The present invention relates to information and power management in connected devices.
The Internet of Things (IoT) refers to networks of devices with embedded electronics, software, sensors, and connectivity that enable the widespread collecting, delivery, and sharing of information. In order for these networks of devices to be most effective, they will need to employ power management schemes. The ability of these devices to enter into low power consumption modes will be essential to ensuring their ability to operate when needed between charging cycles. Given that one of the key aspects of these networks of devices is their ability to share information, there is a question about what to do with the information from these devices during these power management cycles.
Therefore, a need exists for a system where information can be offloaded by devices in a network as they enter low power consumption states.
Accordingly, one aspect of the present invention discloses a system, comprising: a first device comprising: a first communication interface; a first control system communicatively coupled to the first communication interface and comprising at least one first hardware processor and a first memory storing program codes operable to: receive a first sleep event; send first information to a third device; enter a first sleep mode; receive a first wake event; and receive the first information from the third device; and a second device comprising: a second communication interface; a second control system communicatively coupled to the second communication interface and comprising at least one second hardware processor and a second memory storing program codes operable to: receive a second sleep event; send second information to the third device; enter a second sleep mode; receive a second wake event; and receive the second information from the third device; and a substantially powered third device comprising: a third communication interface; a third control system communicatively coupled to the third communication interface and comprising at least one third hardware processor and a third memory storing program codes operable to: receive the first information from the first device; receive the second information from the second device; send the first information to the first device after the first wake event; and send the second information to the second device after the second wake event.
A further aspect of the present invention describes a system, comprising: a first device comprising: a first communication interface; a first control system communicatively coupled to the first communication interface and comprising at least one first hardware processor and a first memory storing program codes operable to: receive a first sleep event; identify a third device as available to receive first information; send the first information to the third device; enter a first sleep mode; receive a first wake event; and receive the first information from the third device; and a second device comprising: a second communication interface; a second control system communicatively coupled to the second communication interface and comprising at least one second hardware processor and a second memory storing program codes operable to: receive a second sleep event; identify the third device as available to receive second information; send the second information to the third device; enter a second sleep mode; receive a second wake event; and receive the second information from the third device; and a third device comprising: a third communication interface; a third control system communicatively coupled to the third communication interface and comprising at least one third hardware processor and a third memory storing program codes operable to: receive the first information from the first device; receive the second information from the second device; send the first information to the first device after the first wake event; and send the second information to the second device after the second wake event.
In other exemplary embodiments, the first, second, and third devices are selected from the group consisting of: cellular telephones, smart phones, personal digital assistants, tablets, pagers, two-way radios, netbooks, barcode scanners, radio frequency identification (RFID) readers, intelligent sensors, tracking devices, and smart tags.
In further exemplary embodiments, the first and second information are selected from the group comprising: information about the operation of the device, the total operational time of the device, information about the timing and duration of sleep and wake cycles of the device, information about installed software applications and operating systems and respective patches or updates, information about the state and operation of the sensors, data collected by the sensors, data collected from touch screens or keypads of the device, and information on communications between the device and other devices in the network.
In still further exemplary embodiments, the first and second sleep events are selected from a group consisting of: in response to input received at the first and second devices respectively, in response to a low power state at the first and second devices respectively, in response to a timer at the first and second devices respectively, in response to an absence of a proximity event at the first and second devices respectively, and in response to a message from the third device to the first and second devices respectively.
In other exemplary embodiments, the first and second wake events are selected from a group consisting of: in response to input received at the first and second devices respectively, in response to the addition of a power supply to the first and second device respectively, in response to a timer at the first and second devices respectively, in response to a proximity event at the first and second devices respectively, and in response to a message from the third device to the first and second devices respectively.
In more exemplary embodiments, identifying the third device as available to receive information comprises: sending a request to the third device for information regarding the power and storage status of the third device; receiving information regarding the power and storage status of the third device; and determining, using the information regarding the power and storage status of the third device, if the third device is available to receive information.
In some other exemplary embodiments, the third device is further operable to: receive a lightweight signal from the first device, wherein the lightweight signal is indicative of a wake state of the first device; and receive a lightweight signal from the second device, wherein the lightweight signal is indicative of a wake state of the second device.
In separate exemplary embodiments, the third device is further operable to: poll the first device to determine if the first device is in a wake state before sending the first information to the first device; and poll the second device to determine if the second device is in a wake state before sending the second information to the second device.
In other exemplary embodiments, the third device is further operable to: receive a request from the first device for the first information; and receive a request from the second device for the second information.
And in still additional embodiments, in sending the first information to the first device and the second information to the second device, the third device only sends a subset of the first and second information respectively.
And yet a further aspect of the present invention imparts a system, comprising: a first device comprising: a first communication interface; a first control system communicatively coupled to the first communication interface and comprising at least one first hardware processor and a first memory storing program codes operable to: receive a first sleep event; identify a third device as available to receive first information; send the first information to the third device; enter a first sleep mode; receive a first wake event; and receive the first information from a fourth device; and a second device comprising: a second communication interface; a second control system communicatively coupled to the second communication interface and comprising at least one second hardware processor and a second memory storing program codes operable to: receive a second sleep event; identify the third device as available to receive second information; send the second information to the third device; enter a second sleep mode; receive a second wake event; and receive the second information from the fourth device; and a third device comprising: a third communication interface; a third control system communicatively coupled to the third communication interface and comprising at least one third hardware processor and a third memory storing program codes operable to: receive the first information from the first device; receive the second information from the second device; receive a third sleep event; identify the fourth device as available to receive the first, the second, and third information; send the first, second, and third information to the fourth device; enter a third sleep mode; receive a third wake event; and receive the third information from the fourth device; and a fourth device comprising: a fourth communication interface; a fourth control system communicatively coupled to the fourth communication interface and comprising at least one fourth hardware processor and a fourth memory storing program codes operable to: receive the first, second, and third information from the third device; send the first information to the first device after the first wake event; send the second information to the second device after the second wake event; and send the third information to the third device after the third wake event.
The foregoing illustrative summary, as well as other exemplary objectives and/or advantages of the invention, and the manner in which the same are accomplished, are further explained within the following detailed description and its accompanying drawings.
One embodiment of the present invention discloses a system of networked devices and a substantially powered hub device in which each one of the networked devices offloads information to the hub device before entering a low power consumption mode, i.e. a sleep mode, and receives the respective information back from the hub device after they enter a normal operation mode with normal power consumption, i.e. a wake mode. It should be noted, however, that in some embodiments, a power-on mode for a networked device may be a type of wake mode and similarly a power-off mode for a networked device may be a type of sleep mode.
Another embodiment of the present invention describes a system of networked devices in which each one of the networked devices offloads information to a selected networked device before entering a sleep mode and receives the respective information back from that selected networked device after entering a wake mode.
Another embodiment of the present invention describes a system of networked devices in which each one of the networked devices offloads information to an original selected networked device before entering a sleep mode and receives the respective information back from a new selected networked device, wherein the new selected networked device received the respective information from the original selected networked device before the original selected networked device entered a sleep mode.
In general, networked device 100 may be implemented in any form of digital computer or mobile device. Digital computers may include, but are not limited to, laptops, desktops, workstations, fixed vehicle computers, vehicle mount computers, hazardous environment computers, rugged mobile computers, servers, blade servers, mainframes, other appropriate computers. Mobile devices may include, but are not limited to, cellular telephones, smart phones, personal digital assistants, tablets, pagers, two-way radios, netbooks, barcode scanners, radio frequency identification (RFID) readers, intelligent sensors, tracking devices, and other similar computing devices.
In some embodiments of the present invention, the device 100 of
In other embodiments of the present invention, the device 100-1 may be connected to other devices 100-2 through 100-N via direct wired or direct wireless communication channels collectively represented by the data links 170-1 and 170-2 through 170-N, as shown in
In one embodiment, the devices 100-1 through 100-N are smart tags in a grocery store or supermarket aisle. In other embodiments, the devices 100-1 through 100-N are controls for a heating, ventilation, and air conditioning (HVAC) system for a building or residence. In these embodiments,
In general, as shown, the networked device 100 of
The processing system 110 also includes a peripherals interface 116 for communicating with other components of the device 100, including but not limited to, radio frequency (RF) circuitry 152, such as Wi-Fi and/or cellular communications circuitry such as wireless Ethernet, Bluetooth, and near field communication (NFC), audio circuitry 154 for the audio input component 153, such as a microphone, and audio output component 155, such as a speaker, one or more accelerometers 156, one or more other sensors 158, such as a location determination component such as a Global Positioning System (GPS) chip, and one or more external ports 160, which may be used for smart card readers or for wired connections such as wired Ethernet, USB, serial or I2C ports. The RF circuitry 152 and external ports 160 individually and collectively make up the communication interfaces for the device 100. The processing system 110 is also connected to a power system component 120 that is used to power the device 100, such as a battery or a power supply unit or an uninterruptible power supply (UPS). The processing system 110 is also connected to a clock system component 130 that controls a timer for use by the disclosed embodiments.
