Electronic commerce systems, such as Internet-based shopping systems, allow purchasers to purchase products remotely electronically and in some cases later visiting an actual store for pickup. At the same time, those stores may have local customers that are also placing orders. Accordingly, large quantities of orders may be placed by customers remotely via access devices and locally within the store. Delivery of the orders to the appropriate customer has been less than an ideal experience for the customers due to the confusion of the products arrival at common fulfillment locations at the stores.
The disclosure is better understood regarding the following drawings. The elements of the drawings are not necessarily to scale relative to each other. Rather, the emphasis has instead been placed upon illustrating the claimed subject matter. Furthermore, like reference numerals designate corresponding similar parts through the several views. For brevity, reference numbers used in later drawings that are repeated may not be re-described.
Disclosed is a system and method for improving customized order delivery that improves a customer's experience and improves the efficiency of the fulfillment process. The system allows for continued interaction with a customer after order fulfillment and thereby permits for improving future order fulfillment events by detecting variances perceived by the customer and/or capturing positive customer experiences during the fulfillment. A set of preferences for the customer based on the perceived variances and positive experiences may be updated. The proposed customized order fulfillment technique also allows for brand protection from counterfeit products and reducing errors made in the fulfillment of specialized orders for the customer. A further benefit is that confusion may be significantly reduced or eliminated when customers retrieve their custom orders from a common fulfillment area. More detail and examples follow in the description below.
In the first progression, order placement 106, multiple customers 102 may place orders in several various ways. For instance, they may place orders using multiple ordering devices 110, including a smartphone 112 (which may also entail cellphones, personal data assistants, e-readers, phablets, and the like), a tablet 114, a monitor 116 (such as an order kiosk, table-based electronic menu, light clients, and the like), portable computer 118 (such as laptops, notebooks, netbooks, and the like), and personal computers 120 (such as desktops, servers, gaming consoles, TV streaming devices, and the like). More conventional ordering to an intermediate party such as a waitperson, a counter representative, a drive-up window, etc. and entered into an ordering system 122 may also occur.
In all ordering situations, there may be a camera 104 in the electronic devices or separately to take a picture of the customer or perform facial recognition of the customer or both. Facial recognition of the customer may be just to identify a customer from another group of customers and not necessarily recognize the customer by name. Further, other biometric inputs such as fingerprints, voice recognition, retinal scans, and the like may also be used to identify the customer from other customers. In some examples, facial recognition attributes used in facial recognition may not be kept as a permanent record and only generated at a time of order. The customer can also be identified by scanning a previous order, or by use of various ID tokens such as key fobs, customer loyalty cards, RFID tags, cell phone ID, and the like. The multiple customers 102 may each place individual custom orders by selecting from a set of options to create order options 143 and selecting from a set of preferences known about the respective customer 102. The set of preferences may be an empty set in some situations. A representation 152 of the customer 102 may also be entered, such as a picture taken by camera 104, a stored image of the customer 102, another stored image, a color, emoji, icon, or another marking. In some examples, a check is made to the ordering system to ensure that the representation 152 of the customer 102 is sufficiently unique from other customers 102 that have already placed orders that have not been fulfilled. If the customer 102 has placed a prior order that has not been fulfilled and then places an additional order, a separate image or icon may be used, or the chosen image or icon may be modified to add additional information to allow it to be distinguished from the earlier order customer representation 152.
In the second progression, order fulfillment 107, the orders from customers 102 are received for an object 150, and each order includes the chosen set of order options 143 and preferences and the customer representation 152. After receipt of order, a unique ID 140 is created, assigned or otherwise associated with the order for each item in a multiple workflow fulfillment process 134 that has a separate workflow 136, 137, 138 with one or more workflow stations 135 to be performed by multiple workers 132. Each workflow station 135 may have a unique workflow ID for identification of the point in the workflow process. Each workflow 136, 137, 138 may be completed with varying workflow completion times and may have a different number of workflow steps 135 that occur at one or more workflow stations 135. The workflow at each workflow station 135 may be performed by one or more of the multiple workers 132. Each of the multiple workers 132 may have a unique worker ID 139 assigned to them to allow for tracking and monitoring of the performance of each worker 132.
