 of the present invention may be implemented in any well known optical connector including, for example, other single-fiber ferrule connectors such as MU, SC, ST, or FC connectors. For illustrative purposes, the security features are described with respect to the LC connector system, which includes the LC plug (plug 800) and LC adapter (receptacle 900). Aside from the security features described herein, these connector components are the same as those specified in the LC Standard available on-line or from OFS (Japan), and the common features between them will not be addressed herein.
Like the MT-RJ embodiment described above, the keying features of the LC connector are contained on the front face of the plug. This is important for a number of reasons. First, these features can be molded with a relatively small change to the mold dies. Specifically, the opening around the ferrule is typically defined in the molding process by a core pin which is inserted into the outer mold. Changing core pin configurations is a relatively inexpensive and easy step compared to altering the configuration of the outer molds. Therefore, as mentioned above, the connector system of the present invention provides for a variety of different plug configurations with only slight modifications to the molding process.
Having the security features on the front face of the plug also provides for an early indication of non-matability. Specifically, since the features are located on essentially the leading edge of the plug, they are positioned optimally to “stub” as soon as possible when a plug is inserted into a non-mating receptacle. The applicants recognize that interference between connector components which are non-mating should be made as soon as possible to minimize the possibility of coupling light between connectors. That is, if close enough, optical connectors are able to couple, albeit with high loss, even if the connectors are not mechanically engaged. This condition can be meliorated by preventing the light carrying elements from getting too close—hence the desire to stub early. Stubbing early also provides an early signal to the user that the plug is non-mating and avoids the tendency of trying to force a plug into a non-mating receptacle.
Additionally, by locating the keying feature on the leading surface of the plug, the corresponding keying feature on the receptacle may be located internally and still provide an early indication of non-matability. This is beneficial since it is desirable to locate the keying feature of the receptacle internally to minimize the ability of the keying feature to be tampered with or otherwise overridden. As discussed below, this is of particular importance in the configuration of the MT-RJ and LC connectors in which the plug defines the slot and the receptacle defines the key. If the key is removed, the security feature is breached. Having the key located within the receptacle reduces this risk.
Yet another benefit of having the keying features located on the front face of the plug is the visual indication the plug provides with respect to its keying features. That is, one can readily determine the keying configuration of the plug by visual inspection of its front face. There is no need to look into an opening to inspect the internal geometry of the plug to determine its keying configuration.
The keying elements that may be used in the LC connector are the same as those described above with respect to the MT-RJ embodiment. In a preferred embodiment, the keying elements comprise a slot and a key. The slot can be embodied in the first or second geometry and the key can be embodied in the other geometry. In a first configuration, the slot is embodied in the first geometry and the key is embodied in the second geometry, while in a second configuration, the key is embodied in the first geometry and the slot is embodied in the second geometry.
The LC connector shown in
Furthermore, since the physical “barrier”—i.e., the key—is located on the receptacle in the first configuration, it will serve to facilitate discriminatory mating among, not only plugs employing security features, but also existing plugs which have no security features of the present invention. Specifically, if a slot in the plug is necessary to accommodate the key of the receptacle, then plugs without slots will not mate with receptacles having the key. Therefore, ordinary, non-secure type plugs which do not have the slot in the proper position will not mate with the receptacle. In contrast, a non-secure receptacle will mate with a secure plug of the first configuration. Specifically, since the physical barrier is absent from the receptacle, any ordinary or secure plug can mate with it. As discussed below, the situation with the second configuration is opposite from that of the first, meaning that a secure plug cannot mate with a non-secure receptacle but a secure receptacle can mate with a non-secure plug. To provide for discrimination between secure and non-secure connectors components, a secondary key is added to the system as discussed below.