The peripherals interface 116 may also communicate with an Input/Output (I/O) subsystem 140, which includes a display(s) controller 141 operative to control display(s) 142. In some embodiments the display(s) 142 is a touch-sensitive display system, and the display(s) controller 141 is further operative to process touch inputs on the touch sensitive display 142. The I/O subsystem 140 may also include a keypad(s) controller 143 operative to control keypad(s) 144 on the device 100. The I/O subsystem 140 also includes an optical sensor(s) controller 145 operative to control one or more optical sensor(s) 146. The optical sensor(s) may include, but is not limited to, a barcode sensor, a camera, and an image sensor. The components of device 100 may be interconnected using one or more buses, represented generically by the arrows of
In some embodiments, the sleep event occurs in response to an input received at the networked device 100-1, such as through the touch display 142 or the keypad 144. In other embodiments, the sleep event occurs in response to the low power level of the device as indicated by the power system 120, such as a low battery level for the device. In still further embodiments, the sleep event occurs in response to a timer as indicated by the clock system 130, such as a directive to sleep after three minutes of operation. In another embodiment, the sleep event occurs in response to an absence of a proximity event. For example, the networked device 100-1 enters a sleep mode in response to the absence of sound (as indicated by the audio input 153) or the absence of motion (as indicated by the optical sensors 146, such as traditional cameras or thermal cameras). In more embodiments, the sleep event occurs in response to a message sent from the hub device 100-2 to the networked device 100-1 over the communication interfaces, e.g. the RF circuitry 152 and/or external ports 160.
If no sleep event has been received (Path 301), then the device determines if it has received a power-off event (Step 306). The power-off event could be in response to input received at the networked device 100-1 to turn the device off or in response to a message received from the hub device 100-2 to power down. If there is a power-off event (Path 307), then the networked device 100-1 enters the power-off mode (Step 310) and the process is complete (Step 312). If there is no power-off event (Path 305), then the networked device 100-1 continues its normal operations (Step 308) and continues to check for sleep events (Step 304) and power-off events (Step 306). The normal operations of the networked device 100-1 depend on the nature and design of the device.
By way of a non-limiting example, in the case where the networked device 100-1 is a smart tag in a grocery store, the normal operation could include activities such as displaying product information, displaying pricing information, displaying sales or promotional information, issuing sales information (such as dispensing coupons), displaying device information, and collecting sensor data.
Returning to Step 304, if there is a sleep event (Path 303), then the networked device 100-1 checks to see if the backup device, e.g. the hub device 100-2, is available (Step 314). In this embodiment, the hub device 100-2 is substantially powered, meaning that it is plugged into a continuous power supply or an uninterruptible power supply. As such, this embodiment envisions that the hub device 100-2 will almost always be available to the networked device 100-1, except for maybe maintenance situations and force majeure. However, there could be instances there the communication between the hub device 100-2 and the networked device 100-1 is temporarily interrupted, and so the networked device 100-1 checks for the availability of the backup device (Step 314). If the hub device 100-2 is not available (Path 309) and as long as the networked device 100-1 is not out of power (Step 316, Path 313), then it will continue to try to reconnect with the hub device 100-2. If the networked device 100-1 runs out of power (Path 315), then it enters a power-off mode (Step 310) and the process is complete (Step 312).
If the hub device 100-2 is available to the networked device 100-1 (Path 311), then the networked device 100-1 offloads information to the hub device 100-2 (Step 318) and enters a sleep mode (Step 320).
The information offloaded by the networked device 100-1 depends on the nature and design of the device. The information includes, but is not limited to, information about the operation of the device, for example the total operational time of the device, information about the timing and duration of sleep and wake cycles of the device, information about installed software applications and operating systems and respective patches or updates, information about the state and operation of the sensors, data collected by the sensors, data collected from touch screens or keypads of the device, information on communications between the device and other devices in the network, and the like. In some embodiments, the information offloaded is the type of information that is not normally retained when a device enters sleep mode (such as information in transitory or volatile memory), but embodiments of the present invention are note limited thereto.
There are different embodiments for offloading information from the networked device 100-1 to the hub device 100-2. In some instances, the data may be transmitted as one or more files. In other embodiments, the information may be compressed to reduce the bandwidth of the transmission. In secure situations, the transmission may be encrypted or layered with other security mechanisms understood in the art to secure data transmissions.
During sleep mode, the networked device 100-1 checks for a wake event (Step 322). If there is no wake event (Path 317), then the networked device 100-1 checks to see if it is out of power (Step 324). If the networked device 100-1 is out of power (Path 323), then the networked device 100-1 enters the power-off mode (Step 310) and the process is complete (Step 312).
If the networked device 100-1 is not out of power (Path 321), then the device remains in sleep mode (Step 320) and checks again for a wake event (Step 322). If the networked device 100-1 receives a wake event (Path 319), then the device enters a wake mode (Step 326) and receives the all or some subset of information that had been previously offloaded to the hub device 100-2 (Step 328).
In some embodiments, the wake event occurs in response to an input received at the networked device 100-1, such as through the touch display 142 or the keypad 144. In other embodiments, the wake event occurs in response to the addition of a power supply to the device as indicated by the power system 120. In still further embodiments, the wake event occurs in response to a timer as indicated by the clock system 130, such as a directive to wake after three minutes in sleep mode. In another embodiment, the wake event occurs in response to a proximity event. For example, the networked device 100-1 enters a wake mode in response to the detection of sound (as indicated by the audio input 153) or the detection of motion (as indicated by the optical sensors 146, such as traditional cameras or thermal cameras). In more embodiments, the wake event occurs in response to a message sent from the hub device 100-2 to the networked device 100-1 over the communication interfaces, e.g. the RF circuitry 152 and/or external ports 160.
The information may be received by the networked device 100-1 from the hub device 100-2 according to a push or pull model or some combination therein. In some embodiments, when the networked device 100-1 wakes, it sends a lightweight or low-level wake signal to the hub device 100-2 which triggers the hub device 100-2 to send the information to the networked device 100-1. In other embodiments, the hub device 100-2 polls the networked devices to determine when they have returned to a wake state and promptly sends them the respective information. In yet further embodiments, the networked device 100-1 specifically requests the information to be returned from the hub device 100-2.
As indicated earlier, in some embodiments, the information returned to the networked device 100-1 from the hub device 100-2 may be a subset of the information originally offloaded. For example, in some embodiments, it may not be necessary to return information to the networked device 100-1 about installed software applications and operating systems and respective patches or updates, since the networked device 100-1 can readily obtain that information again. In other embodiments, though, the information offloaded to the hub device 100-2 may not be recoverable from the networked device 100-1 itself, such as information that had been collected from sensors on the device. It may be important to return such data for completion, such as returning information on sleep and wake cycles of the device so that a monthly profile of usage of the networked device 100-1 can be ascertained.
After the networked device 100-1 has entered a wake state (Step 326) and received the information it had offloaded (Step 328), the process repeats, and the networked device 100-1 continues to check for sleep events (Step 304) and power-off events (Step 306) and proceeds with normal operations (Step 308) while those events are absent.
The process begins at Step 400 followed by Step 402 in which the hub device 100-2 enters a power-on mode or state. In some embodiments, a power-on mode for a hub device may be a type of wake mode and similarly a power-off mode for a hub device may be a type of sleep mode. The process continues to Step 404 in which the hub device 100-2 determines if it has received a power-off event. The power-off event could be in response to input received at the hub device 100-2 to turn the device off or in response to a timer. If the hub device 100-2 has received a power-off event (Path 403), then the device enters into a power-off mode (Step 416) and the process is complete (Step 418).
If a power-off event has not received (Path 401), then the hub device 100-2 checks to see if it a networked device sleep event has occurred (Step 406). There can be different types of occurrences of networked device sleep events. In some embodiments, when the networked device 100-1 is preparing for sleep mode, it sends a lightweight or low-level sleep signal to the hub device 100-2 which triggers the hub device 100-2 to request the networked device 100-1 to send it the offloaded information. In other embodiments, the hub device 100-2 polls the devices in the network to determine if they are preparing for a sleep mode and requests the information from the networked device 100-1 accordingly. In yet further embodiments, the networked device 100-1 just sends the information to the hub device 100-2 when it prepares for sleep mode. A networked device 100-1 can be said to be preparing for sleep mode if the networked device 100-1 has received a sleep event 304.
If a networked device sleep event has occurred (Path 407), then the hub device 100-2 receives the information from networked device 100-1 that is preparing for sleep mode (Step 408).
After the information has been received (Step 408) or if no networked device sleep event occurred (Path 405), the hub device 100-2 then checks to see if a networked device wake event has occurred (Step 410). There can be different types of occurrences of networked device wake events. In some embodiments, when the networked device 100-1 wakes, it sends a lightweight or low-level wake signal to the hub device 100-2 which triggers the hub device 100-2 to send the information to the networked device 100-1. In other embodiments, the hub device 100-2 polls the networked devices to determine when they have returned to a wake state and promptly sends them the respective information. In yet further embodiments, the networked device 100-1 specifically requests the information to be returned from the hub device 100-2. If a networked device wake event has occurred (Path 411), hub device 100-2 sends the respective information to the woken networked device (Step 412).