The unique ID 140 may be created in several different ways. In one example, the unique ID may be requested from a global product authentication service on the Internet or locally on a local network. One such authentication service is Hewlett-Packard Enterprise™ Global Product Authentication Service (HPE-GPAS™) that allows for the generation of unique security codes. For instance, HPE-GPAS™ provides a mass serialization engine that offers cryptographic security for generating unique product security codes. These secure codes are GS1 GTIN-compliant and may be used to identify an appurtenance 148. Appurtenance 148 may be a container 146, a wrapper such as a sleeve for container 146, an appendage such as a straw or stirring stick, a component of the order such as the object or its case, an attachment such as a label, or an addition such as a printed or otherwise formed mark. While the container 146 in this example is shown as a cup, the container 146 may be a shipping box, a storage box, a pill container, a bag, etc. In this situational environment, the appurtenance 148 is subordinate to the more important order but is adjunct to it and may or may not be an integral part of the order. With respect to the HPE-GPAS™, batches of unique IDs 140 may be requested and delivered to suppliers for pre-printing prior to customer orders. In other situations, the unique ID 140 may be fully or partially created by printing onto container 148 or labels at the time of ordering. The HPE-GPAS™ service may also provide for brand protection. Other serialization services to provide unique ID 140 include HP™ Inc.'s Indigo™ Smart Stream™ software and HP™ Link Technology™.
For instance, in an online ordering fulfillment environment, container 146 may be a shipping box. Rather than using a label printed with unique ID 140, the containers 146 may be preprinted with the unique ID 140 so that each shipping box received is individually serialized and the unique ID 140 cannot be removed from it, by accident, by intent, or otherwise. The pre-printed shipping boxes can be checked on arrival and non-authenticated (based on invalid unique IDs 140) counterfeit boxes diverted out of the workflow. In some examples, the unique ID 140 is printed on the shipping boxes in an angle-independent manner and is readable however the shipping box is oriented. This can be performed by printing on all faces of the shipping box so even if one copy is marred or unreadable; the unique ID 140 is readable on that face elsewhere. Multiple marks may be used for the unique ID 140 to provide a tiered security of information. In some examples, the multiple marks may include a hash, digital signature, or another mark, solely or in addition to the use of the unique ID 140 as a unique serialization. The unique ID 140 may also be created from multiple marks.
For example, the unique ID 140 may be created from an existing serial number or barcode with an additional mark to improve the uniqueness and allow for future interaction with the customer 142 to occur. For instance, a serialization of the unique ID may be distributed across multiple marks to expand the serialization to permit a one order-to-one person mapping such that each order is ensured of a unique ID 140, over time and large populations, that has not been previously used. This technique allows the use of existing marks to be used and the unique ID 140 would only come together after the multiple marks are successfully read. For instance, one barcode mark may contain 38-bits of serialization (such as SGTIN-96). Another barcode mark may be included along with the first to increase the serialization by another 32 bits thereby increasing the serialization to 70 bits total. 2{circumflex over ( )}70 is more than 1 Sextillion (1×10{circumflex over ( )}21) unique IDs 140. A Sextillion would allow 1 Billion customers to have 1 Trillion (10{circumflex over ( )}12) unique orders. The implementation of a particular unique ID 140 should allow for an extremely low probability of repeating. For instance, QR codes that are widely used and commercially available may encode about 470 raw bits of information. Allowing for a 3:1 ratio of raw bits to info bits with error detection and correction included, the QR code can represent about 2{circumflex over ( )}156 unique patterns or almost 1 Quindecillion (10{circumflex over ( )}48) unique patterns. This is almost as much as the entire number of 10{circumflex over ( )}50 molecules that make up the planet earth. However, QR codes are widely used and to ensure uniqueness, they may be combined with an additional code to provide more serialization, tiered security, and ensure complete uniqueness from other uses of the QR codes.
QR codes and other barcodes may not be visually pleasing nor always available for reading as they are often placed on the back of containers to hide their appearance. HP Inc.™ Link Technology™ linkcreationstudio.com may be used to provide each container 146 or appurtenance 148 a unique ID 140 that is integrated (digitally watermarked) into the color of the images of the package labeling rather than or in addition to barcode labels and that is readable by a LinkReader™ mobile app. In some examples, the unique ID 140 is designed and implemented to be angle-independent to allow for reading of the unique ID 140 with minimal or no worker 132 interaction. In some examples, a wrap-around unique ID 140 is used. In one example, Link Technology™ can be used to encode the unique ID 140 into a logo that is repeated around a container 146. In other examples, the unique ID may be removable after fulfillment to allow for proper display of brands or other information.