A connector system having the second configuration offers certain benefits, but also presents certain challenges. One benefit is that the space consuming security feature—i.e., the slot—resides in the receptacle which is typically larger than the plug and better suited for accommodating this feature. That is, since a slot is defined by the material around it, a slot requires more room than a key. The receptacle does not have the same space constraints as a plug (which is designed to be inserted in the receptacle) and may be more capable of accommodating the slot than the plug. Additionally, it may be preferable to have one “master” plug which plugs into all receptacles having security features. This is easily accomplished with a connector system of the second configuration. Specifically, the master plug would simply be one having no key to interfere with the first geometry of the receptacle. The simplicity in offering a master plug in the connector system of the second configuration also gives rise to a challenge facing the system—the ability of non-secure plugs to mate with secure receptacles (discussed below).
Referring to
The number of slots in the combination of first keying elements depends upon the number of possible positions of the slots. Specifically, the number of possible permeations of different mating pairs is given by the following equation:
Below is a table providing data on the theoretical number of mating pairs, nCr, for different n and r values.
nCr
From this data, it is clear that the maximum number of permutations (i.e., nCr) is reached when the number of positions occupied equals n divided by 2. Therefore, in the preferred embodiment, either n/2 slots (if n is an even integer) or (n±1)/2 slots (if n is an odd integer) of spatially discrete positions are occupied by either a slot with respect to the plug or a key with respect to the receptacle. (For purposes of simplicity, hereinafter, n will be presumed to be an even number.) Therefore, using the equation above, the embodiment shown in
Referring to
In a preferred embodiment, the connector system of the present invention may contain one or more master plugs of varying levels. That is, there may be lower-level master plugs, which can mate with receptacles of two different networks, or higher-level master plugs, which can mate with receptacles of three or more networks. The difference in the level of the mater plug is a function of the r number of slots occupying n possible positions—the more slots there are, the higher the plug's level. Specifically, the master plug comprises a first keying element having a third combination of greater than n/2 slots, in which the slots occupy the positions of at least two different first combinations as described above. Higher level master plugs have slots which occupy the positions of three or more different first combinations.
Aside from showing the different combinations of keying elements,
To effect the different combinations of positions, the core pin is preferably adjusted by rotating it in θ increments, in which θ is equal to 360°/m, wherein m is an integer. Preferably m is an integer from 2-18, more preferably from 2-5, and even more preferably from 3-4. In the embodiment shown in
Once the housings are prepared, a ferrule is disposed in the opening of each housing to form a subassembly. A fiber may be terminated in the ferrule either before or after the preparation of the subassembly. For field-terminatable connectors, it may be preferable to dispose just a fiber stub in the ferrule. This configuration facilitates field installation of a fiber as discussed, for example, in WO2005004285. Regardless of whether a stub or a fiber is terminated in the ferrule, the preferred keying arrangement of the present invention in which slots radiate outwardly from the opening 802 allows the subassembly of the LC connector to be polished, inspected, and tested using standard polishing equipment as mentioned above.
An advantage of the connector system of the present invention is that different receptacles may be combined to form “hybrid” adapters. More specifically, aside from the second keying element extending outward from the ferrule receiving portion, the receptacles are the same as those used for standard connectors. This allows different receptacles to be combined back to back to form hybrid adapters. In a particularly preferred embodiment, a secure receptacle is combined with a nonsecure receptacle by ultrasonically welding, or other known technique. Such a configuration is particularly useful in situations in which the nonsecure end of the adapter is located in an inherently secure area, for example, behind a wall or panel, where access is already limited. In other words, since connectors within cabinets and walls cannot be accessed readily after construction, the advantages derived from a secure connector at those ends would be minimal. Thus, it is preferable to use a nonsecure connector in these situations so the installer need not concern himself with the “proper” secure connector configuration during the installation of the infrastructure wiring.
