Integrated airport domain awareness response system, system for ground-based transportable defense of airports against manpads, and methods

Information

  • Patent Grant
  • 8274424
  • Patent Number
    8,274,424
  • Date Filed
    Friday, February 26, 2010
    14 years ago
  • Date Issued
    Tuesday, September 25, 2012
    12 years ago
Abstract
Embodiments of an apparatus and method for defending a physical zone from airborne and ground-based threats are disclosed. In the various embodiments, an apparatus includes a detection component configured to detect and track a ground-based or airborne threat proximate to the physical zone, an integration component to receive data from the detection component and process the data to determine a threat assessment. A defensive component receives the determined threat assessment and disables the ground-based and airborne threat based upon the determined threat assessment. A method includes detecting an object proximate to the physical zone to be protected, identifying the object as a hostile threat, determining at least one of a path and a point-of-origin for the object, and actuating a defensive system in response to the hostile threat.
Description
TECHNICAL FIELD

Embodiments pertain to air traffic management for commercial and military airport environments. Embodiments also pertain to responding to threats in commercial and military airport environments.


BACKGROUND

One problem with current air traffic management in commercial and military airport environments is the lack of available and consistent situational awareness and response capability in and around airports and airbases. Individual systems exist that perform independent functions, but they do not work in a collaborative environment. This could lead to an inability to respond to various threats in a timely manner.


Thus there are general needs for an Integrated Airport Domain Awareness and Response System and Method that integrates individual systems, operates collaboratively, and responds to various threats in a timely manner. There are also general needs for a system for Ground-Based Transportable Defense of Airports against man-portable air-defense systems (MANPADS) to provide airspace security for high profile events like the Olympics, for overseas military and logistics bases, and for the destinations of VIP aircraft such as Air Force One.


SUMMARY

An apparatus and method for defending a physical zone from airborne and ground-based threats are described. In an aspect, an apparatus may include a detection component configured to detect and track a ground-based or airborne threat proximate to the physical zone, an integration component to receive data from the detection component and process the data to determine a threat assessment. A defensive component receives the determined threat assessment and disables the ground-based and airborne threat based upon the determined threat assessment. In another aspect, a method may include detecting an object proximate to the physical zone to be protected, identifying the object as a hostile threat, determining at least one of a path and a point-of-origin for the object, and actuating a defensive system in response to the hostile threat.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a diagrammatic block view of an Integrated Airport Domain Awareness and Response System (IADARS) according to the various embodiments;



FIG. 2 is a diagrammatic block diagram of an integration system according to the various embodiments;



FIG. 3 is a diagrammatic block view of a processing unit of the integration system FIG. 2 according to the various embodiments; and



FIG. 4 is a flowchart that describes a method of protecting a physical zone from airborne and ground-based hostile threats, according to the various embodiments.





DETAILED DESCRIPTION

The following description and the drawings sufficiently illustrate the various embodiments to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. Accordingly, the examples described herein merely typify possible variations. Individual components and functions may be optional, and the sequence of operations may also vary. Portions and features of the various embodiments may be included in, or substituted for, those of other embodiments. Therefore, the various embodiments as set forth in the claims are to be interpreted as encompassing all available equivalents of those claims.


The various embodiments provide an Integrated Airport Domain Awareness and Response System (IADARS) and methods that provide increased situational awareness and response time reduction when external threats are directed to a protected location or zone. For example, the protected location may include a commercial airport, a military base, a nuclear facility, or other sensitive locations and their immediate environs. In the various embodiments, the IADARS may provide data generation and analysis, information sharing and knowledge in a persistent, three-dimensional infrastructure that enhances situational awareness and response capability. Through shared resources and data management and storage, both real-time and post-event forensic capability become available. Infrastructure costs and user workload are also reduced through common subsystems.