After a unique ID 140 is associated with the order, it is physically bound as an appurtenance of the order, such as by printing on a container, a sleeve, a box, a wrapper as just a couple of examples. The unique ID 140 follows the order through the appropriate workflow 136, 17, 138 for the order to fulfill the object 150. If the unique ID 140 is pre-printed or otherwise marked ahead of the order, the unique ID 140 may be scanned or read by a unique ID 140 capture device 130 during the association with the order. Each of the workflows 136, 137, 138 may have a workflow procedure 142 for the workers 132 to follow. At appropriate steps in the multiple workflows 134, the appropriate workflow procedure 142 may be displayed at each workflow station 135 in the workflow 134 along with the order options 143 and any relevant customer preferences 144. In some examples, the customer preferences 144 may be converted to variances in the workflow procedures 142 or order options 143. For instance, if the customer preference is for “less milk,” the workflow procedure 142 may state rather than ‘less milk,’ ‘place 1 oz. of milk in drink’ in place of the standard ‘place 2 oz. of milk in the drink.’ The unique ID 140 capture device 130 may be located at the different workflow stations 135 to allow for workflow tracking and to display the appropriate workflow procedure 142 and customer preferences 144. After the order is completed, the environment 100 then proceeds to the third progression, order deliver 108
In the third progression, order delivery 108, the order is delivered to the appropriate customer. However, due to the varying time of each order through the multiple workflows 134, the possibility of similar orders, the number of waiting customers 102, and limited space to perform the delivery, the customer experience may be less than wished for by the customer 102.
An improvement of the customer experience is accomplished by having the unique ID 140 scanned with a capture device 130 on each finished object 150 and displaying the customer representation 152 in a vicinity of the finished object 150 at the time of fulfillment. The display may be performed using a customer representation display device 156, such as a display or projector. Additional improvement can be accomplished by having a facial recognition camera 104 to read and identify each of the waiting customers and comparing a customer ID from the facial recognition with the customer ID associated with the unique ID 140. Since the number of waiting customers 102 at the order fulfillment may be relatively small (less than 20) and the number of possible multiple waiting customers 102 only somewhat larger (less than 100), the facial recognition can be simplified and sped up compared to the facial recognition used at the time of order placement 106 where the number of potential multiple customers 102 is quite large. Various options for presenting the customer representation 152 along with the finished object 150 are discussed below in
In some examples, the environment 100 may continue to a fourth progression, continued customer interaction 109. After the finished object 150 has been delivered, the unique ID 140 on an appurtenance 148 may be kept by the customer 102. The unique ID 140 may be scanned by a customer device such as smartphone 112 (or any of the multiple ordering devices 110). The scanning may initiate a call to a website for the vendor of the order, verification that the finished object is not counterfeit, or it may pull up a survey 160 for the customer 102 to complete about their experience. The survey or a website may pull up the customer representation 152 for the respective customer, so they know they are accessing their previous order information. Various feedback may be taken and analyzed and based on the analysis, the customer preferences 144 may be updated as well as the workflow procedures 142 based on a sufficient sample of multiple customers 102.
The server 210 may be connected to one or more databases 212 via a secure connection 214, either another network, an encrypted session on a second network 204 such as a virtual private network, a direct connection, or another communication link. The database 212 may be a cloud-based database located at one or more remote sites, and secure connection 214 may be implemented as a secure link partially or completely over the Internet. In other examples, the database 212 may be locally present in server 210, and secure connection 214 may be a SATA, SCSI, or other storage communication interface. The database 212 may be a relational SQL based database (such as MySQL™, MariaDB™, PostgreSQL™, Microsoft™ SQL™ server, Oracle™, etc.), a non-relational flat database (such as Vertica™, MongoDB™, CouchDB™, Hazelcast™, Redis™, Memcached™, Cassandra™, Hbase™, etc.), or newSQL transaction database (such as Google™ F1/Spanner™, Citus™, ScaleBase™, MemSQL™, NuoDB™, VoltDB™, etc.).
To implement the order fulfillment 107 progression, server 210 is connected to a second network 204 that is secure and typically kept separate from first network 202 which is exposed to third parties. In some examples, first network 202 and second network 204 may be the same hardware network but implemented in different software sessions. For instance, first network 202 may be an open network and second network 204 may be a closed VPN network but share the same physical infrastructure.
