1. Field of the Invention
The present invention generally relates to lock and key assemblies. More specifically, the present invention relates to an improved electronic lock and key assembly.
2. Description of the Related Art
Electronic locks have a number of advantages over normal mechanical locks. For example, electronic locks may be encrypted so that only a key carrying the correct code will operate the lock. In addition, an electronic lock may contain a microprocessor so that, for example, a record can be kept of who has operated the lock during a certain time period or so that the lock is only operable at certain times. An electronic lock may also have the advantage that, if a key is lost, the lock may be reprogrammed to prevent the risk of a security breach and to avoid the expense associated with replacement of the entire lock.
One drawback of certain electronic locks is that they use a power supply to function properly. Typically, locks of this type are unable to use conventional alternating current (AC) power supplies, such as from wall outlets, due to the inherit lack of security and mobility of such power supplies. Batteries may be used instead, but batteries require constant replacement or recharging. If a battery dies, a lock might fail to function and thereby create a significant security risk. Electromagnets may also be employed, but the bulk of such devices in some instances limits the potential use of electronic locks to larger-scale applications.
One solution to these drawbacks is to place a power source such as a battery in the key instead of in the lock. This arrangement allows the lock to remain locked even in the absence of a power supply. Placing a battery in the key also allows the battery to be charged more easily because keys are generally more portable than locks.
When batteries are used in the key, electrical contacts are typically employed to transfer power and data from the key to the lock. However, electrical contacts suffer from the drawback of being susceptible to corrosion, potentially leading to failure of either the key or the lock. Moreover, if separate inductors are used instead to transfer both power and data, magnetic interference between the inductors can corrupt the data and disrupt power flow to the lock.
Various embodiments of the present invention overcome these problems by providing a key having a power coil and a data coil and an electronic lock having a power coil and a data coil. When the key engages the lock, the power coils preferably are coaxial and the data coils are substantially parallel to one another. This configuration allows at least a portion of a magnetic field induced by the power coils to be substantially orthogonal to a magnetic field induced by the data coils. Because orthogonal magnetic fields have little effect on one another, inductors or other coils may be used in place of electrical contacts with minimal interference between power and data signals.
A preferred embodiment is, a locking device including a key which includes a key power coil and a key data coil. The locking device also includes an electronically-actuatable lock which includes a lock power coil and a lock data coil. The key power coil and the lock power coil are coaxial and at least partially overlap one another when the key engages the lock. The key data coil lies in a first plane, the lock data coil lies in a second plane. The first plane and the second plane are substantially parallel to one another.
Another preferred embodiment is a locking device including a key which includes a key power coil and a key data coil. The locking device also includes an electronically-actuatable lock which includes a lock power coil and a lock data coil. The key power coil and the lock power coil are inductively coupled when the key engages the lock. The key data coil and the lock data coil are inductively coupled when the key engages the lock. At least a portion of a data magnetic field created by inductively coupling the lock data coil and the key data coil is substantially orthogonal to a power coil magnetic field created by inductively coupling the lock power coil and the key power coil.
Yet another preferred embodiment is a method for communicating with an electronic lock. The method includes inductively coupling a key power coil with a lock power coil. The method also includes inductively coupling a key data coil with a lock data coil, such that at least a portion of a power magnetic field generated by inductive coupling of the key power coil and the lock power coil is substantially orthogonal to at least a portion of a data magnetic field generated by inductive coupling of the key data coil and the lock data coil. The method further includes transmitting data between the key data coil and the lock data coil. The data is operative to move a lock to an unlocked position.
These and other features, aspects and advantages of the present electronic lock and key assembly are described below with reference to drawings of certain embodiments, which are intended to illustrate, but not to limit, the present invention. The drawings contain twelve (12) figures.
In the description below certain relative terms such as top, bottom, left, right, front and back are used to describe the relationship between certain components or features of the illustrated embodiments. Such relative terms are provided as a matter of convenience in describing the illustrated embodiments and are not intended to limit the scope of the technology discussed below.
Overview of the Key and Lock System
The illustrated electronic lock and key system 10 is configured to use electronic means to verify the identity of the key and to actuate the internal mechanism of the lock 100. When the key 200 engages the lock 100, data transfer and power transfer is enabled between the lock 100 and the key 200. The lock 100 is then preferably permitted to be actuated by the key 200 to move from a locked position to an unlocked position and permit access to the space or location secured by the lock 100. In the illustrated arrangement, the direction of power transfer preferably is from the key 200 to the lock 100, as is described in greater detail below. However, in alternative arrangements, the direction of power transfer may be reversed or may occur in both directions.
The illustrated lock 100 is preferably used in a cabinet, or other such storage compartment, and is configured to selectively secure a drawer or door of the cabinet relative to a body of the cabinet. However, as will be appreciated, the lock 100 may be used in, or adapted for use in, a variety of other applications. The lock 100 is preferably mounted to the cabinet in such a way so as to allow only a front portion of the lock 100 to be accessible when the cabinet is closed. The lock 100 includes an outer housing 102 with a cylinder 104 that is rotatable within the outer housing 102 when actuated by the key 200. An exposed end of the cylinder 104 is configured to support a lock tab (not shown). The lock tab is configured to cooperate with a stop. The lock 100 is associated with one of the drawer (or door) of the cabinet and the cabinet body, and the stop is associated with the other of the drawer (or door) of the cabinet and the cabinet body. The lock tab rotates with the lock cylinder 104 to move between a locked position, wherein the lock tab mechanically interferes with the stop, to an unlocked position, wherein the lock tab does not interfere with the stop. Such an arrangement is well-known to one of skill in the art. In addition, other suitable locking arrangements may be utilized.
Mechanical Aspects of the Key and Lock System
The housing 102 of the lock 100 preferably is a generally cylindrical tube with a head portion 112 and a body portion 114. The diameter of the head portion 112 is larger than the diameter of the body portion 114 such that the head portion 112 forms a flange of the housing 102. The head portion 112 also includes an annular groove 174 or key recess. Axially-extending slots 176 open into the annular groove 174 (
The lock housing 102 also includes a body portion 114 which extends rearwardly away from the head portion 112. The rearward end of the body portion further includes a threaded outer surface 115 which is configured to receive a nut (not shown). The nut is used to secure the lock 100 to a cabinet or other storage compartment. The body portion 114 also includes at least one, and preferably a pair of opposed flattened surfaces 113 or “flats” (
With continued reference to
The body portion 114 further includes a tab 122 that extends slightly rearward from the rearward end of the body portion 114. The tab 122 acts as a stop to limit the rotation of a lock tab (not shown) secured to the cylinder 104.
The housing 102 is further configured to include a break-away feature incorporated into the structure of the housing 102. The head portion 112 is formed with the body portion 114 in such a way that if someone attempted to twist the housing 102 of the lock 100 by grasping the head portion 112, the head portion 112 is capable of breaking free of the body portion 114, preferably at a location near the intersection of the head portion 112 and the body portion 114 of the housing 102. This feature is advantageous in that it increases the difficulty of opening or disabling the lock 100 by grasping the housing 102. That is, if a person were to attempt to grasp the head portion 112 and it were to break away then there would no longer be an easily graspable surface with which to try to rotate the lock 100 mechanically, without use of the key 200, because the head portion 112, which is external to the cabinet, would no longer be coupled to the body portion 114, which is internal to the cabinet. The break-away feature between the head portion 112 and the body portion 114 may be created simply by a structure that concentrates stresses at the head portion 112/body portion 114 junction. Alternatively, the housing 102 may be deliberately weakened at or near the head portion 112/body portion 114 junction, or at any other desirably or suitable location. Other anti-tampering solutions apparent to one of skill in the art may be employed as well.