FIG. 1 is a diagrammatic block view of an Integrated Airport Domain Awareness and Response System (IADARS) 10 according to the various embodiments. The IADARS 10 may include a ground detection component 12 that is configured to detect an intrusion of a physical perimeter positioned at least partially around a protected location. Accordingly, the ground detection component 12 may include an optical detection capability, which may include video motion detection (VMD) cameras that are configured to record optical images when objects within a field-of-view of the VMD camera change. The optical detection capability may also include pan-tilt-zoom (PTZ) cameras that are configured to be steered towards a desired position proximate to the protected location, and provide a field-of-view at various levels of magnification. The ground detection component 12 may also include a motion detection capability that may include thermal motion detection devices, vibration detection devices or other suitable motion detection devices. The motion detection capability may therefore be located on or within a ground surface proximate to the physical perimeter, or it may be incorporated into structures positioned proximate to the physical perimeter. For example, the motion detection capability may be incorporated in an instrumented security fence positioned proximate to the physical perimeter. One suitable example of an instrumented security fence is disclosed in detail in U.S. Pat. No. 6,731,210 to Swanson, et al., and entitled “SYSTEM AND METHOD FOR DETECTING, LOCALIZING, OR CLASSIFYING A DISTURBANCE USING A WAVEGUIDE SENSOR SYSTEM”, which patent is herein incorporated by reference. The motion detection capability may include various radar systems configured to provide radar surveillance proximate to the physical perimeter, and which may further provide radar surveillance of at least a portion of the airspace adjacent the physical perimeter. Information obtained from the foregoing optical and motion detection capabilities may be processed by an associated command and control (C2) apparatus that is configured to process the information. One example of the ground detection component 12 is the Perimeter Intrusion Detection System (PIDS), available from the Raytheon Company, Network Centric Systems Division of McKinney, Tex., although other suitable alternatives exist. Briefly, the PIDS comprises a grid of sensors configured to detect and image unauthorized physical perimeter intrusions by terrestrial objects, such as ground vehicles and persons. The PIDS is configured to monitor and validate intrusion indications, and to facilitate the planning and execution of a directed response to the intrusion.


The IADARS 10 may also include an airspace detection component 14, such as a radar-based air-traffic control (ATC) system. The ATC system may include, for example, a system operable to provide radar surveillance of an airspace and to provide positive control of flight vehicles within the radar-monitored airspace. In the various embodiments, the ATC system may be configured to monitor an airport terminal airspace environment using at least one of a control tower (CT) facility, a Terminal Radar Approach Control (TRACON) facility, a Flight Service Station (FSS) or an Air Route Traffic Control Center (ARTCC). Briefly, and in general terms, the ATC system is configured to monitor and direct approaching and departing aircraft in the airport terminal airspace environment in order to ensure the safety of traffic within the immediate airport terminal airspace, or in other airspace environments, which may include Class B, Class C or Class D airspaces. Other outlying airspace areas, such as Classes A, E, F and G may also be monitored by radar systems associated with the ATC system. The ATC system may also be configured to identify flight vehicles and track flight vehicle positions by primary (e.g., skin-painting) radars and secondary surveillance radar (SSR), such as the Air Traffic Control Radar Beacon System (ATCRBS), which relies upon an aircraft-based transponder that is configured to transmit (e.g., “squawk”) signals that include pertinent flight-related information in response to signals from an interrogating ground-based radar.


The IADARS 10 may further include an airspace threat defense component 16 that includes an array of sensors positioned at various locations that may be located within the physical perimeter, adjacent to the physical perimeter, or positioned at a distance from the physical perimeter. Each of the sensors in the array of sensors is configured to detect an airborne object moving across a field-of-view of the sensor. Accordingly, the sensors may be located on a surface of the earth, or positioned on a structure, or even positioned on a terrestrial vehicle so that the array may be readily reconfigured, if desired. In any case, each of sensors in the array of sensors is generally positioned to view a portion of an airspace adjacent to the sensor. In accordance with the various embodiments, the array of sensors may include optical sensors or infrared sensors. Information obtained from the array of sensors may be communicated to a communications and control (C2) apparatus that is configured to process the information and to provide direction and instructions to a directed energy device configured to interfere with the operation of a flight vehicle that is within or approaching the physical perimeter without authorization. For example, the directed energy device may include a directed microwave device that is configured to project microwave energy towards the unauthorized flight vehicle and disable a guidance system associated with the flight vehicle. Accordingly, the strength of an emission may be configured to affect a front end portion of a guidance system receiver, or to enter through other portions of the unauthorized flight vehicle, such as through seams between body portions of the unauthorized flight vehicle, or even through a body portion of the unauthorized vehicle. The emission of the directed energy device may also be suitably modulated to interfere with the unauthorized flight vehicle. One example of an airspace threat defense component 16 is the VIGILANT EAGLE Airport Defense System, available from the Raytheon Company, Missile Systems Division of Tucson Ariz., although other suitable alternatives exist. The VIGILANT EAGLE Airport Defense System may be configured to defeat airborne threats such as a shoulder-fired surface-to-air missiles (SAMs), or Man-Portable Air-Defense Systems (MANPADS), or from actively-guided (e.g., piloted) aircraft or remotely-guided aircraft using high-power microwave (HPM) interference from a focused microwave beam directed at the airborne threat. The VIGILANT EAGLE Airport Defense System may therefore include a distributed Missile Detect-and-Track (MDT) apparatus having a grid of passive airspace detection sensors for tracking airborne threats. VIGILANT EAGLE may also include a command and control (C2) system that receives information from the grid of passive airspace detection sensors and to communicate commands that steer the HPM beam. An Active Electronically Scanned Array (AESA) may be provided to direct the beam, which generally includes a billboard-size array of antennas that are linked to solid-state amplifiers.