Server 210 is connected via the second network 204 to one or more printers 218 to produce secure IDs 140 in some examples. The secure IDs 140 may be placed on labels that are attached to an appurtenance 148 of the order, or the secure IDs 140 may be printed directly on the appurtenance 148 of the order, such as container 146. Server 210 may also be connected to one or more clients 220, typically at each workflow station 139, but some stations may not require a client 220. Clients 220 may be displays, monitors, thin-clients, standalone PCs and laptops running remote session software, and the like. The clients 220 may also include data entry devices, such as mice, keyboards, touchscreens, keypads, pen input, etc. The clients 220 display the appropriate workflow procedures 142 and customer preferences 144 when an order is at the respective workflow station 135. Each workflow station 135 may include a unique ID capture device 130 to capture the unique ID 140 of the order when it arrives at the respective workflow station 135. The client 220 and/or unique ID capture device 130 may also be used to read and a record worker ID 139. Based on the worker ID 139, the worker 132 may or may not have access to the workflow procedure 142 and customer preferences 144. Thus, the workflow stations 135 may have role-based access for the workers 132. This may help prevent a worker 132 who has not been trained properly from performing the respective workflow procedure 142 thereby preventing potential harm to the worker 132 or customer 102. Also, during fulfillment of the object 150, the server 210 may send information at the point in the workflow to an app of the customer 158 to allow the customer 158 to track the workflow of the object 150 that was ordered.
For order delivery 108, the server 210 is connected via network 204 to a secure ID capture device 130 to read the secure ID 140 that is associated with each finished object 150. In some examples, the secure ID 140 can be read independent of the angle and thus placement of the finished 150 requires little time and effort by the worker 132 at the fulfillment station 230. In some examples, server 210 may also be connected to a camera 104 to recognize waiting customers 102 to identify them facially. After secure ID 140 has been captured, the appropriate order information is used by server 210 to call up the respective customer representation 152 for the order from database 212 and display using the display device 156 the customer representation 152 in the vicinity of the respective finished object 150. The waiting customers 102 can easily identify if any objects at the fulfillment station 230 are their order or not based on the displayed customer representation 152, which may be a picture of them or a chosen picture or icon they chose at the time of ordering.
For continued customer interactions 109, the server 210 may be coupled to a third network 216, typically the Internet 218 or another cloud-based network, to allow remote access by a customer 102. The customer 102 may scan secure ID 140 with an app on smartphone 112. The app may access system 200 and allow the user 102 to fill out a survey about the fulfillment experience and whether the user's expectations were met or not. Alternatively, or in addition to the survey, the app may also allow the customer 102 to be directed an appropriate website for more information about the order or future orders.
In customer related table 310, there is a Customer ID field 311 used to assign a number or other identification to the customer 102. In one example, a unique ID 140 may be assigned as a customer ID in field 311 to ensure each customer can be individually identified within the database. In another example, an existing or newly created member loyalty ID may be used to represent the customer ID in field 311. The customer related table 310 may also include a customer representation* field 312 to point to an image, drawing, icon, emoji, or other graphical item used to identify the customer 102 visually. In some examples, there may be multiple images from different angles to help in facial recognition. In many examples, customer representation will be a picture(s) of the customer 102 taken at the time of the order or an icon selected by the customer 102 at the time of order. A customer order* field 313 is used to point to a table that includes all the unique IDs 140 that the customer has used in various past and current orders. Customer preferences* field 314 is used to point to a table that includes a list of various customer preferences that a customer 102 may have. These preferences may be dependent on what order options 143 are selected for the order. Thus, for each option, there may be a different set of customer preferences. Customer preferences may also be organized based on the worker ID 139 or even the time of day. A customer facial ID for recognition* field 315 may point to a table that includes various characteristics of the customer 102 face that are determined by a facial recognition program based on an analysis of the customer representation 152 stored in the location pointed to by the customer representation field 312. There may be multiple sets of characteristics representing each image of the customer 102 that is pointed to by customer representation* field 312.