With continued reference to
The cartridge 106 is surrounded by a tamper-resistant case 124 that houses a circuit board 134 configured to receive instructions when the key 200 engages with the lock 100. The circuit board 134 is configured to recognize the proper protocol required to unlock the lock 100. The circuit board 134 is further configured to actuate the solenoid 126 to reverse the polarity of the solenoid 126 and repel the slide bars 128 away from the solenoid 126. The details of the circuit board 134 and a preferred method of communication between the key 200 and the lock 100 are discussed in greater detail below. The interior of the case 124 preferably is filled with a filler material, such as an epoxy, to occupy empty space within the case 124 and protect and maintain a desired position of the components within the case 124, such as the circuit board 134 and wires 160.
The lock cartridge 106 further includes two slide tubes 136 which are positioned on opposite sides of the solenoid 126 and are configured to at least partially encapsulate the slide bars 128 and are further configured to provide a smooth, sliding surface for the slide bars 128. The slide tubes 136 each include an aperture 138 configured to receive at least a portion of a bolt 130, or side bar, of the lock 100 when the lock 100 is in an unlocked position.
The bolt 130 is preferably a relatively thin, generally block-shaped structure that is movable between a locked position, in which rotation of the lock cylinder 104 relative to the housing 102 is prohibited, and an unlocked position, in which rotation of the lock cylinder 104 relative to the housing 102 is permitted. Preferably, the bolt 130 moves in a radial direction between the locked position and the unlocked position, with the unlocked position being radially inward of the locked position.
The bolt 130 includes two cylindrical extensions 131, which extend radially inward toward the cartridge 106. When the solenoid 126 is actuated to repel the slide bars 128 such that the apertures 138 are not blocked by the slide bars 128, the extensions 131 of the bolt 130 may enter into the case 124 through the apertures 138 as the bolt 130 moves radially inward.
The bolt 130 is preferably of sufficient strength to rotationally secure the cylinder 104 relative to the housing 102 when the bolt 130 is in the locked position, wherein a portion of the bolt 130 is present within the groove 120. The bolt 130 has a sloped or chamfered lower edge 129, which in the illustrated embodiment is substantially V-shaped. The lower edge 129 is configured to mate with the groove 120, which preferably is of an at least substantially correspondingly shape to the lower edge 129 of the bolt 130. The V-shaped edge 129 of the bolt 130 interacting with the V-shaped groove 120 of the housing 102 urges the bolt 130 in a radially inward direction towards the cartridge 106 in response to rotation of the cylinder 104 relative to the housing 102. That is, the sloped lower edge 129 and groove 120 cooperate to function as a wedge and eliminate the need for a mechanism to positively retract the bolt 130 from the groove 120. Such an arrangement is preferred at least in part due to its simplicity and reduction in the number of necessary parts. However, other suitable arrangements to lock and unlock the cylinder 104 relative to the housing 102 may also be used.
When the lock 100 is in an unlocked condition and the slide bars 128 are spaced from the solenoid 126, as shown in
When the lock 100 is in a locked condition, the bolt 130 is extended radially outward into engagement with the groove 120. The bolt 130 is prevented from inward movement out of engagement with the groove 120 due to interference between the extensions 131 and the slide bars 128. When the lock 100 is in the unlocked position, the slide bars 128 are moved away from the solenoid 126 due to a switching of magnetic polarity of the solenoid 126, which is actuated by the circuit board 134. The bolt 130 is then free to move radially inward towards the center of the cylinder 104 and out of engagement with the groove 120. At this point, the rotation of the cylinder 104 within the housing 102 may cause the bolt 130 to be displaced from engagement with the groove 120 due to the cooperating sloped surfaces of the groove 120 and the lower edge 129 of the bolt 130. The cylinder 104 is then free to be rotated throughout the unlocked rotational range within the housing 102. When the cylinder 104 is rotated back to a locked position, that is, when the lower edge 129 of the bolt 130 is aligned with the groove 120, the bolt 130 is urged radially outward by the springs 132 such that the lower edge 129 is engaged with the groove 120. Once the extensions 131 of the bolt 130 are retracted from the case 124 to a sufficient extent, the slide bars 128 are able to move towards the solenoid 126 to once again establish the locked position of the lock 100.
Although
With continued reference to
The pins 140 are preferably made from a carbide material, but can be made of any suitable material or combination of materials that are capable of providing a suitable hardness to reduce the likelihood of successful drilling past the pins 140 and attack ball 142. The pins 140 are inserted into the cylinder 104 to a depth that is near the outer extremity of the attack ball 142. It is preferred that a small space is provided between the outer end of the attack ball 142 and the end of the carbide pin 140 to allow for the passage of the wires 160, which is discussed in greater detail below. The pins 140 are provided so as to add strength and hardness to the outer periphery of the cylinder 104 adjacent to the attack ball 142.
The attack ball 142 is preferably made of a ceramic material but, similar to the carbide pins, can be made of any suitable material that is of sufficient hardness to reduce the likelihood of successful drilling of the lock cylinder 104. The attack ball 142 is preferably generally spherical shape and lies within a pocket on substantially the same axis as the cartridge 106. Preferably, the attack ball 142 is located in front of the cartridge 106 and is aligned along the longitudinal axis of the lock 100 with the pins 140. The attack ball 142 is configured to reduce the likelihood of a drill bit passing through the cylinder and drilling out the cartridge 106. It is preferable that if an attempt is made to drill out the cylinder 104, the attack ball 142 is sufficiently hard as to not allow the drill bit to drill past the ball 142 and into the cartridge 106. The shape of the attack ball 142 is also advantageous in that it will likely deflect a drill bit from drilling into the cartridge 104 by not allowing the tip of the drill bit to locate centrally relative to the lock 100. Because the attack ball 142 is held within a pocket, it advantageously retains functionality even if cracked or broken. Thus, the attack guard portion 110 is configured to substantially reduce the likelihood of success of an attempt to drill out the cartridge 106. In addition, or in the alternative, other suitable arrangements to prevent drilling, or other destructive tampering, of the lock 100 may be used as well.
One advantage of using the pins 140 and the attack ball 142 is that the entire lock cylinder 104 does not have to be made of a hard material. Because the lock cylinder 104 includes many features that are formed in the material by shaping (e.g., casting or forging) or material removal (e.g., machining), it would be very difficult to manufacture a cylinder 104 entirely of a hard material such as ceramic or carbide. By using separate pins 140 and an attack ball 142, which are made of a very hard material that is difficult to drill, the lock cylinder 104 can be easily manufactured of a material such as stainless steel which has properties that allow easier manufacture. Thus a lock cylinder can be made that is both relatively easy to manufacture, but also includes drill resistant properties.
With continued reference to
The data and power mating portion 146 includes a mating cup 152, a data coil 154, and a power coil 156. The cup 152 is configured to receive a portion of key 200 when the lock 100 and the key 200 are engaged together. The cup 152 resides at least partially in an axial recess 158 which is located in a front portion of the lock cylinder 104 and further houses the attack ball 142. The cup is at least partially surrounded by the power coil 156, which is configured to inductively receive power from the key 200. The cup 152 preferably includes axial slots 161 configured to allow power to transmit through the cup 152.
The data coil 154 is located towards the upper edge of the cup 152 and, preferably, lies just rearward of the forward lip of the cup 152. The data coil 154 is generally of a torus shape and is configured to cooperate with a data coil of the key 200, as is described in greater detail below. Two wires 160 extend from the cup 152, through a passage 162, and into the lock cartridge 106. The wires 160 preferably transmit data and power from the data and power mating portion 146 to the solenoid 126 and the circuit board 134.
The power coil 156 is preferably aligned with a longitudinal axis of the lock 100 so that a longitudinal axis passing through the power coil 156 is substantially parallel (or coaxial) with a longitudinal axis of the lock 100. The data coil 154 is preferably arranged to generally lie in a plane that is orthogonal to a longitudinal axis of the lock. Such an arrangement helps to reduce magnetic interference between the transmission of power between the lock 100 and the key 200 and the transmission of data between the lock 100 and the key 200.
