1. Field of the Invention
The present invention relates to an improved system and method for increasing the read range, by a RFID scanner, a reader or an interrogator, of conventional FTX RFID tags.
2. Description of Related Prior Art
As is well known in the art, a RFID tag is a microchip which typically includes an antenna that is packaged in a such way that RFID tag can be applied to a variety of desired objects, animals or possibly human beings. An RFID tag, when receives and picks up an interrogation signal from an associated RFID scanner, reader or interrogator, transmits or sends a return signal(s) back to the RFID scanner, reader or interrogator. The RFID tag contains a data field identification information or encoded data field, e.g., a unique serial number, a unique customer account number, some other unique identifying indicia, etc., which is stored in an area of memory. It is to be appreciated that RFID tags come in many forms, but are typically relatively small and may be either active, passive or semi-passive.
As is well known in the art, RFID tags are commonly injected into pets or other animal animals in order to facilitate positive identification and cross indexing to medical records and other databases. It is possible that such RFID tags may also be incorporated or included as part of a component(s) transplanted into a human being, such as an artificial knee, an artificial hip, etc., and thereby subsequently utilized to identify the serial number, the model number, the date of installation, the manufacturer of the component, etc. Such product information is useful in the event that a defect, in the transplanted component, is eventually discovered and there becomes a need to recall such transplanted component(s).
As is well known in the art, RFID tags are typically interrogated by locating a handheld RFID scanner, reader or interrogator in close proximity to the location where the RFID tag resides, e.g., the area of the animal's skin accommodating the embedded RFID tag for example. The associated RFID scanner, reader or interrogator typically transmits and receives radio waves and is then combined with a digital signal processor that converts the waves into bits of information which can then be deciphered, by internal circuitry of the RFID associated scanner, reader or interrogator, in a conventional manner.
One problem with known prior art scanners and techniques is that they generally require the scanner to be located in very close proximity to the RFID tag, e.g., no more that a few inches or so, in order for the RFID scanner, reader or interrogator to read accurately the information stored on the RFID tag. In addition, many prior art RFID scanners, readers or interrogators typically “interrogate” the RFID tag for only a short duration of time, then turn off for a very short duration of time, and then continuously repeat this interrogation cycle of turning on/off until the data or information, stored in the data field on the RFID tag, is accurately read by the RFID scanner, reader or interrogator. It is to be appreciated that since the RFID scanner, reader or interrogator must be located very close to the RFID tag, it is sometimes quite difficult and time consuming to locate the RFID tag so as to facilitate accurate reading thereof.
The inventor has determined that there are two major factors which limit the useful range of the RFID scanner, reader or interrogator. These factors area (1) the RFID scanner, reader or interrogator has difficulty delivering enough signal, at 134.2 kHz, in order to adequately power the transponder, (2) the RFID scanner, reader or interrogator does not have a sufficient dynamic range in order to detect responses that may be 80 dB or more weaker than the 134.2 kHz carrier signal generated by the RFID scanner, reader or interrogator.
Wherefore, it is an object of the present invention to overcome the above mentioned shortcomings and drawbacks associated with the prior art RFID scanners, readers and interrogators and associated reading techniques for RFID tags.
Another object of the present invention is to provide a system and method which is suitable for activating an RFID tag so that the internal capacitor or transponder, contained within the RFID tag, can be sufficiently excited and energized by the carrier (interrogation) signal of the RFID scanner, reader or interrogator and, thereafter, automatically transmit the encoded data field to the RFID scanner, reader or interrogator so that the encoded data field can be readily read and decipher within a relatively short duration of time.
Another object of the present invention is to increase the read range of the RFID tags, by an RFID scanner, reader or interrogator, such that the read range is at least 6 inches and, more preferably, the read range of an RFID tag approaches 15 to 24 inches or more thereby making it more easy to locate the RFID scanner, reader or interrogator and is close proximity to an RFID tag so as to facilitate accurate reading of the same.
A further object of the present invention is to interrogate the RFID tag in a substantially continuous manner so as to facilitate a more rapid scanning, reading and/or interrogation of the encoded data field which is stored on the RFID tag to be interrogated.
Yet another object of the present invention is to receive the encoded data filed, transmitted by the internal circuitry of the RFID tag, and then to substantially remove or eliminate, from the received encoded data field, the initially transmitted carrier signal thereby primarily leaving only the transmitted encoded data field from the RFID tag, plus possibly some extraneous noise, which can be more easily and accurately processed and deciphered by the system and the method according to the present invention.