Order related table 320 may be used to manage each order. Every order has a unique ID field 321 storing a unique ID 140 to ensure that each order is unique in the database and can be recalled later. For each order, a customer ID field 322 stores the customer ID 311 from the customer 102 that placed the order. A customer selections* field 323 points to a list that includes each of the various order options 143 selected by the customer for the particular order. Customer preferences* field 324 points to a list of the particular customer preferences selected by a customer 102 at the time of order or from a list of customer preferences determined from feedback from prior orders by the customer 102. A worker IDs* field points to a list of the various workers who worked at workflow various stations 135 in the fulfillment of the order. Having this information is useful in determining if certain workers are producing high or low-quality objects. For instance, if customer feedback is frequently negative for orders that a particular worker participated in, then a corrective action such as additional training, reassignment, or other may be taken. If feedback is frequently positive for orders that a particular worker participated in, and more so than other workers, then that worker may be rewarded, promoted, or used to train other workers. Accordingly, a customer feedback* field 327 is used to point to a list of customer feedback received for the order. Each order may be analyzed to determine if customer expectations have been met or not. The customer feedback may be analyzed to look for variances from what the customer expected. The variances found may be used to update the customer preferences pointed to by the customer preferences* field 324 to improve the next product experience by the customer.
A workflow related table 330 may be used to track operations performed at various workflow stations 135 in the multiple workflows 134. A workflow ID field 331 may be used to identify each of the various workflow stations 135. An approved worker IDs* field 332 may be used to point to a list of worker IDs that represent which the multiple workers 132 may be qualified or otherwise based on their role be able to perform the various workflow station 135 procedures. For instance, for a coffee bar, a worker 132 who has not been trained on safety, preventative maintenance, and failure response for an espresso machine that operates steam at high temperature and pressure may not be allowed to operate the espresso machine as that worker 132 may not have his/her respective worker ID 135 in the list of approved worker IDs. A workflow options* field 333 may be used to point to a list of various procedures for a worker 139 to follow at a respective workflow station 135 for the workflow ID in workflow ID field 331. A unique IDs processed* field 334 may be used to keep a list of the various orders based on their unique IDs 140 that have been processed at that workflow station 135.
The various examples described herein may include logic or several components, modules, or constituents. Modules may constitute either software modules, such as code embedded in the tangible non-transitory machine or computer readable medium 211 or hardware modules. A hardware module is a tangible unit capable of performing certain operations and by be configured or arranged in certain manners. In one example, one or more computer systems or one or more hardware modules of a computer system may be configured by software (e.g., an application, or portion of an application) as a hardware module that operates to perform certain operations as described herein.
In some examples, a hardware module may be implemented as electronically programmable. For instance, a hardware module may include dedicated circuitry or logic that is permanently configured (e.g., as a special-purpose processor 215, state machine, a field programmable gate array (FPGA) or an application specific integrated circuit (ASIC) to perform certain operations. A hardware module may also include programmable logic or circuitry (e.g., as encompassed within a general-purpose processor 215 or another programmable processor) that is temporarily configured by software to perform certain operations. It will be appreciated that the decision to implement a hardware module electronically in dedicated and permanently configured circuitry, or in temporarily configured circuitry (e.g., configured by software) may be driven by cost and time considerations.
For instance,
The computer-readable medium 211 allows for storage of one or more sets of data structures and instructions (e.g., software, firmware, logic) as modules embodying or utilized by any one or more of the methodologies or functions described herein. The instructions may also reside, completely or at least partially, with the static memory, the main memory, and/or within the processor 215 during execution by the computing system. The main memory and the processor memory also constitute computer-readable medium 211. The term “computer-readable medium” 211 may include single medium or multiple media (centralized or distributed) that store the one or more instructions or data structures. The computer-readable medium 211 may be implemented to include, but not limited to, solid-state, optical, and magnetic media whether volatile or non-volatile. Such examples include, semiconductor memory devices (e.g. Erasable Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-only Memory (EEPROM), and flash memory devices), magnetic discs such as internal hard drives and removable disks, magneto-optical disks, and CD-ROM (Compact Disc Read-Only Memory) and DVD (Digital Versatile Disc) disks.