As described above, the lock cylinder 104 is configured to support a lock tab, which interacts with a stop to inhibit opening of a cabinet drawer or door, or prevent relative movement of other structures that are secured by the lock and key system 10. The lock cylinder 104 includes a lock tab portion 164 adapted to support a lock tab in a rotationally fixed manner relative to the lock cylinder 104. The lock tab portion 164 includes a flatted portion 166 and a threaded portion 168. The flatted portion 166 is configured to receive a lock tab (not shown) which can slide over lock tab portion 164 and mate with the flatted portion 166. One or more flat surfaces, or “flats,” on the flatted portion 166 are configured to allow the transmission of torque from the cylinder 104 to the lock tab (not shown). The threaded portion 168 is configured to receive a nut (not shown), which is configured to secure the lock tab (not shown) to the cylinder 104.
The key 200 includes an elongate main body section 204 that is generally rectangular in cross-sectional shape. The key 200 also includes a nose section 202 of smaller external dimensions than the body section 204. An end section 206 closes and end portion of the body section 204 opposite the nose section 202. The nose section 202 is configured to engage the lock 100 and the body section 204 is configured to house the internal electronics of the key 200 as well as other desirable components. The end section 206 is removable from the body section 204 to permit access to the interior of the body section 204.
With continued reference to
On the outer surface of the cylindrical portion are two radiused tabs 214 which are configured to rotationally locate the key 200 relative to the lock 100 prior to the key 200 engaging the lock 100. The tabs 214 extend radially outward from the outer surface of the cylindrical portion 210 and, preferably, oppose one another.
The cylindrical portion 210 further includes two generally rectangular extensions 216 that extend axially outward and are configured to engage with the recesses 150 of the lock 100 (
The cylindrical portion 210 comprises a recess 218 that opens to the front of the key 200. Located within the recess 218 is the power and data transfer portion 212 of the key 200. Preferably, the power and data transfer portion 212 is generally centrally located within the recess 218 and aligned with the longitudinal axis of the key 200. The power and data transfer portion 212 includes a power coil 220 and a data coil 222. The power coil 220 is generally cylindrical in shape with a slight taper along its axis. The power coil 220 is positioned forward of the data coil 222 and, preferably, remains within the recess 218 of the cylindrical portion 210. The power coil 220 is configured to be inductively coupled with the power coil 152 of the lock 100. The data coil 222 is generally toroidal in shape and is located at the base of the recess 218. The data coil 222 is configured to be inductively coupled with the data coil 154 of the lock 100, as is described in greater detail below.
With continued reference to
The body section 204 includes three externally-accessible input buttons 228 extending from the body section 204 (upward in the orientation of
With reference to
With reference to
Furthermore, when the key 200 engages the lock 100, the cylindrical extension 148 of the lock 100 is received within the recess 218 of the key. The recess 218 is defined by a tapered surface which closely matches a tapered outer surface of the cylindrical extension 148. The cooperating tapered surfaces facilitate smooth engagement of the lock 100 and key 200, while also ensuring proper alignment between the lock 100 and key 200. Furthermore, the rectangular extensions 216 of the key 200 insert into the recesses 150 of the lock 100 to positively engage the key 200 with the lock 100 so that rotation of the key 200 results in rotation of the lock cylinder 104 within the housing 102.
When the key 200 engages the lock 100, the power coil 220 of the key 200 is aligned for inductive coupling with the power coil 156 of the lock 100. Also, the data coil 222 of the key 200 is aligned for inductive coupling with the data coil 154 of the lock 100. Preferably, the power coil 220 of the key 200 is inserted into the cup portion 152 of the lock 100 and thus the power coil 156 of the lock 100 and the power coil 220 of the key 200 at least partially overlap along the longitudinal axis of the lock 100 and/or key 200. Furthermore, preferably, the data coil 154 of the lock 100 and the data coil 222 of the key 200 come into sufficient alignment for inductive coupling when the key 200 engages the lock 100. That is, in the illustrated arrangement, when the key 200 engages the lock 100, the data coil 222 of the key 200 and the data coil 154 of the lock 100 are positioned adjacent one another and, desirably, are substantially coaxial with one another. Furthermore, a plane which passes through the data coil 222 of the key 200 preferably is substantially parallel to a plane which passes through the data coil 154 of the lock 100. Desirably, the spacing between the data coils 154 and 222 is within a range of about 30-40 mils (or 0.03-0.04 inches). Such an arrangement is beneficial to reduce interference between the power transfer and the data transfer between the lock 100 and key 200, as is described in greater detail below. However, in other arrangements, a greater or lesser amount of spacing may be desirable.
In the illustrated embodiment of the lock and key system 10, when the key 200 engages the lock 100 there are two transfers that occur. The first transfer is a transfer of data and the second transfer is a transfer of power. During engagement of the key 200 and the lock 100, the data coils 222 and 154, in the illustrated embodiments, do not come into physical contact with one another. Similarly, the power coil 200 of the key 200 and power coil 156 of the lock 100, in the illustrated embodiment, do not come into physical contact with one another. The data is preferably transferred between the data coil 222 of the key 200 and the data coil 154 of the lock 100 by induction, as described in connection with
Electrical Aspects of the Key and Lock System
The power coil 402 of certain embodiments is a solenoid. The solenoid includes windings 420 which are loops of wire that are wound tightly into a cylindrical shape. In the depicted embodiment, the power coil 402 includes two sets of windings 420. Two sets of windings 420 in the power coil 402 reduce air gaps between the wires and thereby increase the strength of a magnetic field generated by the power coil 402.
The depicted embodiment of the power coil 402 does not include a magnetic core material, such as an iron core, although in certain embodiments, a magnetic core material may be included in the power coil 402. In addition, while the power coil 402 is depicted as a solenoid, other forms of coils other than solenoids may be used, as will be understood by one of skill in the art.
The power coil 402 may form a portion of a lock assembly, though not shown, such as any of the lock assemblies described above. Alternatively, the power coil 402 may be connected to a key assembly, such as any of the key assemblies described above. In addition, the power coil 402 may be connected to a docking station (not shown), as described in connection with
The power coil 402 is shown having a width 414 (also denoted as “WP”). The width 414 of the power coil 402 is slightly flared for the entire length of the power coil 402. The overall shape of the power coil 402, including its width 414, determines in part the shape of the magnetic field emanating from the power coil 402. In certain embodiments, a constant or approximately constant width 414 of the power coil 402 does not change the shape of the power magnetic field 404 substantially from the shape illustrated in
The power coil 402 further includes a casing 462 surrounding the power coil 402. In one embodiment, the casing 462 is a non-conducting material (dielectric). The casing 462 of certain embodiments facilitates the power coil 402 receiving the interior power coil 418 inside the power coil 402. The casing 462 prevents electrical contact between the power coil 402 and the interior power coil 418. Thus, in the embodiment described with reference to
In alternative embodiments, the casing 462 is made of a metal, such as steel. The strength of a metal casing 462 such as steel helps prevent tampering with the power coil 402. However, magnetic fields typically cannot penetrate more than a few layers of steel and other metals. Therefore, the metal casing 462 of certain embodiments includes one or more slits or other openings (not shown) to allow magnetic fields to pass between the power coil 402 and the interior power coil 418.
The interior power coil 418 mates with the power coil 402 by fitting inside the power coil 402. In certain embodiments, the interior power coil 418 has similar characteristics to the power coil 402. For instance, the interior power coil 418 in the depicted embodiment is a solenoid with two windings 420. In addition, the interior power coil 418 may receive a current and thereby generate a magnetic field. The interior power coil 418 is also covered in a casing material 454, which may be an insulator or metal conductor, to facilitate mating with the power coil 402. Furthermore, the interior power coil 418 also has a width 430 (also denoted “Wi”) that is less than the width 414 of the power coil 402, thereby allowing the interior power coil 418 to mate with the power coil 402.