The hub device 100-2 then checks to see if it is out of power (Step 414). Again, since the hub device 100-2 is substantially powered, the hub device 100-2 will most likely not be out of power. If it is (Path 415), then the device enters into a power-off mode (Step 416) and the process is complete (Step 418). If not (Path 413) or if no networked device wake event occurred (Path 409), then the process proceeds to Step 404 and repeats.
The process begins at Step 600 followed by Step 602 in which the networked device 100-1 enters a power-on mode or state. As discussed before, in some embodiments, a power-on mode for a networked device may be a type of wake mode and similarly a power-off mode for a networked device may be a type of sleep mode. The process continues to Step 604 in which the networked device 100-1 creates a list of other networked devices in the system.
In one embodiment, the networked device 100-1 polls for the other devices in the network to create the list of potential devices to offload information, i.e. the backup list. In other embodiments, the creation of the backup list is part of the normal operations of the networked device (Step 610). In other embodiments, the networked devices can broadcast their information to the other devices in the network so that each networked device can assemble its own backup list. In still further embodiments, the networked devices can announce when they go offline and are no longer available to serve as a backup device for the other networked devices so that the respective backup lists on each networked device can be updated accordingly. In still other embodiments, it is possible to have a central backup list stored on a device that is not a networked device of the system but that all networked devices can access.
And in more embodiments, the lists are dynamically updated with relevant information that would assist any given networked device with selecting a backup device in the network, such as, but not limited to, current power level and storage capacity of the potential backup device. In other embodiments, the information relevant to the criteria for selecting a backup device is assembled by each individual networked device by polling each of the other networked devices. In some embodiments, the information relevant to the criteria for selection is stored in the central backup list stored on a remote device accessible by all networked devices.
There are different ways in which the backup lists can identify the networked devices in the system. In some embodiments, the identifier can be a network identifier such as an Internet Protocol address (IP address) or a Media Access Control address (MAC address). In other embodiments, the identifier can be a radio frequency identifier, such as an near field communication (NFC) tag, a radio frequency identification (RFID) tag, or a Bluetooth address. In some embodiments, the identifier can be a system-wide unique name for a networked device, and there can be a supplementary system that allows networked devices to lookup connectivity information for associated unique names. In more embodiments, the identifier is a uniform resource locator (URL).
Next, the networked device 100-1 determines if it has received a sleep event (Step 606). In some embodiments, the sleep event occurs in response to an input received at the networked device 100-1, such as through the touch display 142 or the keypad 144. In other embodiments, the sleep event occurs in response to the low power level of the device as indicated by the power system 120, such as a low battery level for the device. In still further embodiments, the sleep event occurs in response to a timer as indicated by the clock system 130, such as a directive to sleep after three minutes of operation. In another embodiment, the sleep event occurs in response to an absence of a proximity event. For example, the networked device 100-1 enters a sleep mode in response to the absence of sound (as indicated by the audio input 153) or the absence of motion (as indicated by the optical sensors 146, such as traditional cameras or thermal cameras). In more embodiments, the sleep event occurs in response to a message sent from another networked device to the networked device 100-1 over the communication interfaces, e.g. the RF circuitry 152 and/or external ports 160.
If no sleep event has been received (Path 601), then the device determines if it has received a power-off event (Step 608). The power-off event could be in response to input received at the networked device 100-1 to turn the device off or in response to a message received from a network administrator. If there is a power-off event (Path 607), then the networked device 100-1 enters the power-off mode (Step 612) and the process is complete (Step 614). If there is no power-off event (Path 605), then the networked device 100-1 continues its normal operations (Step 610) and continues to check for sleep events (Step 606) and power-off events (Step 608). The normal operations of the networked device 100-1 depend on the nature and design of the device. By way of a non-limiting example, in the case where the networked device 100-1 is a smart tag in a grocery store, the normal operation could include activities such as displaying product information, displaying pricing information, displaying sales or promotional information, issuing sales information (such as dispensing coupons), displaying device information, and collecting sensor data.
Returning to Step 606, if there is a sleep event (Path 603), then the networked device 100-1 determines if there are any networked devices in the backup list that remain to be checked in terms of availability to serve as a backup device and receive offloaded information from the networked device 100-1 (Step 616).
If there are no more networked devices in the backup list to check (Path 609), then the networked device 100-1 checks to see if it has run out of power (Step 620), and if so (Path 619), it enters a power-off mode (Step 612) and the process is complete (Step 614). If the networked device 100-1 has not run out of power (Path 617), then the networked device 100-1 continues to check for sleep events (Step 606) and power-off events (Step 608) and proceeds with normal operations (Step 610) while those events are absent.
If there are networked devices in the backup list to check (Path 611), then the networked device 100-1 selects an identifier from the backup list and determines if that device is available to serve as a backup (Step 618). As described earlier, there are many embodiments for determining the availability of another networked device to serve as a backup device, including but not limited to confirming that the candidate networked device is in a wake mode and has sufficient power capacity and storage capacity to safeguard the offloaded information from the networked device 100-1. Further, there are different embodiments for navigating and selecting identifiers from the backup list. In some embodiments, there may be networked devices delineated as “favorite” devices to serve as backup devices. In alternative embodiments, the list could default to newer devices added to the network to be the initial backup candidates.
If the networked device selected from the backup list is not available to serve as a backup device (Path 613), then the networked device 100-1 checks to see if it has run out of power (Step 620), and if so (Path 619), it enters a power-off mode (Step 612) and the process is complete (Step 614). If the networked device 100-1 has not run out of power (Path 617), then the networked device 100-1 continues to check for sleep events (Step 606), if the networked device 100-1 has still received a sleep event, then it returns to Step 616 and selects another identifier from the backup list and determines if that device is available to serve as a backup (Step 618).
If the networked device 100-1 successfully identifies another networked device, say networked device 100-2, to serve as a backup device (Path 615), then the networked device 100-1 offloads information to the networked device 100-2 (Step 622) and enters a sleep mode (Step 624). The information offloaded by the networked device 100-1 depends on the nature and design of the device. The information includes, but is not limited to, information about the operation of the device, for example the total operational time of the device, information about the timing and duration of sleep and wake cycles of the device, information about installed software applications and operating systems and respective patches or updates, information about the state and operation of the sensors, data collected by the sensors, data collected from touch screens or keypads of the device, information on communications between the device and other devices in the network, and the like. In some embodiments, the information offloaded is the type of information that is not normally retained when a device enters sleep mode (such as information in transitory or volatile memory), but embodiments of the present invention are note limited thereto.
There are different embodiments for offloading information from the networked device 100-1 to the hub device 100-2. In some instances, the data may be transmitted as one or more files. In other embodiments, the information may be compressed to reduce the bandwidth of the transmission. In secure situations, the transmission may be encrypted or layered with other security mechanisms understood in the art to secure data transmissions.
During sleep mode, the networked device 100-1 checks for a wake event (Step 626). If there is no wake event (Path 621), then the networked device 100-1 checks to see if it is out of power (Step 628). If the networked device 100-1 is out of power (Path 627), then the networked device 100-1 enters the power-off mode (Step 612) and the process is complete (Step 614).
If the networked device 100-1 is not out of power (Path 625), then the device remains in sleep mode (Step 624) and checks again for a wake event (Step 626). If the networked device 100-1 receives a wake event (Path 623), then the device enters a wake mode (Step 630) and receives the all or some subset of information that had been previously offloaded to the networked device 100-2 (Step 632).
In some embodiments, the wake event occurs in response to an input received at the networked device 100-1, such as through the touch display 142 or the keypad 144. In other embodiments, the wake event occurs in response to the addition of a power supply to the device as indicated by the power system 120. In still further embodiments, the wake event occurs in response to a timer as indicated by the clock system 130, such as a directive to wake after three minutes in sleep mode. In another embodiment, the wake event occurs in response to a proximity event. For example, the networked device 100-1 enters a wake mode in response to the detection of sound (as indicated by the audio input 153) or the detection of motion (as indicated by the optical sensors 146, such as traditional cameras or thermal cameras). In more embodiments, the wake event occurs in response to a message sent from the backup device, e.g. the networked device 100-2 to the networked device 100-1 over the communication interfaces, e.g. the RF circuitry 152 and/or external ports 160.
The information may be received by the networked device 100-1 from the backup networked device 100-2 according to a push or pull model or some combination therein. In some embodiments, when the networked device 100-1 wakes, it sends a lightweight or low-level wake signal to the backup networked device 100-2 which triggers the backup networked device 100-2 to send the information to the networked device 100-1. In other embodiments, the backup networked device 100-2 polls the networked devices to determine when they have returned to a wake state and promptly sends them the respective information. In yet further embodiments, the networked device 100-1 specifically requests the information to be returned from the backup networked device 100-2.