The IADARS 10 may include a ground threat defense component 18 that includes a directed beam device that is configured to provide directed energy in response to an unauthorized physical perimeter intrusion by terrestrial objects, such as ground vehicles and personnel. In accordance with the various embodiments, the directed beam device may include an apparatus that is configured to provide a measured (e.g., a non-lethal) response to the unauthorized physical perimeter intrusion, so that the unauthorized ground vehicle or the personnel may be incapacitated when exposed to the directed energy. Alternatively, the directed beam device may be configured to provide a lethal response to an unauthorized perimeter intrusion by ground vehicles and personnel. Accordingly, the directed beam device may be configured to provide directed electromagnetic radiation, such as directed microwave energy, towards ground vehicles and personnel that approach or penetrate the physical perimeter. The directed beam device may also be configured to direct acoustic radiation towards ground vehicles and personnel that approach or penetrate the physical perimeter. Alternatively, the directed beam device may be configured to provide a lethal response to an unauthorized perimeter intrusion. One example of a directed beam device may include the SILENT GUARDIAN Protection System, available from the Raytheon Company, Missile Systems Division of Tucson Ariz., although other suitable alternatives exist. The SILENT GUARDIAN Protection System includes a source of microwave energy that is coupled to a directed antenna that is configured to focus the microwave energy towards unauthorized intruders that may be penetrating or threatening to penetrate the physical perimeter. Since the microwave energy has limited tissue penetration, the SILENT GUARDIAN Protection System is generally non-lethal since it principally generates an intolerable tissue heating effect in the unauthorized intruder. In still other embodiments, the ground defense system 18 may also include a propelled projectile weapon, such as the Phalanx Close-In Weapon System (CIWS), available from the Raytheon Company of Waltham, Mass., although other alternatives exist.


Still referring to FIG. 1, The IADARS 10 may include an integration system 20 that may be operably coupled to the ground detection component 12, the airspace detection component 14, the airspace threat defense component 16, and the ground threat defense component 18 to exchange information with the ground detection component 12, the airspace detection component 14, the airspace threat defense component 16, and the ground threat defense component 18. Briefly, the integration system 20 is operable to process data received from the ground detection component 12, the airspace detection component 14, the airspace threat defense component 16, and the ground threat defense component 18, to coordinate a suitable response to a perceived threat, activate the response and to provide a communications link to one or more law enforcement agencies. Accordingly, the integration system 20 leverages the capabilities of the ground detection component 12, the airspace detection component 14, the airspace threat defense component 16, and the ground threat defense component 18 so that enhanced data generation and analysis may be performed, vital information may be directed where required, and a persistent three-dimensional infrastructure may be provided. The integration system 20 may include a fixed-base-of-operation, such as in a building within or adjacent to the physical perimeter, or it may be remotely positioned relative to the physical perimeter. Further, the integration system 20 may be remotely positionable to provide for protection of a physical perimeter determined to require protection from an airborne or a ground threat. Examples of physical perimeters that might warrant protection from airborne or a ground threats may include sporting events (e.g., events conducted in connection with the International Olympic Games), or other public or private events that may be vulnerable to airborne or ground threats. The integration system 20 will be discussed in greater detail below.