A still further object of the present invention is for the RFID scanner, reader or interrogator to deliver enough signal, typically a frequency ranging between 9 kHz and 3000 GHz for example, in order to adequately power or energize the transponder into commencing its transmission of the stored encoded data field.
Yet another object of the present invention is to provide the RFID scanner, reader or interrogator with a sufficient dynamic range so as to detect responses that may be 80 dB or more weaker than the 134.2 kHz carrier signal generated by the RFID scanner, reader or interrogator.
A further object of the invention is to provide the RFID scanner, reader or interrogator with an RFID tag detection proximity indicator, e.g., a “warmer-colder” proximity indicator, which evaluates the amplitude of the baud rate line, which forms the basis for the signal strength measurement, so that when the RFID scanner, reader or interrogator is moving in a direction toward the RFID tag to be interrogated, the amplitude of the baud rate line increases, while when the RFID scanner, reader or interrogator is moving in a direction away from the RFID tag to be interrogated, the amplitude of the baud rate line decreases. The RFID tag detection proximity indicator will emit a signal which is directly related to the amplitude of the baud rate line thereby providing an indicator to the operator, e.g., getting “warmer” or closer to the RFID tag to be interrogated, or getting “colder” or further away from the RFID tag to be interrogated. It is to be appreciated that the RFID tag detection proximity indicator may either be an audio indicator, a visual indicator, a vibration type indicator or any other conventional proximity indicator which may be readily perceived by the operator and assist the operator of the RFID scanner, reader or interrogator with quickly locating and reading the RFID tag to be interrogated. This is possible because the presence of a baud rate spectral line with data bits transitioning synchronously with the scanner signal can be detected well or long before a correct CRC is eventually obtained during the reading process.
Still another object of the present invention is to utilize the RFID scanner, reader or interrogator as an authorization identifier for actuating a door unlocking mechanism of an RFID based smart pet door. More specifically, the RFID scanner, reader or interrogator can be utilized to detect any RFD tag, carried by or contained within an authorized pet or animal attempting to gain access through the smart pet door and only unlock the door unlocking mechanism of the RFID based smart pet door upon determining that the pet or other animal attempting to gain entrance through the pet door was previously authorized.
A further object of the present invention is to supply the transmission coil with increased voltage and current so as to transmit a stronger carrier signal to the RFID tag so as to facilitate exciting the RFID tag from a greater distance and thereby increase the read range of the RFID scanner, reader or interrogator.
Yet another object of the invention is to separate and spaced the transmission coil from the receiving coil so increase the distance between those two coils thereby reduce the effects that the transmitted carrier signal has on the receiver coil and improve the sensitivity of the RFID signal.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate various embodiments of the invention and together with the general description of the invention given above and the detailed description of the drawings given below, serve to explain the principles of the invention. It is to be appreciated that the accompanying drawings are not necessarily to scale since the emphasis is instead placed on illustrating the principles of the invention. The invention will now be described, by way of example, with reference to the accompanying drawings in which:
As is conventional in the art, the RFID tag contains an encoded data field, e.g., unique serial number typically comprising 128 characters of relevant information (response message) and each character of the data field comprises a sequence of ones (“1”) and/or zeroes (“0”) of a binary code. As is conventional in the art, the data field of a RFID tag typically comprises a start bit sequence (e.g., typically 11 bits, for example, 00000000001), 38 ID bits, 10 country code bits (generally according to ISO 3166), 1 extra application bit, 14 reserved bits, 1 animal bit, 16 CCITT CRC over the previous bits, and 24 application bits. It is to be appreciated that after the initial 11 bits, which comprise the start bit sequence, a framing bit (‘1’) is typically sent after every 8 data bits.
During interrogation of the RFID tag, once the RFID tag is sufficiently energized by a RFID scanner, reader or interrogator, the internal circuitry or transponder of the RFID tag will then commence transmission of the entire encoded data field in predefined sequential transmission order, beginning with the start bit sequence which is then followed by a remainder of the encoded data field. After completing transmission of the entire encoded data field, the RFID tag will generally become dormant or inactive, unless sufficiently re-energized. That is, if the internal circuitry of the RFID is again adequately re-energized by the RFID scanner, reader or interrogator which typically occurs during a conventional interrogation process—the RFID tag will again commence another transmission of the entire encoded data field to the RFID scanner, reader or interrogator.
