The present invention relates to a method for unlocking a lock using real-time wireless power supply and, more particularly, to a powerless lock that can be wirelessly supplied with power required for operation through an electronic key comprised of a smart mobile device or the like.
With the development of technology, conventional mechanical locks have been evolved into electronic locks of electromechanical integration type. Operation of a portion of the electronic locks replies on power and generally requires a detachable battery for suppling power for an unlocking authentication identification procedure, a procedure of inputting unlocking authentication information, and operation of a motor or an electromagnetic valve. The electronic locks of this type encounters problems in use. For example, the electronic locks cannot operate when the detachable battery runs out of power. Furthermore, the electronic locks with power could still be decrypted, even though the possibility is not high.
To solve the above problems, in an aspect, the present invention provides a method for unlocking a lock using real-time wireless power supply, comprising:
Thus, the lock used in the method for unlocking a lock using real-time wireless power supply of each of the first and second embodiments according to the present invention is not provided with a power source, such that operation of the lock requires wireless power supply which is carried out after pairing. Thus, it is difficult to decrypt the lock. Furthermore, a repeatedly rechargeable electronic key can be used to wirelessly supply power, such that it is not necessary to worry about power shortage of the lock.
In an example, the method further comprises detecting whether the lock is operated by an external force after the lock is unlocked. The electronic key keeps wirelessly supplying power to the lock when it is detected that no external force is applied to the lock. When it is detected that the external force is applied to operate the lock, the lock uses the power wirelessly suppled from the electronic key to proceed with locking of the lock, and the wirelessly power supply is then cut off.
In an example, the method further comprises using the lock to increase a voltage of the power wirelessly supplied from the electronic key to enable operation of the lock.
In an example, the pre-set period of time is in a range of 5-30 seconds.
In an example, the unlocking command is outputted after the lock is enabled to operate after the wireless power supply from the electronic key.
In an example, countdown of the pre-set period of time begins from a moment the lock is unlocked.
In another example, countdown of the pre-set period of time begins from a moment the electronic key outputs the unlocking command.
In an example, the authentication identification includes inputting a real-time authentication identification information into the electronic key. The authentication identification is identified as being successful when the real-time authentication identification information is identified as being correct. The authentication identification is identified as being unsuccessful when the real-time authentication identification information is identified as being incorrect.
In an example, inputting the real-time authentication identification information includes inputting a fingerprint or a face image of a holder of the electronic key.
In an example, the electronic key is comprised of a repeatedly rechargeable smart mobile device.
In a second aspect, a method for unlocking a lock using real-time wireless power supply comprises:
Thus, wireless power supply to the lock is carried out when the holder of the electronic key proceeds with the authentication identification. Thus, the lock has sufficient time to respond to the wireless power supply to permit subsequent execution of the unlocking command after successful authentication identification.
In an example, the method further comprises detecting whether the lock is operated by an external force after the lock is unlocked. The electronic key keeps wirelessly supplying power to the lock when it is detected that no external force is applied to the lock. When it is detected that the external force is applied to operate the lock, the lock uses the power wirelessly suppled from the electronic key to proceed with locking of the lock, and the wirelessly power supply is then cut off.
In an example, the method further comprises using the lock to increase a voltage of the power wirelessly supplied from the electronic key to enable operation of the lock.
In an example, the pre-set period of time is in a range of 5-30 seconds.
In an example, countdown of the pre-set period of time begins from the moment the lock is unlocked.
In another example, countdown of the pre-set period of time begins from the moment the electronic key outputs the unlocking command.
In an example, the authentication identification includes inputting a real-time authentication identification information into the electronic key. The authentication identification is identified as being successful when the real-time authentication identification information is identified as being correct. The authentication identification is identified as being unsuccessful when the real-time authentication identification information is identified as being incorrect.
In an example, inputting the real-time authentication identification information includes inputting a fingerprint or a face image of a holder of the electronic key.
In an example, the electronic key is comprised of a repeatedly rechargeable smart mobile device.
The present invention will become clearer in light of the following detailed description of illustrative embodiments of this invention described in connection with the drawings.
The present invention relates to a method for unlocking a lock using real-time wireless power supply.