As indicated earlier, in some embodiments, the information returned to the networked device 100-1 from the backup networked device 100-2 may be a subset of the information originally offloaded. For example, in some embodiments, it may not be necessary to return information to the networked device 100-1 about installed software applications and operating systems and respective patches or updates, since the networked device 100-1 can readily obtain that information again. In other embodiments, though, the information offloaded to the backup networked device 100-2 may not be recoverable from the networked device 100-1 itself, such as information that had been collected from sensors on the device. It may be important to return such data for completion, such as returning information on sleep and wake cycles of the device so that a monthly profile of usage of the networked device 100-1 can be ascertained.
After the networked device 100-1 has entered a wake state (Step 630) and received the information it had offloaded (Step 632), the process repeats, with the networked device 100-1 continues to check for sleep events (Step 606) and power-off events (Step 608) and proceeds with normal operations (Step 610) while those events are absent.
Since the networked device 100-2 that is acting as a backup for other networked devices 100-1 is still a networked device, it operates identically to the manner described in
The primary differences between the networked device 100-2 acting as a backup device as described in
The first distinction between
The second distinction between
There can be different types of occurrences of networked device sleep events. In some embodiments, when the networked device 100-1 is preparing for sleep mode, it sends a lightweight or low-level sleep signal to the networked device 100-2 which triggers the networked device 100-2 to request the networked device 100-1 to send it the offloaded information. In other embodiments, the networked device 100-2 polls the devices in the network to determine if they are preparing for a sleep mode and requests the information from the networked device 100-1 accordingly. In yet further embodiments, the networked device 100-1 just sends the information to the networked device 100-2 when it prepares for sleep mode. A networked device 100-1 can be said to be preparing for sleep mode if the networked device 100-1 has received a sleep event 606.
If a networked device sleep event has occurred (Path 731), then the networked device 100-2 receives the information from networked device 100-1 that is preparing for sleep mode (Step 736).
After the information has been received (Step 736) or if no networked device sleep event occurred (Path 729), the networked device 100-2 then checks to see if a networked device wake event has occurred (Step 738).
There can be different types of occurrences of networked device wake events. In some embodiments, when the networked device 100-1 wakes, it sends a lightweight or low-level wake signal to the networked device 100-2 which triggers the networked device 100-2 to send the information to the networked device 100-1. In other embodiments, the networked device 100-2 polls the networked devices to determine when they have returned to a wake state and promptly sends them the respective information. In yet further embodiments, the networked device 100-1 specifically requests the information to be returned from the networked device 100-2. If a networked device wake event has occurred (Path 735), networked device 100-2 sends the respective information to the woken networked device (Step 740). Since networked device 100-2 may be acting as a backup for several devices, not just networked device 100-1, it off course will only return offloaded information to the networked device that was the original source of that information. In some embodiments, though, such as failure of a networked device, the networked device 100-2 may return the offloaded information to a new device that is being introduced to the network as a replacement for the failed device.
After the information has been sent (Step 740) or if no networked device wake event occurred (Path 733), the process follows connector B to
In Step 8-1, networked device 100-1 detects the presence of networked device 100-2, and in Step 8-2, networked device 100-1 detects the presence of networked device 100-N. As described earlier, there are several methods for device detection in the creation of the backup list (i.e. the list of the other devices in the network to potentially offload information), including, but not limited to polling for other devices in the network, identifying other devices in the network as part of normal operations, and receiving announcements and/or broadcasts from other devices on the network regarding their presence and/or abilities. In other embodiments, device detection is not required by networked device 100-1 as it may be able to access or retrieve a backup list maintained on and by a remote device.
In Step 8-3, networked device 100-1 then creates a list of potential backup devices on the network. In Step 8-4, networked device 100-1 then receives a sleep event. Networked device 100-1 checks its backup list and begins determining the availability of the devices on its list to serve as a backup. In Step 8-6, networked device 100-1 checks to see if networked device 100-N is available to serve as a backup. Since networked device 100-N has already gone to sleep (Step 8-5), it is not available to serve as backup, and so then in Step 8-7, networked device 100-1 checks to see if networked device 100-2 is available to serve as a backup (Step 8-7). Since it is, networked device 100-1 offloads its information to network device 100-2 (Step 8-8). At some point later, after networked device 100-1 receives a wake event (Step 8-9), it receives the offloaded information back from networked device 100-2 (Step 8-10).
In Steps 9-1, 9-2, and 9-3, networked device 100-1 detects the presence of networked device 100-2, 100-3, and 100-N respectively in order to create a list of devices (Step 9-4). Similarly, in Steps 9-5, 9-6, and 9-7, networked device 100-2 detects the presence of networked device 100-1, 100-3, and 100-N respectively in order to create a list of devices (Step 9-8). As described earlier, there are several methods for device detection in the creation of the backup list (i.e. the list of the other devices in the network to potentially offload information), including, but not limited to polling for other devices in the network, identifying other devices in the network as part of normal operations, and receiving announcements and/or broadcasts from other devices on the network regarding their presence and/or abilities. In other embodiments, device detection is not required by networked device 100-1 as it may be able to access or retrieve a backup list maintained on and by a remote device.
In Step 9-9, networked device 100-1 then receives a sleep event. Networked device 100-1 checks its backup list and begins determining the availability of the devices on its list to serve as a backup. In Step 9-10, networked device 100-1 checks to see if networked device 100-2 is available to serve as a backup. Since it is, networked device 100-1 offloads its information to network device 100-2 (Step 9-11).
In Step 9-12, networked device 100-2 then receives a sleep event. Networked device 100-2 checks its backup list and begins determining the availability of the devices on its list to serve as a backup. In Step 9-13, networked device 100-2 checks to see if networked device 100-3 is available to serve as a backup. Since it is, networked device 100-2 offloads its information and the information it is backing up for networked device 100-1 to network device 100-3 (Step 9-14). At some point later, after networked device 100-1 receives a wake event (Step 9-15), it receives the offloaded information back from networked device 100-3 (Step 9-16).
The disclosed subject matter may be embodied as devices, systems, methods, and/or computer program products. Accordingly, some or all of the disclosed subject matter may be embodied in hardware and/or in software (including firmware, resident software, microcode, state machines, gate arrays, etc.). Furthermore, the disclosed subject matter may take the form of a computer program product on a computer-usable or computer-readable storage medium having computer-usable or computer-readable program code embodied in the medium for use by or on conjunction with an instruction execution system. In the context of this document, a computer-usable or computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
The computer-usable or computer-readable medium may be for example, but not limited to, an electronic, magnet, optical, electromagnetic, infrared, or semiconductor system, apparatus, device or propagation medium. By way of example, and not limitation, computer-readable media may comprise computer storage media and communication media.
Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data. Computer storage media includes, but is not limited to, Random Access Memory (RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), flash memory or other memory technology, compact disc read-only memory (CD-ROM), digital versatile disks (DVD), or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and may be accessed by an instruction execution system. Note that the computer-usable or computer-readable medium can be paper or other suitable medium upon which the program is printed, as the program can be electronically captured via, for instance, optical scanning of the paper or other suitable medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
To supplement the present disclosure, this application incorporates entirely by reference the following commonly assigned patents, patent application publications, and patent applications:
In the specification and/or figures, typical embodiments of the invention have been disclosed. The present invention is not limited to such exemplary embodiments. The use of the term “and/or” includes any and all combinations of one or more of the associated listed items. The figures are schematic representations and so are not necessarily drawn to scale. Unless otherwise noted, specific terms have been used in a generic and descriptive sense and not for purposes of limitation.