This process is typically repeated until a conventional cyclic redundancy check (CRC) feature of the method or the system, according to the present invention, confirms that the entire data field, stored on the RFID tag being interrogated, was accurately read by the RFID scanner, reader or interrogator so that another interrogation of the RFID tag being interrogated, by the RFID scanner, reader or interrogator, is no longer required and can be terminated. As is well known in the art, the CRC is a conventional method of checking the data stored on the RFID tag to ensure that the stored date is not corrupted or that a portion of the stored information is lost.
As is conventional and well known in the art, FDX (Full Duplex) chips transponders respond simultaneously while harvesting power from the RFID scanner, reader or interrogator. In addition, the chips do not literally transmit but instead employ a passive “load modulation” technique. That is, the chip or transponder of the RFID tag and the RFID scanner, reader or interrogator operate very similar to a loosely coupled transformer. As a result of this, changes in the load presented by the chip or the transponder of the RFID tag (secondary winding) affect the impedance seen by the RFID scanner, reader or interrogator (primary winding). A resistor is switched in and out of the circuit at a rate equal to the scanner's frequency (134.2 kHz) divided by 32, e.g., the carrier signal generally has a frequency which ranges between 9 kHz and 3000 GHz. This results in an amplitude modulated signal which has an extremely low modulation percentage.
Turning now to
Preferably, the transmission coil 6 is sufficiently spaced or separated from the receiver coil 12 so that the RFID tag 10 to be interrogated can be generally located between the two coils 6, 12. That is, the RFID tag 10 to be interrogated is located closer each of the two coils 6, 12 then the spacing of the two coils 6, 12 from one another. a result of such arrangement, the carrier signal has a longer distance to travel from the transmission coil 6 to the RFID tag 10 being interrogated and finally to the receiver coil 12 where the transmitted carrier signal is generally weaker. ch arrangement minimizes the effect that the transmitted carrier signal has on receiver coil 12 and thereby improves upon the sensitivity of the system.
As generally shown in
The receiver uses an Analog to Digital Converter (ADC) which has a minimum 24-bit resolution so that the low level signal generated by the transponder, which is overshadowed by the carrier signal, can be sufficiently captured from a sufficient standoff distance and the signals from multiple scans can be combined to average out any embedded noise while enhancing the received signal.
During a third step S3, the returned RFID signal 14, which incorporates the transmitted encoded data field from the RFID tag 10 being interrogated, is received by the receiver coil 12 of the RFID scanner, reader or interrogator 2 (RFID signal), Once the returned RFID signal is received by the receiver coil 12, the RFID signal then undergoes processing by the processing device 15 of the system, discussed below in further detail.
At fourth step S4, this received RFID signal 14 is then sent to a summing device where the RFID signal 14 is added or “summed” with essentially a negative of the originally transmitted interrogation or carrier signal. That is, the received RFID signal 14, which essentially comprises the encoded data field of the RFID tag 10 being interrogated plus the reflected and returned interrogation or carrier signal, is then added or combined with a phase shifted, amplitude scaled transmitted interrogation or carrier signal, i.e., combined with an interrogation or carrier signal which is typically phase shifted by 180 degrees and suitably amplitude scaled. As a result of this summing process, the originally transmitted and reflected interrogation or carrier signal is substantially removed and/or cancel from the RFID signal 14 thereby essentially only leaving the transmitted encoded data field, from the RFID tag 10, plus some extraneous “noise” (the summed RFID signal 16).
For example, assuming the interrogation or carrier signal is 134.2 kHz signal, the received RFID signal is essentially summed or combined with −134.2 kHz interrogation or carrier signal and the net result, of this summing process, is that the transmitted and reflected interrogation or carrier signal is substantially eliminated, cancelled and/or removed from the RFID signal 14, received from the RFID tag 10, thereby generally leaving the desired response message, i.e., the transmission signal which was generated by excitation of the transponder of the RFID tag 10 which contains the encoded data field of the RFID tag 10 being interrogated.
It is to be appreciated that by reducing the level of the transmitted and received RFID signal, before performing any digitization of the received signal firstly greatly reduces the dynamic range of the A/D converter without significantly degrading the RFID signal which was received by the RFID scanner, reader or interrogator 2. This, in turn, also allows the use of lower performance A/D converters, when converting the summed RFID signal 16 from an analog format into a digital format for further processing by the processing device. Secondly, this also results in increased sensitivity during coherent integration of successive copies of the 128 characters of the bit stream which comprise the encoded data field of the RFID tag 10, as discussed below in further detail, until a valid CRC is eventually obtained by the process and the method according to the present invention.