FIG. 2 is a diagrammatic block diagram of an integration system 20 according to the various embodiments. The integration system 20 may include a processing unit 22 that is configured to receive data and programmed instructions, and to process the data according to the received instructions. Accordingly, the processing unit 22 may be comprised of any suitable general-purpose computational apparatus and operating system, although a special-purpose computational apparatus (e.g., a dedicated apparatus) and operating system may also be used. The processing unit 22 may be coupled to a data interface 24 that is configured to receive a plurality of input signals 26 generated by at least one of the ground detection component 12, the airspace detection component 14, the airspace threat defense component 16, and the ground threat defense component 18 shown in FIG. 1. Accordingly, the data interface 24 may be configured to receive the signals 26 in differing formats and at different data rates, and to buffer and/or appropriately format the signals 26 so that they may be processed by the processing unit 22. Similarly, the data interface 20 may also be configured to receive information from the processing unit 22, and to buffer and/or appropriately format the information so that suitable output signals 28 may be provided to at least one of the ground detection component 12, the airspace detection component 14, the airspace threat defense component 16, and the ground threat defense component 18 of FIG. 1. The processing unit 22 may also be coupled to a communications interface 30 that is operable to receive information from the processing unit 22, and to generate one or more output signals 32 that may be directed to an outside agency. For example, the outside agencies may include various law enforcement agencies that may be required to counter the threat. Accordingly, the output signals 32 may include digital data that may be communicated by encrypted means, if desired, and communicated by a wired or a wireless communications link.


The integration unit 20 may also include a display device 34 that is configured to present visual information generated by the processing unit 22 to a system operator. The display device 34 may be operably coupled to one or more pointing devices 36 that allow the system operator to enter commands to the processing unit 22 based upon the visual information presented on the display device 34. A data storage device 38 may also be coupled to the processing unit 22 so that data received from the data interface 24 and information processed by the processing unit 22 may be stored for later review, or for later forensic analysis, if needed.


With reference now to FIG. 3, various details of a processing unit 40 that may be used in connection with the integration unit 20 of FIG. 2 will now be described. In the discussion that follows, it is understood that many of the details of the processing unit 40 may be omitted in the interest of brevity, and in the interest of clarity of description. The processing unit 40 may include a general purpose central processing unit (CPU) 42 that is coupled to a communications bus 44 that is further suitably configured to communicate information between the CPU 42 and various computational units, which will now be described in greater detail. A triangulation unit 46 may be coupled to the CPU 42 that may receive suitably processed information from at least one of the ground detection component 12, the airspace detection component 14, the airspace threat defense component 16, and the ground threat defense component 18 shown in FIG. 1 so that a three-dimensional representation of a path of a flight vehicle operating within an airspace region within (or even proximate to) the physical perimeter may be generated. Similarly, a three-dimensional representation for any detected threat may also be computed. Accordingly, the triangulation unit 46 may also be configured to compute a point of origin for the potential threat (e.g., a launching point for a MANPADS) and may also compute a projected point of impact with one or more air vehicles operating within the airspace with authorization. The triangulation unit 46 may further be configured to calculate objects other than a MANPADS, such as an artillery or mortar shell directed into the physical perimeter.


The processing unit 40 may also include a threat assessment unit 48 coupled to the CPU 42 that may also receive suitably processed information from at least one of the ground detection component 12, the airspace detection component 14, the airspace threat defense component 16, and the ground threat defense component 18 shown in FIG. 1 so that a real-time assessment of a threat may be determined. For example, the threat assessment unit 48 may be operable to determine if a detected object is a hostile threat. For example, the threat assessment unit 48 may utilize a trajectory of a detected object, a point of origin of the detected object, a speed of the detected object, the absence of a recognized transponder code from the detected object, or any combination of the foregoing, in addition to other information, in assessing a possible threat. An image generation unit 50 may also be coupled to the CPU 42 through the communications bus 44. The image generation unit 44 may receive information from at least one of the triangulation unit 46 and the threat assessment unit 48 and to suitably process the information for presentation on the display device of FIG. 2. An external surveillance unit 52 may also be coupled to the CPU 42 through the communications bus 44. The external surveillance unit 52 may receive point of origin information from at least the triangulation unit 46, and may be operable to activate optical cameras positioned proximate to a computed point of origin of a possible threat. The external surveillance unit 52 may also be configured to activate optical cameras positioned proximate to a detected ground threat. For example, since the ground detection component 12 (FIG. 1) may include motion detection devices (e.g., thermal motion detection devices and/or vibration detection devices) the external surveillance unit 52 may activate and view an area proximate to the detected ground threat.