Number | Name | Date | Kind |
---|---|---|---|
6832725 | Gardiner et al. | Dec 2004 | B2 |
7128266 | Zhu et al. | Oct 2006 | B2 |
7159783 | Walczyk et al. | Jan 2007 | B2 |
7413127 | Ehrhart et al. | Aug 2008 | B2 |
7717342 | Wang | May 2010 | B2 |
7726575 | Wang et al. | Jun 2010 | B2 |
8294969 | Plesko | Oct 2012 | B2 |
8317105 | Kotlarsky et al. | Nov 2012 | B2 |
8322622 | Liu | Dec 2012 | B2 |
8366005 | Kotlarsky et al. | Feb 2013 | B2 |
8371507 | Haggerty et al. | Feb 2013 | B2 |
8376233 | Horn et al. | Feb 2013 | B2 |
8381979 | Franz | Feb 2013 | B2 |
8390909 | Plesko | Mar 2013 | B2 |
8408464 | Zhu et al. | Apr 2013 | B2 |
8408468 | Van Horn et al. | Apr 2013 | B2 |
8408469 | Good | Apr 2013 | B2 |
8424768 | Rueblinger et al. | Apr 2013 | B2 |
8448863 | Xian et al. | May 2013 | B2 |
8457013 | Essinger et al. | Jun 2013 | B2 |
8459557 | Havens et al. | Jun 2013 | B2 |
8469272 | Kearney | Jun 2013 | B2 |
8474712 | Kearney et al. | Jul 2013 | B2 |
8479992 | Kotlarsky et al. | Jul 2013 | B2 |
8490877 | Kearney | Jul 2013 | B2 |
8510577 | Scott et al. | Aug 2013 | B2 |
8517271 | Kotlarsky et al. | Aug 2013 | B2 |
8523076 | Good | Sep 2013 | B2 |
8528818 | Ehrhart et al. | Sep 2013 | B2 |
8544737 | Gomez et al. | Oct 2013 | B2 |
8548420 | Grunow et al. | Oct 2013 | B2 |
8550335 | Samek et al. | Oct 2013 | B2 |
8550354 | Gannon et al. | Oct 2013 | B2 |
8550357 | Kearney | Oct 2013 | B2 |
8556174 | Kosecki et al. | Oct 2013 | B2 |
8556176 | Van Horn et al. | Oct 2013 | B2 |
8556177 | Hussey et al. | Oct 2013 | B2 |
8559767 | Barber et al. | Oct 2013 | B2 |
8561895 | Gomez et al. | Oct 2013 | B2 |
8561903 | Sauerwein | Oct 2013 | B2 |
8561905 | Edmonds et al. | Oct 2013 | B2 |
8565107 | Pease et al. | Oct 2013 | B2 |
8571307 | Li et al. | Oct 2013 | B2 |
8579200 | Samek et al. | Nov 2013 | B2 |
8583924 | Caballero et al. | Nov 2013 | B2 |
8584945 | Wang et al. | Nov 2013 | B2 |
8587595 | Wang | Nov 2013 | B2 |
8587697 | Hussey et al. | Nov 2013 | B2 |
8588869 | Sauerwein et al. | Nov 2013 | B2 |
8590789 | Nahill et al. | Nov 2013 | B2 |
8596539 | Havens et al. | Dec 2013 | B2 |
8596542 | Havens et al. | Dec 2013 | B2 |
8596543 | Havens et al. | Dec 2013 | B2 |
8599271 | Havens et al. | Dec 2013 | B2 |
8599957 | Peake et al. | Dec 2013 | B2 |
8600158 | Li et al. | Dec 2013 | B2 |
8600167 | Showering | Dec 2013 | B2 |
8602309 | Longacre et al. | Dec 2013 | B2 |
8608053 | Meier et al. | Dec 2013 | B2 |
8608071 | Liu et al. | Dec 2013 | B2 |
8611309 | Wang et al. | Dec 2013 | B2 |
8615487 | Gomez et al. | Dec 2013 | B2 |
8621123 | Caballero | Dec 2013 | B2 |
8622303 | Meier et al. | Jan 2014 | B2 |
8628013 | Ding | Jan 2014 | B2 |
8628015 | Wang et al. | Jan 2014 | B2 |
8628016 | Winegar | Jan 2014 | B2 |
8629926 | Wang | Jan 2014 | B2 |
8630491 | Longacre et al. | Jan 2014 | B2 |
8635309 | Berthiaume et al. | Jan 2014 | B2 |
8636200 | Kearney | Jan 2014 | B2 |
8636212 | Nahill et al. | Jan 2014 | B2 |
8636215 | Ding et al. | Jan 2014 | B2 |
8636224 | Wang | Jan 2014 | B2 |
8638806 | Wang et al. | Jan 2014 | B2 |
8640958 | Lu et al. | Feb 2014 | B2 |
8640960 | Wang et al. | Feb 2014 | B2 |
8643717 | Li et al. | Feb 2014 | B2 |
8646692 | Meier et al. | Feb 2014 | B2 |
8646694 | Wang et al. | Feb 2014 | B2 |
8657200 | Ren et al. | Feb 2014 | B2 |
8659397 | Vargo et al. | Feb 2014 | B2 |
8668149 | Good | Mar 2014 | B2 |
8678285 | Kearney | Mar 2014 | B2 |
8678286 | Smith et al. | Mar 2014 | B2 |
8682077 | Longacre | Mar 2014 | B1 |
D702237 | Oberpriller et al. | Apr 2014 | S |
8687282 | Feng et al. | Apr 2014 | B2 |
8692927 | Pease et al. | Apr 2014 | B2 |
8695880 | Bremer et al. | Apr 2014 | B2 |
8698949 | Grunow et al. | Apr 2014 | B2 |
8702000 | Barber et al. | Apr 2014 | B2 |
8717494 | Gannon | May 2014 | B2 |
8720783 | Biss et al. | May 2014 | B2 |
8723804 | Fletcher et al. | May 2014 | B2 |
8723904 | Marty et al. | May 2014 | B2 |
8727223 | Wang | May 2014 | B2 |
8740082 | Wilz | Jun 2014 | B2 |
8740085 | Furlong et al. | Jun 2014 | B2 |
8746563 | Hennick et al. | Jun 2014 | B2 |
8750445 | Peake et al. | Jun 2014 | B2 |
8752766 | Xian et al. | Jun 2014 | B2 |
8756059 | Braho et al. | Jun 2014 | B2 |
8757495 | Qu et al. | Jun 2014 | B2 |
8760563 | Koziol et al. | Jun 2014 | B2 |
8763909 | Reed et al. | Jul 2014 | B2 |
8777108 | Coyle | Jul 2014 | B2 |
8777109 | Oberpriller et al. | Jul 2014 | B2 |
8779898 | Havens et al. | Jul 2014 | B2 |
8781520 | Payne et al. | Jul 2014 | B2 |
8783573 | Havens et al. | Jul 2014 | B2 |
8789757 | Barten | Jul 2014 | B2 |
8789758 | Hawley et al. | Jul 2014 | B2 |
8789759 | Xian et al. | Jul 2014 | B2 |
8794520 | Wang et al. | Aug 2014 | B2 |
8794522 | Ehrhart | Aug 2014 | B2 |
8794525 | Amundsen et al. | Aug 2014 | B2 |
8794526 | Wang et al. | Aug 2014 | B2 |
8798367 | Ellis | Aug 2014 | B2 |
8807431 | Wang et al. | Aug 2014 | B2 |
8807432 | Van Horn et al. | Aug 2014 | B2 |
8820630 | Qu et al. | Sep 2014 | B2 |
8822848 | Meagher | Sep 2014 | B2 |
8824692 | Sheerin et al. | Sep 2014 | B2 |
8824696 | Braho | Sep 2014 | B2 |
8842849 | Wahl et al. | Sep 2014 | B2 |
8844822 | Kotlarsky et al. | Sep 2014 | B2 |
8844823 | Fritz et al. | Sep 2014 | B2 |
8849019 | Li et al. | Sep 2014 | B2 |
D716285 | Chaney et al. | Oct 2014 | S |
8851383 | Yeakley et al. | Oct 2014 | B2 |
8854633 | Laffargue | Oct 2014 | B2 |
8866963 | Grunow et al. | Oct 2014 | B2 |
8868421 | Braho et al. | Oct 2014 | B2 |
8868519 | Maloy et al. | Oct 2014 | B2 |
8868802 | Barten | Oct 2014 | B2 |
8868803 | Caballero | Oct 2014 | B2 |
8870074 | Gannon | Oct 2014 | B1 |
8879639 | Sauerwein | Nov 2014 | B2 |
8880426 | Smith | Nov 2014 | B2 |
8881983 | Havens et al. | Nov 2014 | B2 |
8881987 | Wang | Nov 2014 | B2 |
8903172 | Smith | Dec 2014 | B2 |
8908995 | Benos et al. | Dec 2014 | B2 |
8910870 | Li et al. | Dec 2014 | B2 |
8910875 | Ren et al. | Dec 2014 | B2 |
8914290 | Hendrickson et al. | Dec 2014 | B2 |
8914788 | Pettinelli et al. | Dec 2014 | B2 |
8915439 | Feng et al. | Dec 2014 | B2 |
8915444 | Havens et al. | Dec 2014 | B2 |
8916789 | Woodburn | Dec 2014 | B2 |
8918250 | Hollifield | Dec 2014 | B2 |
8918564 | Caballero | Dec 2014 | B2 |
8925818 | Kosecki et al. | Jan 2015 | B2 |
8939374 | Jovanovski et al. | Jan 2015 | B2 |
8942480 | Ellis | Jan 2015 | B2 |
8944313 | Williams et al. | Feb 2015 | B2 |
8944327 | Meier et al. | Feb 2015 | B2 |
8944332 | Harding et al. | Feb 2015 | B2 |
8950678 | Germaine et al. | Feb 2015 | B2 |
D723560 | Zhou et al. | Mar 2015 | S |
8967468 | Gomez et al. | Mar 2015 | B2 |
8971346 | Sevier | Mar 2015 | B2 |
8976030 | Cunningham et al. | Mar 2015 | B2 |
8976368 | El Akel et al. | Mar 2015 | B2 |
8978981 | Guan | Mar 2015 | B2 |