Next, the summed RFID signal 16 then undergoes further signal processing by a determining device 18 of the system. That is, the summed RFID signal 16 is next rastered at the frame rate, during fifth step S5, to achieve a rastered and summed RFID signal 20.
During a sixth step S6, a conventional envelope detection technique is utilize in order to commence deciphering of the summed and rastered RFID signal 20. During this further process, the method and the system utilize the summed and rastered RFID signal 20, as the input signal, and generates an enveloped output signal, e.g., enveloped, rastered and summed RFID signal 22, which is an “envelope” of the original rastered and summed RFID signal 20.
Next, during a seven step S7, the system and the method will then evaluate the enveloped, rastered and summed RFID signal 22 typically attempting to determine the beginning of the start bit sequence of the encoded data field. That is, the system and the method each then evaluate the enveloped, rastered and summed RFID signal 22 in an attempt to locate a beginning of the start bit sequence which signifies the beginning of the transmission of the encoded data field. More specifically, the system and the method will examine and search the complied encoded data field looking for the start bit sequence of the RFID tag transmission, e.g., the system and the method attempt to identify the location of the enveloped, raster and summed RFID signal 20 which more closely approximates the start bit sequence of the encoded data field transmission from the RFID tag transmission.
A Viterbi decoder is used to take advantage of the fact that a valid ‘1’ bit always inverts the polarity of subsequent bits to help in the vs. ‘0’ bit decisions. This look-ahead scheme allows for the correction of individual bits that get overcome by noise.
Once the system and the method identify the start bit sequence of the RFID tag transmission, e.g., in this instance, the “00000000001” which signifies the start bit sequence, a remainder of the detected, enveloped, raster and summed RFID signal 24 is then “circle shifted,” in a conventional manner, during an eighth step 38, so as to complete formation of first scan or interrogation of the encoded data field 26. At step S9, the available enveloped, raster and summed RFID signals, concerning the encoded data field 26, are averaged with one another to form a smoother signal of the encoded data field 26. Finally, a CRC detection is then preformed, at step S10, to determine whether or not the encoded data field can be accurately read based upon the current scan of the RFID tag 10 being interrogated. If the CRC detection, preformed at step S10, can accurately determine the encoded data field of the RFID tag 10 being interrogated, the system and method end at step S11.
Assuming that the encoded data field can not be accurately read based upon the current scan(s) of the RFID tag 10 being interrogated, then the above process is again repeated. That is, the system and the method will again search an next sequential section of the complied encoded data field again looking for the start bit sequence of the RFID tag transmission, e.g., identify the location of the remaining enveloped, raster and summed RFID signal 20 which more closely approximates the start bit sequence of the encoded data field of the RFID tag transmission, e.g., in this instance, the “000000000001”. Once the system and the method again identify the start bit sequence of the encoded data field of the RFID tag transmission, the remainder of the enveloped, raster and summed RFID signal 20 is then circle shifted so as to complete the encoded data field and form a first frame-to-frame integration of the transmitted encoded data field of the RFID tag being interrogated.
As noted above, each conventional RFID tag 10, at the beginning of the transmission sequence, transmits the start bit sequence which is then followed by the remainder of the encoded data field concerning that specific RFID tag 10 being interrogated. Since the RFID scanner, reader or interrogator 2 continuously interrogates the RFID tag 10, i.e., normally continuously sends an interrogation carrier signal to the internal circuitry or transponder 8 of the RFID tag 10, as soon as transmission of the data field information, by the internal circuitry or transponder 8 of the RFID tag 10, is completed, the internal circuitry or transponder 8 of the RFID tag 10 is normally re-energized and again transmits the RFID signal back to the receiver coil 12 of the RFID scanner, reader or interrogator 2. This process is continuously repeated until the RFID scanner, reader or interrogator 2 eventually accurately reads the RFID tag 10, i.e., the CRC is eventually detected at step 9, and the read results are then displayed, at step 10. Thereafter, the RFID scanner, reader or interrogator 2 discontinues transmission of the carrier signal 4 toward the RFID tag 10 to energize the internal circuitry or transponder 8 thereof.