To discriminate between secure and non-secure connector systems, the present invention provides for a secondary key & slot configuration, which is either non-existent or in a different position for all plugs and receptacles which are outside of the given connector system 800. For example, referring to
It is worthwhile to note that the use of the secondary key/slot adds another security feature to the connector system—essentially another keying mechanism. This additional keying feature increases the number of permutations within a given connector system. That is, rather than maintaining the same secondary key and slot location for all connectors within a system, it can be moved to form different classes within the same family
Preferably, the keying elements (primary and secondary) are positioned such that not mating pairs “stub” at about the same axial position relative to one another regardless of whether the connectors are interfering because they are different types of secure connectors or whether they are interfering because they are secure/non-secure connectors. This way, the user becomes accustomed to the point at which non-mating connector components interfere, thereby reducing the risk of the user forcing non-mating components together.
To provide a simple and readily apparent indication to the user of which plugs mate with which receptacles, it is preferable to mark mating pairs with indicia or color to indicate their compatibility. In a preferred embodiment, the components of a mating pair are a similar color different from all others used in the connector system.
The system described allows for a series of mutually-exclusive connectors to be used in a manner which provides physical security to a network system. In light of the often highly sensitive data stored on many of the networks in use today, this is a highly desirable feature. The present invention is an effective way to segregate separate networks and assure that the proper users are connecting to the desired network. Additionally, the present invention may be employed in the manufacture of devices in which fibers or wires need to be connected in particular arrangements. More specifically, the discriminating connectors of the present invention can be engineered into a system such that, during manufacturing, the correct connection of the fibers/wires is ensured by the mating pairs and their ability to prevent all other “incorrect” connections. Applications requiring particular routing of fibers or wires include, for example, routers, backplane assemblies, and even component devices such as multiplexers/demultiplexers.
Considering, for example, routers/backplane assemblies, the connector system of the present invention can be used to organize switch racks and, more specifically, to manage patch cables to reduce clutter and improve the ease, reliability, and security of the patch cable installation by providing customer specific patch cables/backplane connections.
By way of background, although network architectures may vary, common to most networks, and of particular interest herein, are switch rack systems. Such systems involve multiple-port switches mounted in a rack. Each activated port of a switch is connected to an aggregation box in the panel with a patch cable. The aggregation box, in turn, is connected to a deaggregation or breakout box with a trunk cable. The breakout box breaks out the trunk into individual channels again. The interconnections between the ports and the aggregation box and between the aggregation and breakout boxes may be accomplished using optical fiber or electrical conductor.
One of the objectives in designing switch racks is to minimize floor space. To this end, efforts are generally concentrated on increasing port density. This means increasing the number of ports on a particular switch and increasing the number of switches that fit into a particular rack or panel. A challenge in designing and installing such high port density switch racks is organizing the patch cables interconnecting the ports to the aggregator. Each activated port requires a discrete connection to the aggregator. This can lead to a great quantity of patch cables and general clutter, which creates a strong likelihood that a patch cable will be connected to the wrong port in error. Even trained technicians find it difficult to work around such clutter effectively and without making errors. If a patch cable is in fact connected to the wrong port, it may take hours to troubleshoot and resolve the problem in the mass of interconnections. Therefore, a need exists for a switch rack system that reduces the likelihood of improper interconnections.
The connector system of the present system fulfills this need among others. Specifically, the patch cables may be configured with one or more particular secure connectors to ensure that the correct plug is plugged into the correct receptacle. In one embodiment, the interconnections are not only secure, but customized for a particular user. Specifically, Applicants recognize that many of the interconnections involve multi-connector assemblies such as duplex and quad connectors. Applicants also realized that the multi-connector assemblies provide an opportunity to increase the number of permutations of the secure connectors to the extent that particular duplex and quad connector assemblies can be provided on a per customer basis.