In addition to these features, the interior power coil 418 of certain embodiments includes a ferromagnetic core 452, which may be a steel, iron, or other metallic core. The ferromagnetic core 452 increases the strength of the power magnetic field 404, enabling a more efficient power transfer between the interior power coil 418 and the power coil 402. In addition, the ferromagnetic core 452 in certain embodiments enables the frequency of the power signal to be reduced, allowing a processor in communication with the power coil 418 to operate at a lower frequency and thereby decrease the cost of the processor.
The interior power coil 418 may form a portion of a lock assembly, though not shown, such as any of the lock assemblies described above. Alternatively, the interior power coil 418 may be connected to a key assembly, such as any of the key assemblies described above. In addition, the interior power coil 418 may be connected to a docking station (not shown), as described in connection with
A changing current flow through the interior power coil 418 induces a changing magnetic field. This magnetic field, by changing with respect to time, induces a changing current flow through the power coil 402. The changing current flow through the power coil 402 further induces a magnetic field. These two magnetic fields combine to form the power magnetic field 404. In such a state, the power coil 402 and the interior power coil 418 are “inductively coupled,” which means that a transfer of energy from one coil to the other occurs through a shared magnetic field, e.g., the power magnetic field 402. Inductive coupling may also occur by sending a changing current flow through the power coil 402, which induces a magnetic field that in turn induces current flow through the interior power coil 418. Consequently, inductive coupling may be initiated by either power coil.
Inductive coupling allows the interior power coil 418 to transfer power to the power coil 402 (and vice versa). An alternating current (AC) signal flowing through the interior power coil 418 is communicated to the power coil 402 through the power magnetic field 404. The power magnetic field 404 generates an identical or substantially identical AC signal in the power coil 402. Consequently, power is transferred between the interior power coil 418 and the power coil 402, even though the coils are not in electrical contact with one another.
In certain embodiments, the interior power coil 418 has fewer windings than the power coil 402. A voltage signal in the interior power coil 418 is therefore amplified in the power coil 402, according to known physical relationships in the art. Likewise, a voltage signal in the power coil 402 is reduced or attenuated in the interior power coil 418. In addition, the power coil 402 may have fewer windings than the interior power coil 418, such that a voltage signal from the interior power coil 418 to the power coil 402 is attenuated, and a voltage signal from the power coil 402 to the interior power coil 418 is amplified.
The power magnetic field 404 is shown in the depicted embodiment as field lines 434; however, those of skill in the art will understand that the depiction of the power magnetic field 404 with field lines 434 is only a model or representation of actual magnetic fields, which in some embodiments are changing with respect to time. Therefore, the power magnetic field 404 in certain embodiments is depicted at a moment in time. Moreover, the depicted model of the power magnetic field 404 includes a small number of field lines 434 for clarity, but in general the power magnetic field 404 fills all or substantially all of the space depicted in
Portions of the field lines 434 of the power magnetic field 404 on the outside of the power coil 402 are parallel or substantially parallel to the axis of the power coil 402. The parallel nature of these field lines 434 in certain embodiments facilitates minimizing interference between power and data transfer, as is described below.
The first data coil 406 is connected to the power coil 402 by the casing 462. The first data coil 406 has one or more windings 422. In one embodiment, the first data coil 406 is a toroid comprising tightly-wound windings 422 around a ferromagnetic core 472, such as steel or iron. The ferromagnetic core 472 of certain embodiments increases the strength of a magnetic field generated by the first data coil 406, thereby allowing more efficient transfer of data through the data magnetic field 410. In addition, the ferromagnetic core 472 in certain embodiments enables the frequency of the data signal to be reduced, allowing a processor in communication with the first data coil 406 to operate at a lower frequency and thereby decreasing the cost of the processor.
Though not shown, the first data coil 406 may further include an insulation material surrounding the first data coil 406. Such insulation material may be a non-conducting material (dielectric). In addition, the casing 462 covering the power coil 402 in certain embodiments also at least partially covers the first data coil 406, as shown. The casing 462 at the boundary between the first data coil 406 and the second data coil 408 may also include a slit or other opening to allow magnetic fields to pass between the first and second data coils 406, 408.
The first data coil 406 has a width 416 (also denoted as “Wd”). This width 416 is greater than the width 414 of the power coil 402 in some implementations. In alternative embodiments, the width 416 may be equal to or less than the width 414 of the power coil 402.
The second data coil 408 in the depicted embodiment is substantially identical to the first data coil 406. In particular, the second data coil 408 is a toroid comprising tightly-wound windings 424 around a ferromagnetic core 474, such as steel or iron. The ferromagnetic core 474 of certain embodiments increases the strength of a magnetic field generated by the second data coil 408, thereby allowing more efficient transfer of data through the data magnetic field 410, allowing a processor in communication with the second data coil 408 to operate at a lower frequency and thereby decreasing the cost of the processor.
The second data coil 408 in the depicted embodiment has a width 416 equal to the width 414 of the first data coil 406. In addition, the second data coil 408 may have an insulating layer (not shown) and may be covered by the casing 454, as shown. However, in certain embodiments, the second data coil 408 has different characteristics from the first data coil 406, such as a different number of windings 424 or a different width 416. In addition, first and second data coils 406, 408 having different widths may overlap in various ways.
When a current is transmitted through either the first data coil 406 or the second data coil 408, the first data coil 406 and the second data coil 408 are inductively coupled, in a similar manner to the inductive coupling of the power coil 402 and the interior power coil 418. Data in the form of voltage or current signals may therefore be communicated between the first data coil 406 and the second data coil 408. In certain embodiments, data may be communicated in both directions. That is, either the first or second data coil 406, 408 may initiate communications. In addition, during one communication session, the first and second data coils 406, 408 may alternate transmitting data and receiving data.
Data magnetic field 410 is depicted as including field lines 442, a portion of which are orthogonal or substantially orthogonal to the data coils 406, 408 along their width 416. Like the field lines 434, 436 of the power magnetic field 404, the field lines 442 of the data magnetic field 410 are a model of actual magnetic fields that may be changing in time. The orthogonal nature of these field lines 442 in certain embodiments facilitates minimizing the interference between power and data transfer.
In various embodiments, at least a portion of the data magnetic field 410 is orthogonal to or substantially orthogonal to the power magnetic field 404 at certain areas of orthogonality. These areas of orthogonality include portions of an interface 412 between the first data coil 406 and the second data coil 408. This interface 412 in certain embodiments is an annular or circumferential region between the first data coil 406 and second data coil 408. At this interface, at least a portion of the data magnetic field 410 is substantially parallel to the first data coil 406 and second data coil 408. Because the data magnetic field 410 is substantially parallel to the data coils 406, 408, the data magnetic field 410 is therefore substantially orthogonal to the power magnetic field 404 at portions of the interface 412.
According to known relationships in the physics of magnetic fields, magnetic fields which are orthogonal to each other have very little effect on each other. Thus, the power magnetic field 404 at the interface 412 has very little effect on the data magnetic field 410. Consequently, the data coils 406 and 408 can communicate with each other with minimal interference from the potentially strong power magnetic field 404. In addition, data transmitted between the data coils 406, 408 does not interfere or minimally interferes with the power magnetic field 404. Thus, data may be sent across the data coils 406, 408 simultaneously while power is being sent between the power coil 402 and the interior power coil 418.
The key circuit 510 includes a processor 502. The processor 502 may be a microprocessor, a central processing unit (CPU), a microcontroller, or other type of processor. The processor 502 in certain embodiments implements program code. By implementing program code, the processor 502 sends certain signals to the lock circuit 530 and receives signals from the lock circuit 530. Such signals may include power signals, data signals, and the like.
A memory device 526 is in communication with the processor 502. The memory device 526 in certain embodiments is a flash memory, hard disk storage, an EEPROM, or other form of storage. The memory device 526 in certain embodiments stores program code to be run on the processor 502. In addition, the memory device 526 may store data received from the processor 502.