In the event that the average of the first 16 interrogations of the RFID tag 10 does not result in a sufficiently smooth curve so as to permit deciphering or determination of all of the zeros (“0”), of the binary code, from all of the ones (“1”), of the binary code, from one another, as generally shown in
The system and the method will then evaluate this average of the encoded date field, i.e., the average of 16 most recent frame-to-frame integrations, to determine whether or not the system and the method can reliably determine the start bit sequence of the encoded data field as well as all of the remaining characters of the encoded data field. In the event that the start bit sequence and the remainder of the encoded data field of the RFID tag 10 can be accurately read, then the system and the method reads the encoded data field of the RFID tag 10, displays or transmits the results, and the subsequently terminates further scanning or reading of the RFID tag 10 to be interrogated.
Otherwise, in the event that either the start bit sequence and/or a remainder of the stored encoded data field of the RFID tag 10 to be interrogated still can not be accurately read by the RFID scanner, reader or interrogator 2, then the system and the method will again repeat the above process by conducting a still further scan or interrogation of the internal circuitry or transponder 8 of the RFID tag 10 to be interrogated (i.e., scan or interrogation 18) and discard the next oldest encoded data field—in this instance the second scan or interrogation of the encoded data field—while the 15 more recent scans or interrogations (e.g., scans or interrogations 3-17) of the encoded data field are retained and then averaged with this most recent scan or interrogation (i.e., scan or interrogation 18) of the encoded data field.
The RFID transponder is a polarized device and responds better to magnetic fields aligned with the length of the device. For this reason, a rotating polarity is used in the transceiver to locate the orientation of the transponder device. Once the best orientation is found, while looking for the start bits, then that orientation is maintained, while the raster and summing operations are performed.
This process is repeatedly repeated until both the starting bit sequence and a remainder of the stored encoded data field of the RFID tag 10 to be interrogated can be identified and accurately read. Once accurate reading of the entire encoded date field is achieved by the system and the method, the results are then displayed and both the method and the process end and thus discontinue further operation.
In addition to the baud detection, the detection of the sync bits is used to further enhance the “warmer-colder” signal to indicate when the detector is getting close enough to be able to correctly decode the data.
While the above description makes reference to averaging 16 scans or interrogations with one another, it is to be appreciated that either more than 16 scans or interrogations or less than 16 scans or interrogations may be average with one another, depending upon the particular application, without departing from the spirit and scope of the present invention.
The RFID scanner, reader or interrogator 2 is provided with an RFID tag detection proximity indicator 30, e.g., a “warmer-colder” proximity indicator, which evaluates an amplitude of the baud rate line which forms the basis for a signal strength measurement. The RFID tag detection proximity indicator 30 normally evaluates the signal strength of the return RFID signal 14, from the RFID tag 10, so that when the RFID scanner, reader or interrogator 2 is moving in a direction toward the RFID tag 10 to be interrogated, the RFID tag detection proximity indicator 30 will generally detect an increase in the amplitude of the baud rate line which signifies that the RFID scanner, reader or interrogator 2 is moving closer to the RFID tag 10. On the other hand, when the RFID scanner, reader or interrogator 2 is moving in a direction away from RFID tag 10 to be interrogated, the RFID tag detection proximity indicator will generally detect a decrease in the amplitude of the baud rate line which signifies that the RFID scanner, reader or interrogator 2 is moving further away from the RFID tag 10. This feature is possible because of the presence of a baud rate spectral line with data bits that transition synchronously with the scanner signal can be detected well before a correct CRC is eventually obtained by the method and the system according to the present invention.
It is to be appreciated that the RFID tag detection proximity indicator 30 can generate or emit a variety of different types of audio, visual, vibrational, etc., outputs or signals which are directly indicative of the detected amplitude of the baud rate line and thereby provide the operator of the RFID scanner, reader or interrogator 2 with an accurate “warmer” or “colder” proximity indication that assists the operator with accurate placement of the RFID scanner, reader or interrogator 2, within its read range of the RFID tag 10 to be interrogated so that the RFID tag 10 to be interrogated can be accurately read in a rapid and efficient manner.