By way of background, referring to
Although the connector embodiments of
Although the number of permutations of the quad shown in
In addition to a desire to avoid additional tooling requirements, Applicants have identified a need to further increase the number of unique connector combinations so that certain multi-connector configurations can be customized for a particular user. To this end, Applicants disclose herein multi-connector assembly in which two or more of the geometries of the connectors of a given assembly are different. For example, one embodiment of the duplex connector 1401 of the present invention is shown in
Even more permutations can be derived from the quad connector 1404 as shown in
In addition to increasing the number of unique connector assemblies, varying the geometry among the connectors of a given assembly also improves the resilience of the connector to a “forced” connection. Specifically, when the geometries are aligned as they are in the connectors of
It should be understood that specific plug assemblies such as a duplex and quad are not illustrated particularly herein, but that such connectors assemblies are produced by clipping together simplex connectors, such as those shown in
Because the present invention provides for so many unique combinations, it is possible to designate certain unique configurations for certain customers. In this regard, the color of the connector itself may be used to render it unique for a certain customer. For example, the quad connector embodiment shown in
In one embodiment, the housings are color coded as described above. In another embodiment, the connectors comprise strain relief boots extending rearwardly (not shown) that are color coded to increase the number of color permutations possible. Such strain relief boots are well known and are disclosed, for example, in U.S. Pat. No. 7,695,197, incorporated herein by reference.
It should be understood that while the multiple connector configurations were discussed in terms of a patch cords, the application is by no means limited to patch cord applications. Indeed, the unique multi-connector arrangements can be applied in any situation requiring multi-connector connections. In this regard, it should be understood that the foregoing is illustrative and not limiting and that obvious modifications may be made by those skilled in the art without departing from the spirit of the invention. Accordingly, the specification is intended to cover such alternatives, modifications, and equivalence as may be included within the spirit and scope of the invention as defined in the following claims.
This present application is a continuation of application Ser. No. 12/876,943, filed Sep. 7, 2010, currently pending; a continuation-in-part of application Ser. No. 12/061,064, filed Apr. 2, 2008, now U.S. Pat. No. 7,789,572; a continuation-in-part of application Ser. No. 11/930,751, filed Oct. 31, 2007, now U.S. Pat. No. 7,651,277; a continuation-in-part of application Ser. No. 11/254,356, filed Oct. 20, 2005, now U.S. Pat. No. 7,325,976; a continuation-in-part of application Ser. No. 10/982,374, filed Nov. 5, 2004, now U.S. Pat. No. 7,207,724; a continuation-in-part of application Ser. No. 11/025,090, filed Dec. 29, 2004, now U.S. Pat. No. 7,182,523; a continuation-in-part of application Ser. No. 11/108,489, filed Apr. 18, 2005, now U.S. Pat. No. 7,118,286; a continuation-in-part of application Ser. No. 09/908,140, filed Jul. 17, 2001, now U.S. Pat. No. 6,960,025, which is a non-provisional application of Provisional Application No. 60/218,705, filed Jul. 17, 2000. The application hereby claims priority to all of the aforementioned applications, which are also all hereby incorporated by reference in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