FIG. 4 is a flowchart that will be used to describe a method 60 of protecting a physical zone from airborne and ground-based hostile threats, according to the various embodiments. At 62, an object that is proximate to a physical zone that is to be protected is detected. The detection of the object may employ at least one of radar detection of the object, optical detection of the object using one or more optical sensors, infrared detection using one or more infrared sensors, and motion detection using a vibration or infrared motion detection device. The object may include an airborne object, such as an aircraft, a MANPADS, or a ground-based object, such as personnel or a terrestrial vehicle. At 64, the object is identified as a hostile threat to the zone to be protected. For example, the identification may be based upon the absence of a radar transponder signal, or optical or infrared identification. At 66, at least one of a flight or a ground path of the object may be determined, and a point-of origin of the object may be determined. Additionally, a projected point-of-impact of the object and an authorized vehicle or location within the zone may also be determined. At 68, a defensive system may be actuated in response to the hostile threat. The defensive system may include, for example, a directed energy weapon that directs focused energy towards the hostile threat. Alternatively, the defensive system may include a propelled projectile weapon system.


The Abstract is provided to comply with 37 C.F.R. Section 1.72(b) requiring an abstract that will allow the reader to ascertain the nature and gist of the technical disclosure. It is submitted with the understanding that it will not be used to limit or interpret the scope or meaning of the claims. The following claims are hereby incorporated into the detailed description, with each claim standing on its own as a separate embodiment.

Claims
  • 1. An Integrated Airport Domain Awareness and Response System (IADARS), comprising: a ground detection component having at least one of an optical detection capability, a motion detection capability and a radar detection capability positioned proximate to the airport domain and configured to detect a ground-based threat to the airport domain;an airspace detection component operable to determine a range and a track of a flight vehicle proximate to the airport domain and configured to detect an airborne threat to the airport domain;an integration component configured to receive information from the ground detection component and the airspace detection component that is operable to assess the threat and determine a response;a ground threat defense component configured to disable the ground-based threat based upon the determined response; andan airspace threat defense component configured to disable the airborne threat based upon the determined response.
  • 2. The system of claim 1, wherein: the optical detection capability comprises at least one of a video motion detection (VMD) camera, and a pan-tilt-zoom (PTZ) camera;the motion detection capability comprises at least one of a thermal motion detection device and a vibration detection device; andthe airspace detection component comprises an Air Traffic Control (ATC) system that provides radar-based surveillance proximate to the airport domain.
  • 3. The system of claim 1, wherein the ground detection component is configured to detect the ground-based threat in an intrusion of a physical perimeter.
  • 4. The system of claim 2, wherein the vibration detection device is incorporated into an instrumented security fence that at least partially surrounds the airport domain.
  • 5. The system of claim 1, further comprising a communications and control apparatus configured to receive information from an array of sensors in the airspace threat defense component and to provide direction and instructions based on the information to disable the airborne threat.
  • 6. The system of claim 2, wherein the ATC system comprises at least one of a control tower (CT) facility, a Terminal Radar Approach Control (TRACON) facility, a Flight Service Station (FSS) and an Air Route Traffic Control Center (ARTCC).
  • 7. The system of claim 1, wherein the integration component comprises a processing unit operable to determine at least one of a path, a point of origin, and a projected point of impact for the ground-based threat and the airborne threat by triangulation.
  • 8. The system of claim 7, wherein the integration component comprises a threat assessment unit operable to employ at least one of the path, the point of origin, the projected point of impact, a speed of the ground-based threat and the airborne threat in determining a threat.
  • 9. The system of claim 1, wherein the ground threat defense component comprises a non-lethal directed energy weapon, and the airspace threat defense component comprises a directed energy weapon configured to disable the airborne threat.
  • 10. An apparatus for defending a physical zone from airborne and ground-based threats, comprising: a detection component configured to detect and track a ground-based threat and an airborne threat proximate to the physical zone;an integration component configured to receive data from the detection component and process the data to determine a threat assessment; anda defensive component configured to receive the determined threat assessment and to disable the ground-based threat and the airborne threat proximate to the physical zone based upon the determined threat assessment.
  • 11. The apparatus of claim 10, wherein the detection component comprises at least one of an air surveillance radar system, an optical detection system, an infrared detection system and a vibration detection system.
  • 12. The apparatus of claim 10, wherein the defensive component comprises at least one of a non-lethal directed energy weapon operable to disable the ground-based threat, and a directed energy weapon configured to disable the airborne threat.
  • 13. The apparatus of claim 10, wherein the integration component comprises a processing unit operably coupled to a data interface configured to receive data from the detection component, wherein the processing unit is configured to compute at least one of a path, a point of origin, and a projected point of impact for the ground-based threat and the airborne threat in determining the threat assessment.
  • 14. The apparatus of claim 13, wherein the processing unit is coupled to a communications interface configured receive the determined threat assessment, and to communicate an alert to a law enforcement agency based upon the determined threat assessment.
  • 15. The apparatus of claim 13, wherein: the processing unit is coupled to a display device operable to present visual information representative of the determined threat assessment to a system operator; andthe processing unit is coupled to a data storage device operable to store data received from the data interface and information received from the processing unit.
  • 16. The apparatus of claim 10, wherein the physical zone comprises an airport or a military base or a nuclear facility or a sporting event.
  • 17. A method of protecting a physical zone from airborne and ground-based hostile threats, comprising: detecting and tracking a ground-based object proximate to the physical zone to be protected;detecting and tracking an airborne object proximate to the physical zone to be protected;identifying the ground-based object as a hostile threat directed to the physical zone based on data from detecting and tracking the ground-based object;determining at least one of a path and a point-of-origin for the ground-based object;identifying the airborne object as the hostile threat directed to the physical zone based on data from detecting and tracking the airborne object;determining at least one of a path and a point-of-origin for the airborne object; andactuating a defensive system in response to the hostile threat to disable the hostile threat.
  • 18. The method of claim 17, wherein: detecting and tracking the ground-based object comprises detecting the ground-based object using at least one of radar, an optical sensor, an infrared sensor and a motion detection device; anddetecting and tracking the airborne object comprises detecting the airborne object using at least one of radar, an optical sensor, an infrared sensor and a motion detection device.
  • 19. The method of claim 17, further comprising: determining a projected point-of-impact for the ground-based object;wherein determining at least one of a path and a point-of-origin for the ground-based object comprises determining the path, the point-of-origin and the point-of-impact for the ground-based object by triangulation;determining a projected point-of-impact for the airborne object; andwherein determining at least one of a path and a point-of-origin for the airborne object comprises determining the path, the point-of-origin and the point-of-impact for the airborne object by triangulation.
  • 20. The method of claim 17, wherein actuating a defensive system comprises directing focused energy from a directed energy weapon towards the airborne object or the ground-based object.
CROSS-REFERENCES TO RELATED APPLICATIONS