One application for the present invention is to incorporate the RFID scanner, reader or interrogator 2 as a reader/scanner which is to be used in conjunction with a pet door assembly 32 that provides access, e.g., a means of ingress and/or egress, for a pet or animal with respect to a house, a garage, a basement or some other facility. As is conventional in the art, the pet door 34 is usually hingedly connected 36, only diagrammatically shown, to a top portion of the frame 36, or possibly a side portion of the frame, while the frame is bolted or otherwise permanently secured about a perimeter of an opening which is formed in a door, a wall or some other support structure 40 of the house, the garage, the basement or other facility, so as to block access through the open. The pivotable door is normally maintained in a generally “closed position” which blocks access through the opening. When the pivotable door is biased, for example, by a paw, a nose, a head or some other extremity of a pet or an animal, the pet door 34 can be pivoted into the opened position which provides access, for the pet or the animal, through the opening. Once the pet or the animal passes through the opening and is sufficiently clear thereof, the pivotal pet door 34 automatically rotates or pivots back into its normally closed position.
One problem associated with lockable pet doors is that while they may provide access for a desired pet or other animal, such pet doors also potentially provide access for unwanted guests, such as a neighbor's pet or animal, a wild animal, a rodent, etc. While it is possible to manually lock the pet door, by a conventional manual latching/locking mechanism, during the night and/or at other times when access through the pet door is to be prevented, it is often difficult for one of the occupants of the house or other facility to consistently remember to both latch or unlatch the pet door 34 at the required times.
Automated systems for latching/unlatching a pet door also known. One such automated system generally requires a power source for the system as well as an RFID tag to be carried by each pet that is authorized have access through the pet door assembly 32. Once the automated system verifies that the pet or animal should be provided access through the opening, the automated system unlatches the latching mechanism and provides access. However, one of the major problems associated with such prior art automated systems is that it is difficult for the currently known RFID scanners, readers or interrogators to accurately read the RFID tag(s) within an acceptable time period, e.g., before the pet or other animal, which should be provided with access through the opening of the pet door assembly 32, becomes distracted and/or otherwise moves away from the pet door.
Due to the increased read range of the RFID scanner, reader or interrogator 2 as well as the increased sensitivity and shorter read time, the RFID scanner, reader or interrogator 2, according to the presently claimed invention, is particularly adapted and suitable for use with any conventional automated system incorporating an electronically or electrically actuated latching/unlatching mechanism for a pet door. As generally shown in
With respect to the above discussed pet door application or anytime one is looking for the presence of a specific tag ID, it is also possible to correlate the received RFID signal 14 against a computed waveform for the desired tag, as generally shown in
As generally shown in
It is to be appreciated that an another important aspect the present invention is that it provides for adaptive cancellation so that the system and the method can readily account for aging or deterioration of any of the components of the system and method.
While various embodiments of the present invention have been described in detail, it is apparent that various modifications and alterations of those embodiments will occur to and be readily apparent to those skilled in the art. However, it is to be expressly understood that such modifications and alterations are within the scope and spirit of the present invention, as set forth in the appended claims. Further, the invention(s) described herein is capable of other embodiments and of being practiced or of being carried out in various other related ways. In addition, it is to be understood that the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting. The use of “including,” “comprising,” or “having,” and variations thereof herein, is meant to encompass the items listed thereafter and equivalents thereof as well as additional items while only the terms “consisting of” and “consisting only of” are to be construed in a limitative sense.
Preferably the memory is 4096 which is suitable for handling 128 characters which are switched in and out of the circuit at a rate equal to the scanner's frequency (134.2 kHz) divided by 32, e.g., 128 characters multiplied by 32.
This application claims the benefit of U.S. provisional application Ser. No. 61/992,548 filed May 13, 2014.
Number | Name | Date | Kind |
---|---|---|---|
8446254 | Carrick | May 2013 | B2 |
8937531 | Rimai | Jan 2015 | B2 |
8948279 | Volpi | Feb 2015 | B2 |
20060077036 | Roemerman | Apr 2006 | A1 |
20080018432 | Volpi | Jan 2008 | A1 |
20090156153 | Al-Mahadawi | Jun 2009 | A1 |
20100120368 | Smith | May 2010 | A1 |
20110090062 | Hofer et al. | Apr 2011 | A1 |
20120019399 | Vargo et al. | Jan 2012 | A1 |
20130241708 | Tuttle | Sep 2013 | A1 |
Entry |
---|
International Search Report Corresponding to PCT/US2015/030256 Mailed Aug. 10, 2015. |
Written Opinion Corresponding to PCT/US2015/030256 Mailed Aug. 10, 2015. |
Number | Date | Country | |
---|---|---|---|
20150332072 A1 | Nov 2015 | US |
Number | Date | Country | |
---|---|---|---|
61992548 | May 2014 | US |