8978983 | Bremer et al. | Mar 2015 | B2 |
8978984 | Hennick et al. | Mar 2015 | B2 |
8985456 | Zhu et al. | Mar 2015 | B2 |
8985457 | Soule et al. | Mar 2015 | B2 |
8985459 | Kearney et al. | Mar 2015 | B2 |
8985461 | Gelay et al. | Mar 2015 | B2 |
8988578 | Showering | Mar 2015 | B2 |
8988590 | Gillet et al. | Mar 2015 | B2 |
8991704 | Hopper et al. | Mar 2015 | B2 |
8996194 | Davis et al. | Mar 2015 | B2 |
8996384 | Funyak et al. | Mar 2015 | B2 |
8998091 | Edmonds et al. | Apr 2015 | B2 |
9002641 | Showering | Apr 2015 | B2 |
9007368 | Laffargue et al. | Apr 2015 | B2 |
9010641 | Qu et al. | Apr 2015 | B2 |
9015513 | Murawski et al. | Apr 2015 | B2 |
9016576 | Brady et al. | Apr 2015 | B2 |
D730357 | Fitch et al. | May 2015 | S |
9022288 | Nahill et al. | May 2015 | B2 |
9030964 | Essinger et al. | May 2015 | B2 |
9033240 | Smith et al. | May 2015 | B2 |
9033242 | Gillet et al. | May 2015 | B2 |
9036054 | Koziol et al. | May 2015 | B2 |
9037344 | Chamberlin | May 2015 | B2 |
9038911 | Xian et al. | May 2015 | B2 |
9038915 | Smith | May 2015 | B2 |
D730901 | Oberpriller et al. | Jun 2015 | S |
D730902 | Fitch et al. | Jun 2015 | S |
D733112 | Chaney et al. | Jun 2015 | S |
9047098 | Barten | Jun 2015 | B2 |
9047359 | Caballero et al. | Jun 2015 | B2 |
9047420 | Caballero | Jun 2015 | B2 |
9047525 | Barber | Jun 2015 | B2 |
9047531 | Showering et al. | Jun 2015 | B2 |
9049640 | Wang et al. | Jun 2015 | B2 |
9053055 | Caballero | Jun 2015 | B2 |
9053378 | Hou et al. | Jun 2015 | B1 |
9053380 | Xian et al. | Jun 2015 | B2 |
9057641 | Amundsen et al. | Jun 2015 | B2 |
9058526 | Powilleit | Jun 2015 | B2 |
9064165 | Havens et al. | Jun 2015 | B2 |
9064167 | Xian et al. | Jun 2015 | B2 |
9064168 | Todeschini et al. | Jun 2015 | B2 |
9064254 | Todeschini et al. | Jun 2015 | B2 |
9066032 | Wang | Jun 2015 | B2 |
9070032 | Corcoran | Jun 2015 | B2 |
D734339 | Zhou et al. | Jul 2015 | S |
D734751 | Oberpriller et al. | Jul 2015 | S |
9082023 | Feng et al. | Jul 2015 | B2 |
20070063048 | Havens et al. | Mar 2007 | A1 |
20090134221 | Zhu et al. | May 2009 | A1 |
20100169678 | Kozuka | Jul 2010 | A1 |
20100177076 | Essinger et al. | Jul 2010 | A1 |
20100177080 | Essinger et al. | Jul 2010 | A1 |
20100177707 | Essinger et al. | Jul 2010 | A1 |
20100177749 | Essinger et al. | Jul 2010 | A1 |
20110169999 | Grunow et al. | Jul 2011 | A1 |
20110202554 | Powilleit et al. | Aug 2011 | A1 |
20120111946 | Golant | May 2012 | A1 |
20120168512 | Kotlarsky et al. | Jul 2012 | A1 |
20120193423 | Samek | Aug 2012 | A1 |
20120203647 | Smith | Aug 2012 | A1 |
20120223141 | Good et al. | Sep 2012 | A1 |
20130043312 | Van Horn | Feb 2013 | A1 |
20130075168 | Amundsen et al. | Mar 2013 | A1 |
20130175341 | Kearney et al. | Jul 2013 | A1 |
20130175343 | Good | Jul 2013 | A1 |
20130257744 | Daghigh et al. | Oct 2013 | A1 |
20130257759 | Daghigh | Oct 2013 | A1 |
20130270346 | Xian et al. | Oct 2013 | A1 |
20130287258 | Kearney | Oct 2013 | A1 |
20130292475 | Kotlarsky et al. | Nov 2013 | A1 |
20130292477 | Hennick et al. | Nov 2013 | A1 |
20130293539 | Hunt et al. | Nov 2013 | A1 |
20130293540 | Laffargue et al. | Nov 2013 | A1 |
20130306728 | Thuries et al. | Nov 2013 | A1 |
20130306731 | Pedrao | Nov 2013 | A1 |
20130307964 | Bremer et al. | Nov 2013 | A1 |
20130308625 | Park et al. | Nov 2013 | A1 |
20130313324 | Koziol et al. | Nov 2013 | A1 |
20130313325 | Wilz et al. | Nov 2013 | A1 |
20130342717 | Havens et al. | Dec 2013 | A1 |
20140001267 | Giordano et al. | Jan 2014 | A1 |
20140002828 | Laffargue et al. | Jan 2014 | A1 |
20140008439 | Wang | Jan 2014 | A1 |
20140025584 | Liu et al. | Jan 2014 | A1 |
20140034734 | Sauerwein | Feb 2014 | A1 |
20140036848 | Pease et al. | Feb 2014 | A1 |
20140039693 | Havens et al. | Feb 2014 | A1 |
20140042814 | Kather et al. | Feb 2014 | A1 |
20140049120 | Kohtz et al. | Feb 2014 | A1 |
20140049635 | Laffargue et al. | Feb 2014 | A1 |
20140061306 | Wu et al. | Mar 2014 | A1 |
20140063289 | Hussey et al. | Mar 2014 | A1 |
20140066136 | Sauerwein et al. | Mar 2014 | A1 |
20140067692 | Ye et al. | Mar 2014 | A1 |
20140070005 | Nahill et al. | Mar 2014 | A1 |
20140071840 | Venancio | Mar 2014 | A1 |
20140074746 | Wang | Mar 2014 | A1 |
20140076974 | Havens et al. | Mar 2014 | A1 |
20140078341 | Havens et al. | Mar 2014 | A1 |
20140078342 | Li et al. | Mar 2014 | A1 |
20140078345 | Showering | Mar 2014 | A1 |
20140098792 | Wang et al. | Apr 2014 | A1 |
20140100774 | Showering | Apr 2014 | A1 |
20140100813 | Showering | Apr 2014 | A1 |
20140103115 | Meier et al. | Apr 2014 | A1 |
20140104413 | McCloskey et al. | Apr 2014 | A1 |
20140104414 | McCloskey et al. | Apr 2014 | A1 |
20140104416 | Giordano et al. | Apr 2014 | A1 |
20140104451 | Todeschini et al. | Apr 2014 | A1 |
20140106594 | Skvoretz | Apr 2014 | A1 |
20140106725 | Sauerwein | Apr 2014 | A1 |
20140108010 | Maltseff et al. | Apr 2014 | A1 |
20140108402 | Gomez et al. | Apr 2014 | A1 |
20140108682 | Caballero | Apr 2014 | A1 |
20140110485 | Toa et al. | Apr 2014 | A1 |
20140114530 | Fitch et al. | Apr 2014 | A1 |
20140124577 | Wang et al. | May 2014 | A1 |
20140124579 | Ding | May 2014 | A1 |
20140125842 | Winegar | May 2014 | A1 |
20140125853 | Wang | May 2014 | A1 |
20140125999 | Longacre et al. | May 2014 | A1 |
20140129378 | Richardson | May 2014 | A1 |
20140131438 | Kearney | May 2014 | A1 |
20140131441 | Nahill et al. | May 2014 | A1 |
20140131443 | Smith | May 2014 | A1 |
20140131444 | Wang | May 2014 | A1 |
20140131445 | Ding et al. | May 2014 | A1 |
20140131448 | Xian et al. | May 2014 | A1 |
20140133379 | Wang et al. | May 2014 | A1 |
20140136208 | Maltseff et al. | May 2014 | A1 |
20140140585 | Wang | May 2014 | A1 |
20140151453 | Meier et al. | Jun 2014 | A1 |
20140152882 | Samek et al. | Jun 2014 | A1 |
20140158770 | Sevier et al. | Jun 2014 | A1 |
20140159869 | Zumsteg et al. | Jun 2014 | A1 |
20140166755 | Liu et al. | Jun 2014 | A1 |
20140166757 | Smith | Jun 2014 | A1 |
20140166759 | Liu et al. | Jun 2014 | A1 |
20140168787 | Wang et al. | Jun 2014 | A1 |
20140175165 | Havens et al. | Jun 2014 | A1 |
20140175172 | Jovanovski et al. | Jun 2014 | A1 |
20140191644 | Chaney | Jul 2014 | A1 |
20140191913 | Ge et al. | Jul 2014 | A1 |
20140197238 | Liu et al. | Jul 2014 | A1 |
20140197239 | Havens et al. | Jul 2014 | A1 |
20140197304 | Feng et al. | Jul 2014 | A1 |
20140203087 | Smith et al. | Jul 2014 | A1 |
20140204268 | Grunow et al. | Jul 2014 | A1 |
20140214631 | Hansen | Jul 2014 | A1 |
20140217166 | Berthiaume et al. | Aug 2014 | A1 |
20140217180 | Liu | Aug 2014 | A1 |
20140231500 | Ehrhart et al. | Aug 2014 | A1 |
20140232930 | Anderson | Aug 2014 | A1 |