This application claims the benefit of U.S. Provisional Application No. 61/155,614, filed Feb. 26, 2009, the disclosure of which is incorporated herein by reference in its entirety.

US Referenced Citations (34)
Number Name Date Kind
3378835 Mooney, Jr. et al. Apr 1968 A
3981010 Michelsen Sep 1976 A
4456912 Ensley Jun 1984 A
4647759 Worsham et al. Mar 1987 A
4990919 Manoogian Feb 1991 A
5379676 Profeta et al. Jan 1995 A
5917442 Manoogian Jun 1999 A
RE36944 Li Nov 2000 E
6414622 Rougas Jul 2002 B1
6666401 Mardirossian Dec 2003 B1
6873903 Baiada et al. Mar 2005 B2
6995660 Yannone et al. Feb 2006 B2
7551121 O'Connell et al. Jun 2009 B1
7652234 Shukrun Jan 2010 B2
7714261 Bnayahu et al. May 2010 B2
7791536 Brown et al. Sep 2010 B2
7876258 Abraham et al. Jan 2011 B2
7961133 Vollin et al. Jun 2011 B2
8179310 Westphal May 2012 B2
20030137444 Stone et al. Jul 2003 A1
20040039518 Jasselin Feb 2004 A1
20050187677 Walker Aug 2005 A1
20050259848 Garoutte Nov 2005 A1
20060283317 Melnychuk et al. Dec 2006 A1
20060284050 Busse et al. Dec 2006 A1
20070150127 Wilson, Jr. et al. Jun 2007 A1
20070236382 Dove Oct 2007 A1
20080316101 Brown et al. Dec 2008 A1
20090173788 Moraites et al. Jul 2009 A1
20090260511 Melnychuk et al. Oct 2009 A1
20100042269 Kokkeby et al. Feb 2010 A1
20100253567 Factor et al. Oct 2010 A1
20100283657 Vollin et al. Nov 2010 A1
20110030538 Ahrens et al. Feb 2011 A1
Foreign Referenced Citations (5)
Number Date Country
964381 Dec 1999 EP
WO 9411751 May 1994 WO
WO 2010144105 Dec 2010 WO
WO-2010144105 Jan 2011 WO
WO-2010144105 Mar 2011 WO
Related Publications (1)
Number Date Country
20110030538 A1 Feb 2011 US
Provisional Applications (1)
Number Date Country
61155614 Feb 2009 US