Data stored on the memory device 526 may include encryption data. In one embodiment, the encryption data includes one or more encryption keys that when communicated to the lock circuit 530 effectuate unlocking a lock. Several different encryption schemes may be used, as will be appreciated by one having skill in the art.
Data stored by the memory device 526 may also include audit data. Audit data in some implementations is data received from the lock circuit 530 or generated by the key circuit 510 that identifies past transactions that have occurred between the lock and other keys. For instance, audit data may include ID numbers of keys used to access the lock, including keys which unsuccessfully used the lock. This data allows security personnel to monitor which individuals have attempted to access the lock. The audit data may further include several other types of information as will be understood by one of skill in the art.
A data coil 512 is in communication with the processor 502 through conductors 504 and 506. The data coil 512 may be any of the data coils described above. The data coil 512 in certain embodiments receives data from the processor 502. This data may be in the form of a voltage or current signal which changes with respect to time, such that certain changes in the signal represent different symbols or encoded information. Because the signal changes with respect to time, a magnetic field is generated in the data coil 512 which induces a magnetic field in a corresponding data coil 532 in the lock circuit 530. The magnetic field in the data coil 532 further induces a voltage or current signal, which contains the same information or substantially the same information as the voltage or current signal generated in the data coil 512. Thus, the data coil 512 facilitates communication between the key circuit 510 and the lock circuit 530.
In certain embodiments, the data coil 512 receives data in a like manner from the data coil 532 of the lock circuit 530. A voltage or current signal induced in the data coil 512 is sent to the processor 502, which processes the information conveyed in the voltage or current signal. The data coil 512 may also send and receive information to and from a docking station (not shown), which is described more fully below.
One or more switches 516 are in communication with the data coil 512 and with the processor 502. The switches 516 in certain embodiments are transistor switches, relays, or other forms of electronic switches which selectively direct current flow to different parts of the key circuit 510. In the depicted embodiment, switches 516 direct current flow between the data coil 512 and the processor 502. The switches 516 therefore selectively allow the processor 502 to both send and receive data.
A power coil 514 is in communication with the processor 502 via conductors 508 and 510. The power coil 514 in certain embodiments transmits power to the key circuit 530. In certain implementations, the power coil 514 may be any of the power coils described above. In one implementation, the power coil 514 receives an alternating current (AC) signal. This AC signal induces a magnetic field in a corresponding power coil 534 in the lock circuit 530. In one embodiment, the AC signal oscillates at an appropriate frequency to effectuate optimal power transfer between the key circuit 510 and the lock circuit 530. For example, the oscillation may occur at 200 kilohertz. Alternatively, the oscillation may occur at a different frequency which may be chosen so as to minimize interference with other circuit components.
One or more switches 518 are in communication with the power coil 514 and a processor 502. Like the switches 516, the switches 518 may be transistor switches, relays or any other form of electronic switch. The switches 518 in certain embodiments allow power to be transmitted to the power coil 514 from the processor 502. In such embodiments, the switches 518 are closed, allowing current to transfer from the processor 502 to the power coil 514. The switches 518 may be opened when the power coil 514 is receiving power such as from a docking station. When the switches 518 are open, power received from the power coil 514 in certain embodiments cannot be transmitted to the processor 502. The switches 518 therefore protect the processor 502 from receiving harmful current signals while simultaneously allowing the processor 502 to transmit power to the power coil 514.
A rectifier circuit 520 is in communication with the power coil 514 via conductors 508 and 510. The rectifier circuit 520 in certain embodiments includes one or more diodes. The diodes may form a bridge rectifier or other form of rectifier as will be appreciated by those of skill in the art. The diodes of the rectifier circuit 520 rectify an incoming signal from the power coil 514. Rectification in certain embodiments includes transforming an alternating current signal into a direct current signal by converting the AC signal into one of constant polarity. Rectification may further include smoothing the signal, for example, by using one or more capacitors, and thereby creating a direct current signal that can power circuit components.
A recharge circuit 522 is in communication with the rectifier 520. The recharge circuit 522 in certain embodiments recharges a battery 524 when the key circuit 510 is in communication with a docking station (not shown). The battery 524 may be a lithium iron battery, a nickel cadmium battery or other form of rechargeable battery. The battery may also be an alkaline or other non-rechargeable battery. In addition, the battery 524 may include multiple batteries. In one embodiment, the battery 524 receives power from the recharge circuit 522 in order to recharge the battery. In addition, the battery 524 sends power to the processor 502, to the memory device 526, and to other components in the key circuit 530.
In some implementations, the key circuit 510 is capable of communicating with a docking station (not shown) connected to an AC power supply, such as a wall outlet. The docking station in one embodiment has a power coil and a data coil, similar to a power coil 534 and data coil 532 of the lock circuit 530 described below. The docking station receives the data coil 512 and the power coil 514 such that the key circuit 510 can communicate with the docking station. In one embodiment, the power coil 514 receives power from the docking station and transfers this power to the rectifier 520 and recharge circuit 522, effectuating recharge of the battery 524.
In addition, the data coil 512 may receive data from a corresponding data coil in the docking station. Such information might include, for example, program code to be stored on the memory device 526, program code to be run on the processor 502, data to be stored in the memory device 526 including encryption data, data regarding locking codes and the like, as well as ID data, tracking data, and the like. In addition, the docking station may transmit data, codes, or the like to the key circuit 510 which enable the key to be used for a limited time, such as a couple of hours or days. The data coil 512 may also transmit data to the docking station via a corresponding data coil. Such data might also include audit information, tracking information, and the like.
The docking station may also be connected to a computer. Programs can be run on the computer which facilitate the docking station communicating with the key circuit 510. Consequently, the key circuit 510 may be recharged and reprogrammed by the docking station of certain embodiments.
Turning to the lock circuit 530, the lock circuit 530 includes a processor 546. Like the processor 502 of the key circuit 510, the processor 546 may be a microprocessor, a central processing unit (CPU), or any other type of processor. The processor 546 in certain embodiments implements program code. By implementing program code, the processor 546 may send certain signals to the key circuit 510 and receive signals from the key circuit 510. Such signals may include power signals, data signals, and the like.
A memory device 548 is in communication with the processor 546. The memory device 548 in certain embodiments is a flash memory, hard disk storage, an EEPROM, or other form of storage. The memory device 548 in certain embodiments stores program code to be run on the processor 546. In addition, the memory device 548 may store data received from the processor 546.
Data stored on the memory device 548 may include encryption data. In one embodiment, the encryption data includes one or more encryption keys. When an identical encryption key is received from a key circuit 510 in certain embodiments, the lock circuit 530 unlocks a lock. The memory device 548 may also include audit data. This data allows security personnel to monitor which individuals have attempted to access the lock.
A data coil 532 is in communication with the processor 546 through conductors 536 and 538. The data coil 532 may be any of the data coils described above. The data coil 532 in certain embodiments receives data from the processor 546 and transmits the data to the key circuit 510. In other embodiments, the data coil 532 receives data from the key circuit 510 via magnetic fields generated by the data coil 512.
One or more switches 544 are in communication with the data coil 532 and with the processor 546. The switches 544 in certain embodiments are transistor switches, relays, or other forms of electronic switches which selectively direct current flow to different parts of the key circuit 530. In the depicted embodiment, switches 544 may be used to direct current flow between the data coil 532 and the processor 546. Like the switches 516 in the key circuit 510, the switches 544 selectively allow the processor 502 to both send and receive data.
A power converter 550 is in communication with the processor 546 and with the power coil 534. The power converter 550 in one embodiment includes a rectifier circuit such as the rectifier circuit 528 described above. The power converter 550 may further include a low drop-out regulator (described in connection with
In one embodiment, the power converter 550 receives an oscillating power signal from the power coil 534. The power converter 550 includes a rectifier circuit, similar to the rectifier circuit 520 described above, which converts the oscillating signal into two components, namely an AC component signal and a direct current (DC) component signal. In one embodiment, the AC component signal is provided to a solenoid 552 through conductor 574, and the DC component signal is provided to the processor 546 through conductor 572. Consequently, the power converter 550 enables the lock circuit 530 to run on both AC and DC power.