4076361 | Campbell | Feb 1978 | A |
4531798 | Baur et al. | Jul 1985 | A |
4596436 | Kraemer et al. | Jun 1986 | A |
4746298 | Hollander | May 1988 | A |
4764129 | Jones et al. | Aug 1988 | A |
4781626 | Lazarchik | Nov 1988 | A |
4784614 | Sadigh-Behzadi | Nov 1988 | A |
4864129 | Paske et al. | Sep 1989 | A |
4875753 | Kalomiris | Oct 1989 | A |
5044994 | Van Woensel | Sep 1991 | A |
5167542 | Haitmanek | Dec 1992 | A |
5244402 | Pasterchick, Jr. et al. | Sep 1993 | A |
5274729 | King et al. | Dec 1993 | A |
5335301 | Newman et al. | Aug 1994 | A |
5342221 | Peterson | Aug 1994 | A |
5420951 | Marazzi et al. | May 1995 | A |
5423692 | Francis | Jun 1995 | A |
5481634 | Anderson et al. | Jan 1996 | A |
5521997 | Rovenolt et al. | May 1996 | A |
5579425 | Lampert et al. | Nov 1996 | A |
5628648 | Higgins et al. | May 1997 | A |
5675682 | De Marchi | Oct 1997 | A |
5692080 | Lu | Nov 1997 | A |
5726424 | Koether | Mar 1998 | A |
5729644 | Shiflett et al. | Mar 1998 | A |
5828804 | Akins et al. | Oct 1998 | A |
5902155 | Polgar et al. | May 1999 | A |
5923805 | Anderson et al. | Jul 1999 | A |
6019521 | Manning et al. | Feb 2000 | A |
6130977 | Rosson | Oct 2000 | A |
6149313 | Giebel et al. | Nov 2000 | A |
6179477 | De Marchi | Jan 2001 | B1 |
6183287 | Po | Feb 2001 | B1 |
6200040 | Edwards et al. | Mar 2001 | B1 |
6220763 | Stephenson | Apr 2001 | B1 |
6224268 | Manning et al. | May 2001 | B1 |
6247850 | Edwards et al. | Jun 2001 | B1 |
6354746 | Lee | Mar 2002 | B1 |
6357930 | Wiltjer | Mar 2002 | B1 |
6383032 | Gerberding | May 2002 | B1 |
6419400 | Wiltjer et al. | Jul 2002 | B1 |
6422759 | Kevern | Jul 2002 | B1 |
6435730 | Kevern et al. | Aug 2002 | B1 |
6543941 | Lampert | Apr 2003 | B1 |
6769813 | Cheng | Aug 2004 | B2 |
6960025 | Gurreri | Nov 2005 | B2 |
7118286 | Gurreri et al. | Oct 2006 | B2 |
7182523 | Abendschein et al. | Feb 2007 | B2 |
7207724 | Gurreri | Apr 2007 | B2 |
7258493 | Milette | Aug 2007 | B2 |
7325976 | Gurreri et al. | Feb 2008 | B2 |
7336883 | Scholtz | Feb 2008 | B2 |
7500790 | Erdman et al. | Mar 2009 | B2 |
7651277 | Gurreri | Jan 2010 | B2 |
7695197 | Gurreri | Apr 2010 | B2 |
7789572 | Gurreri et al. | Sep 2010 | B2 |
20110058774 | Gurreri et al. | Mar 2011 | A1 |
Number | Date | Country |
---|---|---|
2005004285 | Jan 2005 | WO |
2005029147 | Mar 2005 | WO |
Entry |
---|
AMP Incorporated, SDL Top-Entry and Side-Entry PC Board Receptacles Application Specification 114-2081, Mar. 26, 1996, Rev. D., pp. 1 to 11. |
Patent Trial and Appeal Board, “Decision—Motions—BD.R. 125(a)”, Paper 107, Gurreri v. Milette, Interference No. 105,863, filed Dec. 13, 2012. |
Patent Trial and Appeal Board, “Decision on Request for Rehearing—BD.R. 125”, Paper 1147, Gurreri v. Milette, Interference No. 105,863, filed Feb. 1, 2013. |
Patent Trial and Appeal Board, “Decision—Priority”, Paper 171, Gurreri v. Milette, Interference No. 105,863, filed Nov. 18, 2013. |
Number | Date | Country | |
---|---|---|---|
20120315000 A1 | Dec 2012 | US |
Number | Date | Country | |
---|---|---|---|
60218705 | Jul 2000 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12876943 | Sep 2010 | US |
Child | 13447613 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12061064 | Apr 2008 | US |
Child | 12876943 | US | |
Parent | 11930751 | Oct 2007 | US |
Child | 12061064 | US | |
Parent | 11254356 | Oct 2005 | US |
Child | 11930751 | US | |
Parent | 10982374 | Nov 2004 | US |
Child | 11254356 | US | |
Parent | 11025090 | Dec 2004 | US |
Child | 10982374 | US | |
Parent | 11108489 | Apr 2005 | US |
Child | 11025090 | US | |
Parent | 09908140 | Jul 2001 | US |
Child | 11108489 | US |