20140237015 | Bruins et al. | Aug 2014 | A1 |
20140247315 | Marty et al. | Sep 2014 | A1 |
20140263493 | Amurgis et al. | Sep 2014 | A1 |
20140263645 | Smith et al. | Sep 2014 | A1 |
20140270196 | Braho et al. | Sep 2014 | A1 |
20140270229 | Braho | Sep 2014 | A1 |
20140278387 | DiGregorio | Sep 2014 | A1 |
20140282210 | Bianconi | Sep 2014 | A1 |
20140284384 | Lu et al. | Sep 2014 | A1 |
20140288933 | Braho et al. | Sep 2014 | A1 |
20140297058 | Barker et al. | Oct 2014 | A1 |
20140299665 | Barber et al. | Oct 2014 | A1 |
20140312121 | Lu et al. | Oct 2014 | A1 |
20140319220 | Coyle | Oct 2014 | A1 |
20140319221 | Oberpriller et al. | Oct 2014 | A1 |
20140326787 | Barten | Nov 2014 | A1 |
20140332590 | Wang et al. | Nov 2014 | A1 |
20140344943 | Todeschini et al. | Nov 2014 | A1 |
20140346233 | Liu et al. | Nov 2014 | A1 |
20140351317 | Smith et al. | Nov 2014 | A1 |
20140353373 | Van Horn et al. | Dec 2014 | A1 |
20140361073 | Qu et al. | Dec 2014 | A1 |
20140361082 | Xian et al. | Dec 2014 | A1 |
20140362184 | Jovanovski et al. | Dec 2014 | A1 |
20140363015 | Braho | Dec 2014 | A1 |
20140369511 | Sheerin et al. | Dec 2014 | A1 |
20140374483 | Lu | Dec 2014 | A1 |
20140374485 | Xian et al. | Dec 2014 | A1 |
20150001301 | Ouyang | Jan 2015 | A1 |
20150001304 | Todeschini | Jan 2015 | A1 |
20150003673 | Fletcher | Jan 2015 | A1 |
20150009338 | Laffargue et al. | Jan 2015 | A1 |
20150009610 | London et al. | Jan 2015 | A1 |
20150014416 | Kotlarsky et al. | Jan 2015 | A1 |
20150021397 | Rueblinger et al. | Jan 2015 | A1 |
20150028102 | Ren et al. | Jan 2015 | A1 |
20150028103 | Jiang | Jan 2015 | A1 |
20150028104 | Ma et al. | Jan 2015 | A1 |
20150029002 | Yeakley et al. | Jan 2015 | A1 |
20150032709 | Maloy et al. | Jan 2015 | A1 |
20150039309 | Braho et al. | Feb 2015 | A1 |
20150040378 | Saber et al. | Feb 2015 | A1 |
20150048168 | Fritz et al. | Feb 2015 | A1 |
20150049347 | Laffargue et al. | Feb 2015 | A1 |
20150051992 | Smith | Feb 2015 | A1 |
20150053766 | Havens et al. | Feb 2015 | A1 |
20150053768 | Wang et al. | Feb 2015 | A1 |
20150053769 | Thuries et al. | Feb 2015 | A1 |
20150062366 | Liu et al. | Mar 2015 | A1 |
20150063215 | Wang | Mar 2015 | A1 |
20150063676 | Lloyd et al. | Mar 2015 | A1 |
20150069130 | Gannon | Mar 2015 | A1 |
20150071819 | Todeschini | Mar 2015 | A1 |
20150083800 | Li et al. | Mar 2015 | A1 |
20150086114 | Todeschini | Mar 2015 | A1 |
20150088522 | Hendrickson et al. | Mar 2015 | A1 |
20150096872 | Woodburn | Apr 2015 | A1 |
20150099557 | Pettinelli et al. | Apr 2015 | A1 |
20150100196 | Hollifield | Apr 2015 | A1 |
20150102109 | Huck | Apr 2015 | A1 |
20150103767 | Kim et al. | Apr 2015 | A1 |
20150115035 | Meier et al. | Apr 2015 | A1 |
20150127791 | Kosecki et al. | May 2015 | A1 |
20150128116 | Chen et al. | May 2015 | A1 |
20150129659 | Feng et al. | May 2015 | A1 |
20150133047 | Smith et al. | May 2015 | A1 |
20150134470 | Hejl et al. | May 2015 | A1 |
20150136851 | Harding et al. | May 2015 | A1 |
20150136854 | Lu et al. | May 2015 | A1 |
20150142492 | Kumar | May 2015 | A1 |
20150144692 | Hejl | May 2015 | A1 |
20150144698 | Teng et al. | May 2015 | A1 |
20150144701 | Xian et al. | May 2015 | A1 |
20150149946 | Benos et al. | May 2015 | A1 |
20150156717 | Narasimha | Jun 2015 | A1 |
20150161429 | Xian | Jun 2015 | A1 |
20150169925 | Chen et al. | Jun 2015 | A1 |
20150169929 | Williams et al. | Jun 2015 | A1 |
20150186703 | Chen et al. | Jul 2015 | A1 |
20150193644 | Kearney et al. | Jul 2015 | A1 |
20150193645 | Colavito et al. | Jul 2015 | A1 |
20150199957 | Funyak et al. | Jul 2015 | A1 |
20150204671 | Showering | Jul 2015 | A1 |
20170055195 | Ingale | Feb 2017 | A1 |
Number | Date | Country |
---|---|---|
2013163789 | Nov 2013 | WO |
2013173985 | Nov 2013 | WO |
2014019130 | Feb 2014 | WO |
2014110495 | Jul 2014 | WO |
Entry |
---|
Microsoft; “Intelligent Offload to Improve Battery Lifetime of Mobile Devices”, downloaded Nov. 25, 2015 from http://www.doc.ic.ac.uk/icep/presentations/ranveer-chandra.pdf; 67 pages. |
U.S. Appl. No. 13/367,978, filed Feb. 7, 2012, (Feng et al.); now abandoned. |
U.S. Appl. No. 14/462,801 for Mobile Computing Device With Data Cognition Software, filed Aug. 19, 2014 (Todeschini et al.); 38 pages. |
U.S. Appl. No. 14/596,757 for System and Method for Detecting Barcode Printing Errors filed Jan. 14, 2015 (Ackley); 41 pages. |
U.S. Appl. No. 14/277,337 for Multipurpose Optical Reader, filed May 14, 2014 (Jovanovski et al.); 59 pages. |
U.S. Appl. No. 14/200,405 for Indicia Reader for Size-Limited Applications filed Mar. 7, 2014 (Feng et al.); 42 pages. |
U.S. Appl. No. 14/662,922 for Multifunction Point of Sale System filed Mar. 19, 2015 (Van Horn et al.); 41 pages. |
U.S. Appl. No. 14/446,391 for Multifunction Point of Sale Apparatus With Optical Signature Capture filed Jul. 30, 2014 (Good et al.); 37 pages. |
U.S. Appl. No. 29/528,165 for In-Counter Barcode Scanner filed May 27, 2015 (Oberpriller et al.); 13 pages. |
U.S. Appl. No. 29/528,890 for Mobile Computer Housing filed Jun. 2, 2015 (Fitch et al.); 61 pages. |
U.S. Appl. No. 14/614,796 for Cargo Apportionment Techniques filed Feb. 5, 2015 (Morton et al.); 56 pages. |
U.S. Appl. No. 29/516,892 for Table Computer filed Feb. 6, 2015 (Bidwell et al.); 13 pages. |
U.S. Appl. No. 29/523,098 for Handle for a Tablet Computer filed Apr. 7, 2015 (Bidwell et al.); 17 pages. |
U.S. Appl. No. 14/578,627 for Safety System and Method filed Dec. 22, 2014 (Ackley et al.); 32 pages. |
U.S. Appl. No. 14/573,022 for Dynamic Diagnostic Indicator Generation filed Dec. 17, 2014 (Goldsmith); 43 pages. |
U.S. Appl. No. 14/529,857 for Barcode Reader With Security Features filed Oct. 31, 2014 (Todeschini et al.); 32 pages. |
U.S. Appl. No. 14/519,195 for Handheld Dimensioning System With Feedback filed Oct. 21, 2014 (Laffargue et al.); 39 pages. |
U.S. Appl. No. 14/519,211 for System and Method for Dimensioning filed Oct. 21, 2014 (Ackley et al.); 33 pages. |
U.S. Appl. No. 14/519,233 for Handheld Dimensioner With Data-Quality Indication filed Oct. 21, 2014 (Laffargue et al.); 36 pages. |
U.S. Appl. No. 14/533,319 for Barcode Scanning System Using Wearable Device With Embedded Camera filed Nov. 5, 2014 (Todeschini); 29 pages. |
U.S. Appl. No. 14/748,446 for Cordless Indicia Reader With a Multifunction Coil for Wireless Charging and EAS Deactivation, filed Jun. 24, 2015 (Xie et al.); 34 pages. |
U.S. Appl. No. 29/528,590 for Electronic Device filed May 29, 2015 (Fitch et al.); 9 pages. |
U.S. Appl. No. 14/519,249 for Handheld Dimensioning System With Measurement-Conformance Feedback filed Oct. 21, 2014 (Ackley et al.); 36 pages. |