The solenoid 552 receives the AC component signal from the power converter 550. The solenoid 552 in one embodiment is a coil containing one or more windings. The solenoid 552, upon receiving current from the power converter 550, generates a magnetic field to actuate an unlocking mechanism in a lock, in a manner similar to that which is described above.
A switch 554 is in communication with the solenoid 552 through a conductor 576. The switch 554 is also in communication with the processor 546 through a conductor 580. In addition, the switch 554 is in communication with ground 578. The switch 554 enables or disables the solenoid 552 from receiving current, thereby causing the solenoid 552 to lock or unlock. In one embodiment, the processor 546 sends a signal through the conductor 580 to the switch 554 that closes the switch 554 and thereby creates a conduction path from the solenoid 552 to ground 578. With the switch closed 554, the solenoid 552 is able to receive current from the power converter 550 and thereby effectuate unlocking. At other times, the processor 546 will not send a signal 580 to the switch 554 and thereby cause the switch to be open, preventing current from flowing through the solenoid 552 and thereby locking the lock. Alternatively, the processor 546 can send a signal over the signal line 580 to the switch 554 which will cause the switch to remain open.
While not shown, in certain embodiments the lock circuit 530 includes a battery in addition to, or in place of, the battery 524 in the key circuit 500. In such instances, the lock circuit 530 may provide power to the key circuit 510. This power may recharge the battery 524. Alternatively, if the key circuit 510 does not have a battery 524, power transmitted from the battery in the lock circuit 530 may power the key circuit 510.
A processor 602 in the key circuit 600 is in communication with a memory device 626, similar to the processor 502 and the memory device 526 of the key circuit 510. In the depicted embodiment, the processor 602 is a microcontroller and the memory device 626 is a flash memory device. While the processor 602 and the memory device 626 are shown on both
A data coil 612, shown in
Transistors 616 are depicted as switches in
Various encoding schemes may be used to transmit and receive data. For example, a Manchester encoding scheme may be used, where each bit of data is represented by at least one voltage transition. Alternatively, a pulse-width modulation scheme may be employed, where a signal's duty cycle is modified to represent bits of data. Using different encoding schemes may allow the key circuit 600 to contain fewer components. For example, when a pulse-width modulation scheme is used, such as in
A power coil 614 is in communication with the processor 604 through conductors 608 and 610 (see
In the depicted embodiment, the processor 602 generates two oscillating signals which are provided to the power coil 614. In the depicted embodiment, the oscillating power signals oscillate at 200 kHz (kilohertz). The relative high frequency of the power signal in certain embodiments facilitates improved rectification of the power signal and therefore a more efficient power transfer. In alternative embodiments other frequencies may be chosen without departing from the scope of the present invention.
In one embodiment, the power signals sent over power coil 614 oscillate at a higher frequency than the data signals sent over the data coil 612. When the power signals oscillate at a higher frequency than the data signals, interference between power and data signals is further minimized, e.g., the signal-to-noise ratio (SNR) is improved. In one embodiment, significant SNR improvements occur when the power signal frequency is greater than 10 times the data signal frequency.
Diodes 620 are in communication with the power coil 614 through conductors 608 and 610. The diodes 620 in the depicted embodiment form a rectifier circuit, similar to the rectifier circuit 520 of
The voltage Vpp 682 is provided to a recharge circuit 622 (see
In the lock circuit 700, a data coil 732 is in communication with the processor 746 through conductors 736 and 738. The data coil 732 in the depicted embodiment is a coil or solenoid which has a value of inductance. In one embodiment, the inductance of the data coil 732 is 100 μH (micro-Henries). The data coil 732 receives data from and sends data to the data coil 612 of the key circuit 600.
In one embodiment, data provided by the key circuit 600 and received by the data coil 732 provides a clock signal to the processor 746, enabling the processor 746 to be synchronized or substantially synchronized with the processor 602 of the key circuit 600. The clock signal may be provided, for example, when a Manchester encoding scheme is used to transmit the data. In certain embodiments, this external clock signal removes the need for a crystal oscillator in the lock circuit 700, thereby reducing the number of components and therefore the size of the lock circuit 700.
Transistors 744 are depicted as switches. Similar to the switches 544, the transistors 744 selectively direct current flow between the data coil 732 and the processor 746. Control signals sent on conductor 782 from the processor 746 control the transistors 744, selectively allowing current to flow through the transistors 744.
A power coil 734 is in communication with the processor 746 through conductors 740 and 742. In one embodiment, the inductance of the power coil 734 is 10 μH (micro-Henries). Like the power coil 532 of
Power conversion circuit 750 includes diodes 720, a capacitor 790, and a low-dropout regulator 760. The diodes 720 of the power conversion circuit 750 form a rectifier circuit. The depicted configuration of the diodes 720 constitutes a bridge rectifier, or full wave rectifier. When the diodes 720 receive an AC voltage signal from the power coil 734, the diodes 720 of the bridge rectifier full-wave rectify the AC voltage signal. This full-wave rectified signal in certain embodiments still contains a changing voltage signal with respect to time, but the voltage signal has a single polarity (e.g., the entire voltage signal is positive). This full-wave rectified signal is provided as voltage Vcc 784 to a solenoid 752.
The capacitor 790 converts the full-wave rectified signal into DC form and provides the DC signal to the low-dropout regulator 760. The low-dropout regulator 760 stabilizes the signal to a voltage Vdd 772, which is provided to various components in the lock circuit 700, including the processor 746. Consequently, the power conversion circuit 750 provides a changing or AC voltage Vcc 784 to the solenoid 752 and a DC voltage Vdd 772 to various circuit components.
The solenoid 752 receives the voltage Vcc 784 from the power converter 750. The solenoid 752 in one embodiment is a coil containing one or more windings. The solenoid 752, upon receiving the voltage Vcc 784 from the power converter 550, generates a magnetic field to actuate an unlocking mechanism in a lock, in a manner similar to that which is described above.
A transistor 754 is in communication with the solenoid 752. The transistor 754 is also in communication with the processor 746 through a conductor 780. In addition, the transistor 754 is in communication with ground 778. In certain embodiments, the transistor 754 acts as a switch to enable or disable the solenoid 752 from receiving current, thereby causing the solenoid 752 to lock or unlock the locking device. In one embodiment, the processor 746 sends a signal through the conductor 780 to the transistor 754 that sends current through the transistor 754 and thereby creates a conduction path from the solenoid 752 to ground 778. With the transistor 754 in this state, the solenoid 752 is able to receive current from the voltage Vcc 784 and thereby effectuate unlocking. However, at other times, the processor 746 will not send a signal 780 to the transistor 754, such as when the processor 746 did not receive a correct unlocking code. In such case, the processor 746 causes the transistor 754 to remain open, thereby preventing current from flowing through the solenoid.
In the depicted embodiment, circuit components 860, 872, and 874 in conjunction with a processor provide circuitry for a pulse-modulation data-encoding scheme. During transmission of data from the key circuit 800, transistor switches 860 are selectively switched on and off to pulse a data signal to a data coil. When the key circuit 800 is receiving data, the comparator 872 receives the data voltage signal from the data coil.
The comparator 872 is used to convert the data voltage signal into a two-bit digital signal which is sent to a processor via data input line 880. In addition, the comparator 872 (or an operational amplifier used as a comparator) may be used to amplify the voltage signal to a level appropriate for a processor to manipulate.
A feedback resistor 874 provides positive feedback to the comparator 872, such that the comparator 872 attenuates small voltage signals and amplifies large voltage signals. By attenuating and amplifying small and large voltage signals respectively, the comparator 872 and feedback resistor 874 reduce the oscillatory effects of noise on the comparator 872. Thus, wrong-bit detection errors are reduced. In alternative embodiments, a Schmitt trigger integrated circuit may be employed in place of the comparator 872 and the resistor 874.