During order placement 106, an order module 702 includes instructions to accept an order for an object 150 from a customer 102 with a set of order options 143, a set of preferences 144, and a representation 152 of the customer. As discussed previously for the order placement 106 progression, the order may be placed using one or more of the multiple ordering devices 110. During ordering, a camera 104 may be used to take the customer representation 152 such as a customer image and the server 210 may perform facial recognition on the taken image. There may be multiple customers 102 each inputting a respective order for an object to be delivered by a set of multiple workflows 134. An analysis of the image taken may be stored in a list of facial characteristics pointed to by the customer facial ID for recognition field 315 in a customer related database table 310. Based on the facial recognition, customer entry, or another identification step, the customer 102 is given a customer ID 311 used to index the customer related table 310. The customer related table 310 may also include a pointer to the customer representation 152, a pointer to the customer order for the object, including any order options 143 selected, and a pointer to any known customer preferences 144.
During order fulfillment 107, a unique ID module 704 has instructions to associate a unique ID 140 with the object 150. The instructions may include code to create the unique ID by requesting from a cloud-based service such as HPE's GPAS service, or code to create the unique ID using two or more markings such as 1D barcodes, 2D QR codes, and other machine-readable markings. The unique ID used should be chosen to eliminate the probability that any two objects using the server 210 would have the same unique ID 140. As noted, the unique ID 140 can be made of multiple markings to allow for tiered security, error checking, error correction, and the addition of additional data. Therefore, the unique ID 140 may be distributed across multiple marks where the unique ID 140 only comes together after the multiple marks are successfully read. In some examples, the unique ID 140 may be replicated over multiple marks when bound in binding module 706.
A binding module 706 includes instructions to physically bind the unique ID 140 as an appurtenance 148, such as container 146 of the object 150. The binding module 706 may include instructions to print the unique ID 140 on the appurtenance 148 for the object 150 encoded into an angle-independent machine-readable set of markings. In some examples, the binding module 706 may include instructions to encode the unique ID 140 into at least two separate sets of markings. The binding module 706 may also include including an initiation module with instructions to read a first set of markings from a container 146 preprinted before ordering, and to print a second set of markings on the container 146. Accordingly, the unique ID 140 may be distributed across the preprinted first and printed second set of markings. This binding may include one or printing, labeling, stamping, etching, burning, or otherwise physically marking an encoded unique ID 140 onto the appurtenance 148. The appurtenance 148 may be a container 146, sleeve, box, wrapper, straw, stirring stick, utensil, condiment, or another item that is related to the object 150 during order fulfillment.
In some examples, a workflow tracking module 708 may include instructions to read the unique ID 140 and a workflow ID at each workflow station 135 at a point in the workflow 136-138 to display on monitors 220 a workflow procedure 142 with the set of order options 143 and the customer preferences 144 based on the unique ID 140 and the workflow ID 331. In other examples, an existing workflow may be used and the customer preferences noted on the appurtenance 148, such as a container 146.
During order delivery 108, a display module 710 includes instructions to display the representation 152 of the customer 102 in a vicinity of the of the appurtenance 148 for the object 150 after fulfillment of the order. Various techniques for performing the order delivery were discussed previously in relation to
In additional instructions 830, block 832 may allow the processor 215 to accept feedback from an app used by the waiting customer 158 along with the unique ID 140. In block 834, the processor 215 may compare the feedback with the set of order options 143 to determine a variance and in block 836 determine a new customer preference 144 which corrects for the variance. In block 838, the processor 215 may update the customer database 310 in the set of customer preferences 314 with the new customer preference 144 for the customer 158. Other instructions may allow the processor 215 to display the representation 152 of the customer by one of projection adjacent to the appurtenance 148, projection onto the appurtenance 148, displayed adjacent to the appurtenance 148, and floating above the appurtenance 148 using augmented reality.
Other instructions may allow for the processor 215 accepting feedback from an app used by the customer along with the unique ID and comparing the feedback with the set of order options 143 to determine a variance. The instructions may also allow for the processor 215 determining a new customer preference which corrects for the variance, and updating the database with the new customer preference for the customer in the set of preferences.
While the claimed subject matter has been particularly shown and described with reference to the foregoing examples, those skilled in the art will understand that many variations may be made therein without departing from the intended scope of subject matter in the following claims. This description should be understood to include all novel and non-obvious combinations of elements described herein, and claims may be presented in this or a later application to any novel and non-obvious combination of these elements. The foregoing examples are illustrative, and no single feature or element is to be used in all possible combinations that may be claimed in this or a later application. Where the claims recite “a” or “a first” element of the equivalent thereof, such claims should be understood to include incorporation of one or more such elements, neither requiring nor excluding two or more such elements.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2017/057170 | 10/18/2017 | WO | 00 |