U.S. Appl. No. 29/519,017 for Scanner filed Mar. 2, 2015 (Zhou et al.); 11 pages. |
U.S. Appl. No. 14/398,542 for Portable Electronic Devices Having a Separate Location Trigger Unit for Use in Controlling an Application Unit filed Nov. 3, 2014 (Bian et al.); 22 pages. |
U.S. Appl. No. 14/405,278 for Design Pattern for Secure Store filed Mar. 9, 2015 (Zhu et al.); 23 pages. |
U.S. Appl. No. 14/590,024 for Shelving and Package Locating Systems for Delivery Vehicles filed Jan. 6, 2015 (Payne); 31 pages. |
U.S. Appl. No. 14/568,305 for Auto-Contrast Viewfinder for an Indicia Reader filed Dec. 12, 2014 (Todeschini); 29 pages. |
U.S. Appl. No. 29/526,918 for Charging Base filed May 14, 2015 (Fitch et al.); 10 pages. |
U.S. Appl. No. 14/580,262 for Media Gate for Thermal Transfer Printers filed Dec. 23, 2014 (Bowles); 36 pages. |
Extended European Search Report in counterpart European Application No. 16185191.0 dated Dec. 19, 2016, pp. 1-7. |
U.S. Appl. No. 14/519,179 for Dimensioning System With Multipath Interference Mitigation filed Oct. 21, 2014 (Thuries et al.); 30 pages. |
U.S. Appl. No. 14/264,173 for Autofocus Lens System for Indicia Readers filed Apr. 29, 2014, (Ackley et al.); 39 pages. |
U.S. Appl. No. 14/453,019 for Dimensioning System With Guided Alignment, filed Aug. 6, 2014 (Li et al.); 31 pages. |
U.S. Appl. No. 14/452,697 for Interactive Indicia Reader , filed Aug. 6, 2014, (Todeschini); 32 pages. |
U.S. Appl. No. 14/231,898 for Hand-Mounted Indicia-Reading Device with Finger Motion Triggering filed Apr. 1, 2014 (Van Horn et al.); 36 pages. |
U.S. Appl. No. 14/715,916 for Evaluating Image Values filed May 19, 2015 (Ackley); 60 pages. |
U.S. Appl. No. 14/513,808 for Identifying Inventory Items in a Storage Facility filed Oct. 14, 2014 (Singel et al.); 51 pages. |
U.S. Appl. No. 29/458,405 for an Electronic Device, filed Jun. 19, 2013 (Fitch et al.); 22 pages. |
U.S. Appl. No. 29/459,620 for an Electronic Device Enclosure, filed Jul. 2, 2013 (London et al.); 21 pages. |
U.S. Appl. No. 14/483,056 for Variable Depth of Field Barcode Scanner filed Sep. 10, 2014 (McCloskey et al.); 29 pages. |
U.S. Appl. No. 14/531,154 for Directing an Inspector Through an Inspection filed Nov. 3, 2014 (Miller et al.); 53 pages. |
U.S. Appl. No. 29/525,068 for Tablet Computer With Removable Scanning Device filed Apr. 27, 2015 (Schulte et al.); 19 pages. |
U.S. Appl. No. 29/468,118 for an Electronic Device Case, filed Sep. 26, 2013 (Oberpriller et al.); 44 pages. |
U.S. Appl. No. 14/340,627 for an Axially Reinforced Flexible Scan Element, filed Jul. 25, 2014 (Reublinger et al.); 41 pages. |
U.S. Appl. No. 14/676,327 for Device Management Proxy for Secure Devices filed Apr. 1, 2015 (Yeakley et al.); 50 pages. |
U.S. Appl. No. 14/257,364 for Docking System and Method Using Near Field Communication filed Apr. 21, 2014 (Showering); 31 pages. |
U.S. Appl. No. 14/327,827 for a Mobile-Phone Adapter for Electronic Transactions, filed Jul. 10, 2014 (Hejl); 25 pages. |
U.S. Appl. No. 14/334,934 for a System and Method for Indicia Verification, filed Jul. 18, 2014 (Hejl); 38 pages. |
U.S. Appl. No. 29/530,600 for Cyclone filed Jun. 18, 2015 (Vargo et al); 16 pages. |
U.S. Appl. No. 14/707,123 for Application Independent DEX/UCS Interface filed May 8, 2015 (Pape); 47 pages. |
U.S. Appl. No. 14/283,282 for Terminal Having Illumination and Focus Control filed May 21, 2014 (Liu et al.); 31 pages. |
U.S. Appl. No. 14/619,093 for Methods for Training a Speech Recognition System filed Feb. 11, 2015 (Pecorari); 35 pages. |
U.S. Appl. No. 29/524,186 for Scanner filed Apr. 17, 2015 (Zhou et al.); 17 pages. |
U.S. Appl. No. 14/705,407 for Method and System to Protect Software-Based Network-Connected Devices From Advanced Persistent Threat filed May 6, 2015 (Hussey et al.); 42 pages. |
U.S. Appl. No. 14/614,706 for Device for Supporting an Electronic Tool on a User's Hand filed Feb. 5, 2015 (Oberpriller et al.); 33 pages. |
U.S. Appl. No. 14/628,708 for Device, System, and Method for Determining the Status of Checkout Lanes filed Feb. 23, 2015 (Todeschini); 37 pages. |
U.S. Appl. No. 14/704,050 for Intermediate Linear Positioning filed May 5, 2015 (Charpentier et al.); 60 pages. |
U.S. Appl. No. 14/529,563 for Adaptable Interface for a Mobile Computing Device filed Oct. 31, 2014 (Schoon et al.); 36 pages. |
U.S. Appl. No. 14/705,012 for Hands-Free Human Machine Interface Responsive to a Driver of a Vehicle filed May 6, 2015 (Fitch et al.); 44 pages. |
U.S. Appl. No. 14/715,672 for Augumented Reality Enabled Hazard Display filed May 19, 2015 (Venkatesha et al.); 35 pages. |
U.S. Appl. No. 14/695,364 for Medication Management System filed Apr. 24, 2015 (Sewell et al.); 44 pages. |
U.S. Appl. No. 14/664,063 for Method and Application for Scanning a Barcode With a Smart Device While Continuously Running and Displaying an Application on the Smart Device Display filed Mar. 20, 2015 (Todeschini); 37 pages. |
U.S. Appl. No. 14/735,717 for Indicia-Reading Systems Having an Interface With a User's Nervous System filed Jun. 10, 2015 (Todeschini); 39 pages. |
U.S. Appl. No. 14/527,191 for Method and System for Recognizing Speech Using Wildcards in an Expected Response filed Oct. 29, 2014 (Braho et al.); 45 pages. |
U.S. Appl. No. 14/702,110 for System and Method for Regulating Barcode Data Injection Into a Running Application on a Smart Device filed May 1, 2015 (Todeschini et al.); 38 pages. |
U.S. Appl. No. 14/535,764 for Concatenated Expected Responses for Speech Recognition filed Nov. 7, 2014 (Braho et al.); 51 pages. |
U.S. Appl. No. 14/687,289 for System for Communication Via a Peripheral Hub filed Apr. 15, 2015 (Kohtz et al.); 37 pages. |
U.S. Appl. No. 14/747,197 for Optical Pattern Projector filed Jun. 23, 2015 (Thuries et al.); 33 pages. |
U.S. Appl. No. 14/674,329 for Aimer for Barcode Scanning filed Mar. 31, 2015 (Bidwell); 36 pages. |
U.S. Appl. No. 14/702,979 for Tracking Battery Conditions filed May 4, 2015 (Young et al.); 70 pages. |
U.S. Appl. No. 29/529,441 for Indicia Reading Device filed Jun. 8, 2015 (Zhou et al.); 14 pages. |
U.S. Appl. No. 14/747,490 for Dual-Projector Three-Dimensional Scanner filed Jun. 23, 2015 (Jovanovski et al.); 40 pages. |
U.S. Appl. No. 14/740,320 for Tactile Switch for a Mobile Electronic Device filed Jun. 16, 2015 (Barndringa); 38 pages. |
U.S. Appl. No. 14/695,923 for Secure Unattended Network Authentication filed Apr. 24, 2015 (Kubler et al.); 52 pages. |
U.S. Appl. No. 14/740,373 for Calibrating a Volume Dimensioner filed Jun. 16, 2015 (Ackley et al.); 63 pages. |
Number | Date | Country | |
---|---|---|---|
20170064634 A1 | Mar 2017 | US |