While various embodiments of key and lock circuits have been depicted, those of skill will further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans can implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The various illustrative logical blocks, modules, and circuits described in connection with the embodiments disclosed herein can be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general purpose processor can be a microprocessor, conventional processor, controller, microcontroller, state machine, etc. A processor can also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. In addition, the term “processing” is a broad term meant to encompass several meanings including, for example, implementing program code, executing instructions, manipulating signals, filtering, performing arithmetic operations, and the like.
In addition, although this invention has been disclosed in the context of a certain preferred embodiment, it will be understood by those skilled in the art that the present invention extends beyond the specifically disclosed embodiment to other alternative embodiments and/or uses of the invention and obvious modifications and equivalents thereof. In particular, while the present key and lock system has been described in the context of a particularly preferred embodiment, the skilled artisan will appreciate, in view of the present disclosure, that certain advantages, features and aspects of the key and lock system may be realized in a variety of other applications. Additionally, it is contemplated that various aspects and features of the invention described can be practiced separately, combined together, or substituted for one another, and that a variety of combination and subcombinations of the features and aspects can be made and still fall within the scope of the invention. Furthermore, the systems described above need not include all of the modules and functions described in the preferred embodiments. Thus, it is intended that the scope of the present invention herein disclosed should not be limited by the particular disclosed embodiment described above, but should be determined only by a fair reading of the claims that follow.
This application is a continuation of U.S. application Ser. No. 13/706,291, filed Dec. 5, 2012, which is a continuation of U.S. application Ser. No. 13/159,326, filed on Jun. 13, 2011, which is a continuation of U.S. application Ser. No. 11/855,031, filed on Sep. 13, 2007, now U.S. Pat. No. 7,958,758, which claims priority under 35 U.S.C. §119(e) from U.S. Provisional Patent Application No. 60/888,282, filed Feb. 5, 2007 and U.S. Provisional Patent Application No. 60/825,665, filed Sep. 14, 2006. The disclosures of each of the foregoing applications are hereby incorporated by reference in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
3732465 | Palmer | May 1973 | A |
4031434 | Perron | Jun 1977 | A |
4063435 | Oliver | Dec 1977 | A |
4067214 | Kiraly | Jan 1978 | A |
4158952 | Oliver et al. | Jun 1979 | A |
RE30198 | Oliver et al. | Jan 1980 | E |
4180999 | Hurskainen et al. | Jan 1980 | A |
RE30243 | Oliver | Apr 1980 | E |
4250533 | Nelson | Feb 1981 | A |
4255953 | Dietrich et al. | Mar 1981 | A |
4280119 | May | Jul 1981 | A |
4300370 | Kaiser et al. | Nov 1981 | A |
4315420 | Oliver | Feb 1982 | A |
4328690 | Oliver | May 1982 | A |
4404825 | Dixon et al. | Sep 1983 | A |
4459835 | Hurskainen | Jul 1984 | A |
RE31910 | Oliver | Jun 1985 | E |
4530223 | Oliver | Jul 1985 | A |
4552001 | Roop | Nov 1985 | A |
4591854 | Robinson | May 1986 | A |
4603564 | Kleinhäny et al. | Aug 1986 | A |
D285772 | Oliver | Sep 1986 | S |
4617811 | Roop | Oct 1986 | A |
4628400 | Ho | Dec 1986 | A |
4635455 | Oliver | Jan 1987 | A |
4658105 | Seckinger | Apr 1987 | A |
4682799 | Luker | Jul 1987 | A |
4688409 | Oliver et al. | Aug 1987 | A |
4690371 | Bosley et al. | Sep 1987 | A |
4712398 | Clarkson et al. | Dec 1987 | A |
4720041 | Swenson et al. | Jan 1988 | A |
4721849 | Davis et al. | Jan 1988 | A |
4723427 | Oliver | Feb 1988 | A |
4730471 | Seckinger et al. | Mar 1988 | A |
4732022 | Oliver | Mar 1988 | A |
D296330 | Davis et al. | Jun 1988 | S |
4761976 | Kleinhany | Aug 1988 | A |
4789859 | Clarkson et al. | Dec 1988 | A |
4801789 | Davis | Jan 1989 | A |
4807454 | Sengupta et al. | Feb 1989 | A |
4829798 | Roop | May 1989 | A |
4848115 | Clarkson et al. | Jul 1989 | A |
4866964 | Hall | Sep 1989 | A |
4909462 | Usui | Mar 1990 | A |
4912460 | Chu | Mar 1990 | A |
4914732 | Henderson et al. | Apr 1990 | A |
4969343 | Luker | Nov 1990 | A |
4988987 | Barrett et al. | Jan 1991 | A |
4998952 | Hyatt, Jr. et al. | Mar 1991 | A |
5010745 | Hall et al. | Apr 1991 | A |
5010750 | Böser et al. | Apr 1991 | A |
5038588 | Hall | Aug 1991 | A |
5044181 | Roop et al. | Sep 1991 | A |
5086557 | Hyatt, Jr. | Feb 1992 | A |
5088306 | Field | Feb 1992 | A |
5090222 | Imran | Feb 1992 | A |
D324480 | Roop et al. | Mar 1992 | S |
5094488 | Boadwine et al. | Mar 1992 | A |
5140317 | Hyatt, Jr. et al. | Aug 1992 | A |
5149155 | Caeti et al. | Sep 1992 | A |
5161397 | Raybary | Nov 1992 | A |
5176015 | Sussina | Jan 1993 | A |
D333972 | Hyatt, Jr. et al. | Mar 1993 | S |
5193372 | Sieg et al. | Mar 1993 | A |
5219196 | Luker | Jun 1993 | A |
5228730 | Gokcebay et al. | Jul 1993 | A |
5245329 | Gokcebay | Sep 1993 | A |
5268560 | Ueda | Dec 1993 | A |
5287712 | Sieg | Feb 1994 | A |
5289709 | Field | Mar 1994 | A |
5302872 | Ohki et al. | Apr 1994 | A |
5319362 | Hyatt, Jr. et al. | Jun 1994 | A |
5337043 | Gokcebay | Aug 1994 | A |
5351042 | Aston | Sep 1994 | A |
5367295 | Gokcebay et al. | Nov 1994 | A |
5373718 | Schwerdt et al. | Dec 1994 | A |
5419168 | Field | May 1995 | A |
5458382 | Boadwine et al. | Oct 1995 | A |
5469727 | Spahn et al. | Nov 1995 | A |
5491470 | Veligdan | Feb 1996 | A |
5495241 | Donig et al. | Feb 1996 | A |
5541581 | Trent | Jul 1996 | A |
5542274 | Thordmark et al. | Aug 1996 | A |
5550529 | Burge | Aug 1996 | A |
5552777 | Gokcebay et al. | Sep 1996 | A |
5570601 | Field | Nov 1996 | A |
5604489 | Hyatt, Jr. | Feb 1997 | A |
5605066 | Hurskainen | Feb 1997 | A |
5615565 | Field | Apr 1997 | A |
RE35518 | Sussina | May 1997 | E |
5671523 | Juchinewicz | Sep 1997 | A |
5690373 | Luker | Nov 1997 | A |
5745044 | Hyatt, Jr. et al. | Apr 1998 | A |
5775148 | Layton et al. | Jul 1998 | A |
5791177 | Bianco | Aug 1998 | A |
5802172 | Ingalsbe et al. | Sep 1998 | A |
5816083 | Bianco | Oct 1998 | A |
5819563 | Bianco | Oct 1998 | A |
5839305 | Aston | Nov 1998 | A |
5839307 | Field et al. | Nov 1998 | A |
5841363 | Jakob et al. | Nov 1998 | A |
5878611 | Lerchner | Mar 1999 | A |
5886644 | Keskin et al. | Mar 1999 | A |
D408711 | Bianco | Apr 1999 | S |
5894277 | Keskin et al. | Apr 1999 | A |
5896076 | Van Namen | Apr 1999 | A |
5905444 | Zimmer | May 1999 | A |
5943890 | Field et al. | Aug 1999 | A |
D414397 | Finkelstein et al. | Sep 1999 | S |
5974367 | Bianco | Oct 1999 | A |
6000254 | Raybary | Dec 1999 | A |
6000609 | Gokcebay et al. | Dec 1999 | A |
6002184 | Delson et al. | Dec 1999 | A |
6005487 | Hyatt, Jr. et al. | Dec 1999 | A |
6012311 | Duckwall | Jan 2000 | A |
6023954 | Field | Feb 2000 | A |
6026665 | Raybary | Feb 2000 | A |
6035675 | Zimmer et al. | Mar 2000 | A |
6043752 | Hisada | Mar 2000 | A |
6053677 | Juchinewicz | Apr 2000 | A |
6082153 | Schoell et al. | Jul 2000 | A |
6105404 | Field et al. | Aug 2000 | A |
6125673 | Luker | Oct 2000 | A |
6155089 | Hurskainen et al. | Dec 2000 | A |
6178789 | Finkelstein et al. | Jan 2001 | B1 |
6201317 | Kemmann et al. | Mar 2001 | B1 |
6209367 | Hyatt, Jr. et al. | Apr 2001 | B1 |
6215381 | Aoki | Apr 2001 | B1 |
6227020 | Lerchner | May 2001 | B1 |
6351206 | Schweiger et al. | Feb 2002 | B1 |
6374653 | Gokcebay et al. | Apr 2002 | B1 |
D457051 | Davis | May 2002 | S |
6382006 | Field et al. | May 2002 | B1 |
6384711 | Cregger et al. | May 2002 | B1 |
6437684 | Simeray | Aug 2002 | B1 |
6467602 | Bench et al. | Oct 2002 | B2 |
6474122 | Davis | Nov 2002 | B2 |
6477505 | Ward, II et al. | Nov 2002 | B2 |
6477875 | Field et al. | Nov 2002 | B2 |
6483424 | Bianco | Nov 2002 | B1 |
6496101 | Stillwagon | Dec 2002 | B1 |
6552650 | Gokcebay et al. | Apr 2003 | B1 |
6564600 | Davis | May 2003 | B1 |
6564601 | Hyatt, Jr. | May 2003 | B2 |
6578396 | Field et al. | Jun 2003 | B2 |
6588243 | Hyatt, Jr. et al. | Jul 2003 | B1 |
6604394 | Davis | Aug 2003 | B2 |
6615625 | Davis | Sep 2003 | B2 |
6718806 | Davis | Apr 2004 | B2 |
6778067 | Kakuta | Aug 2004 | B2 |
6822552 | Lidën et al. | Nov 2004 | B2 |
6826935 | Gokcebay et al. | Dec 2004 | B2 |
6854305 | Hurskainen et al. | Feb 2005 | B2 |
6891458 | Hyatt, Jr. et al. | May 2005 | B2 |
6895792 | Davis | May 2005 | B2 |
6927670 | Gokcebay et al. | Aug 2005 | B1 |
6935560 | Andreasson et al. | Aug 2005 | B2 |
6937140 | Outslay et al. | Aug 2005 | B1 |
6940455 | Plettner | Sep 2005 | B2 |
6945082 | Field et al. | Sep 2005 | B2 |
7000441 | Sutton et al. | Feb 2006 | B2 |
7023318 | Geiger et al. | Apr 2006 | B1 |
7052054 | Luker | May 2006 | B2 |
7099474 | Liden et al. | Aug 2006 | B1 |
7158008 | Waring et al. | Jan 2007 | B2 |
7227446 | Kumazaki | Jun 2007 | B2 |
7392675 | Kito | Jul 2008 | B2 |
7640773 | Bellamy et al. | Jan 2010 | B2 |
7689318 | Draper | Mar 2010 | B2 |
7690231 | Field et al. | Apr 2010 | B1 |
7712342 | Loughlin et al. | May 2010 | B2 |
7775056 | Lowenstein | Aug 2010 | B2 |
7860605 | Frankel | Dec 2010 | B2 |
7870769 | Andersson | Jan 2011 | B2 |
7958758 | Trempala et al. | Jun 2011 | B2 |
8027639 | Hulvey et al. | Sep 2011 | B2 |
8108068 | Boucher et al. | Jan 2012 | B1 |
8276415 | Trempala et al. | Oct 2012 | B2 |
8347674 | Trempala et al. | Jan 2013 | B2 |
8746023 | Trempala et al. | Jun 2014 | B2 |
8803656 | Tamezane | Aug 2014 | B2 |
8985448 | Jonely | Mar 2015 | B2 |
20010027671 | Davis | Oct 2001 | A1 |
20020062172 | Bench et al. | May 2002 | A1 |
20030052782 | Maloney | Mar 2003 | A1 |
20030136162 | Sutton et al. | Jul 2003 | A1 |
20030169148 | Takamura et al. | Sep 2003 | A1 |
20040035160 | Meekma et al. | Feb 2004 | A1 |
20050088279 | Denison et al. | Apr 2005 | A1 |
20050280500 | Miller et al. | Dec 2005 | A1 |
20060071748 | Victor | Apr 2006 | A1 |
20070023512 | Miller et al. | Feb 2007 | A1 |
20070139171 | Fischer | Jun 2007 | A1 |
20070150382 | Danilewitz | Jun 2007 | A1 |
20080270178 | McRae et al. | Oct 2008 | A1 |
20090165512 | Bellamy | Jul 2009 | A1 |
20090281656 | Draper | Nov 2009 | A1 |
20090308119 | Harley | Dec 2009 | A1 |
20100073129 | Pukari | Mar 2010 | A1 |
20110239714 | Trempala et al. | Oct 2011 | A1 |
20120044054 | Hussain et al. | Feb 2012 | A1 |
20120130534 | Wurm | May 2012 | A1 |
20140152420 | Wolski | Jun 2014 | A1 |
20140298870 | Munger | Oct 2014 | A1 |
Number | Date | Country |
---|---|---|
3735470 | May 1989 | DE |
10238134 | Feb 2004 | DE |
20308813 | Oct 2004 | DE |
0288791 | Nov 1988 | EP |
0505084 | Sep 1992 | EP |
0688928 | Dec 1995 | EP |
2782402 | Feb 2000 | FR |
2801334 | May 2001 | FR |
WO 9730255 | Aug 1997 | WO |
WO 9732098 | Sep 1997 | WO |
WO 9748867 | Dec 1997 | WO |
WO 9914842 | Mar 1999 | WO |
WO 0009836 | Feb 2000 | WO |
WO 0155539 | Aug 2001 | WO |
WO 2008034022 | Mar 2008 | WO |
WO 2008114238 | Sep 2008 | WO |
WO 2010107444 | Sep 2010 | WO |
Entry |
---|
International Search Report and Written Opinion dated Apr. 4, 2008 for related PCT Application No. PCT/US2007/078431 filed Sep. 13, 2007. |
International Search Report and Written Opinion dated Jan. 11, 2010 for PCT Application No. PCT/US2009/37864 filed Mar. 20, 2009. |
International Search Report and Written Opinion dated Apr. 9, 2014 for International Application No. PCT/US2013/073013 filed Dec. 4, 2013. |
Number | Date | Country | |
---|---|---|---|
20140283568 A1 | Sep 2014 | US |
Number | Date | Country | |
---|---|---|---|
60888282 | Feb 2007 | US | |
60825665 | Sep 2006 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13706291 | Dec 2012 | US |
Child | 14296062 | US | |
Parent | 13159326 | Jun 2011 | US |
Child | 13706291 | US | |
Parent | 11855031 | Sep 2007 | US |
Child | 13159326 | US |