In step S215, it is identified whether the authentication identification is successful. When the authentication identification fails, the electronic key and the lock remain in the offline state (step S213). The authentication identification procedure can be, but not limited to, cooperation of the control APP installed in the smart mobile device with a lens or a fingerprint pick-up device of the smart mobile device. For example, the control APP installed on the smart mobile phone is executed and requests a holder of the smart mobile device to input a real-time face image (a real-time authentication identification information) through the lens of the smart mobile device. The smart mobile device identifies whether the real-time face image is correct. For example, the real-time face image is compared with an authenticated face image that has been authenticated by the smart mobile device. When the real-time face image does not match with the authenticated face image, the electronic key and the lock remain offline. Namely, there is no connection (including wireless charging) between the electronic key and the lock.
When the authentication identification executed by the electronic key is successful, it is identified whether the electronic key and the lock are in a communication range (S217). When the distance between the electronic key and the lock exceeds the communication range, the electronic key and the lock remain offline (S213). Namely, no matter the authentication identification of the electronic key is successful or not, the electronic key and the lock remain offline as long as the distance between the electronic key and the lock is not in the communication range. Note that the communication range is not intended to restrict the maximum communication range. For example, the communication range is not limited to the wireless power supply range. Assume the maximum distance permitting wireless power supply is 3 meters, the communication range can be set as 2 meters. Given this setting, when the distance between the electronic key and the lock is in a range between 2-3 meters, the distance between the electronic key and the lock will still be considered as exceeding the communication range.
Alternatively, the communication range can be the same as the maximum operation range of wireless power supply. In this case, the distance between the electronic key and the lock must be within the wireless power supply range, because the lock is a powerless lock, which is a lock without a built-in battery or a lock supplied with power by wired connection. In a case that the distance between the electronic key and the lock exceeds the wireless power supply range, the electronic key cannot wirelessly supply power to the lock, such that the lock cannot operate. In a case that the maximum operation range for wireless power supply can be set as the communication range, the communication range (such as within the powerless power supply range) can be different due to different techniques adopted. For example, the wireless charging range of a wireless charging technique of electromagnetic induction type meeting the requirements of wireless charging is smaller (such as the distance between the receiver and the transmitter is less than 30 mm), whereas the wireless power supply range of other techniques (such as the WattUp proposed by Energous Corporation and Cota proposed by Ossia Corporation) can be larger (generally larger than 1 meter). It can be appreciated that the wireless power supply techniques used in the present invention are not limited in this regard.
When the distance between the electronic key and the lock is in the communication range and the authentication identification is successful, the electronic key undergoes wireless power supply to the lock, such that the lock can use the power supplied wirelessly (S231). Specifically, since the lock is powerless, the authentication identification is carried out by the electronic key. For example, in a case that an authenticated face image is compared with a real-time face image inputted through the electronic key, the electronic key wirelessly supplies power to the lock when the real-time face image matches with the authenticated face image and when the distance between the electronic key and the lock is within the wireless power supply range.
In step S235, when the electronic key wirelessly supplies power to the lock, the lock increases the voltage of the power supplied wirelessly, which is required for operation of the lock. Specifically, the lock can include a circuit board for control purposes and a motor for locking and unlocking the lock. The voltage and electric current required for operating the motor may not directly come from the wireless power supply. For example, given the power of the wireless power supply is smaller than 5 w, the voltage and electric current may not be sufficient to drive the motor. Nevertheless, when the power of the wireless power supply is higher (such as 10-15 w), the voltage and electric current are sufficient to directly drive the motor. Note that since the lock per se is powerless, the voltage increasing procedure is carried out after the lock receives the power supplied wirelessly. Specifically, the lock includes a corresponding circuit that operates to increase the voltage of the power supplied wirelessly and that adjusts the electric current to a magnitude suitable for operation of the motor.
In step S233, during or after wireless power supply from the electronic key to the lock, the electronic key outputs an unlocking command to the lock. For example, after the lock receives power from the electronic key through wireless power supply, the lock can receive and handle the unlocking command from the electronic key. Note that the wireless power supply (step S231) and outputting the unlocking command (step S233) can proceed simultaneously. For example, while the electronic key undergoes the wireless power supply, the unlocking command is outputted and lasts for a short period of time (such as 2 seconds) to wait for response of the lock to acquire the power required for operation of the lock. Nevertheless, the procedures can be carried out at different times. For example, an unlocking command is transmitted to the lock after a period of time (such as 0.5 seconds), starting from beginning of the wireless power supply to the lock from the electronic key, has lapsed.
The lock receiving the unlocking command from the electronic key proceeds with an unlocking operation using the power wirelessly supplied from the electronic key (S237). Specifically, when the lock receives the unlocking command from the electronic key, the motor of the lock uses the power wirelessly supplied from the electronic key to drive the mechanism inside the lock, thereby achieving the unlocking operation.
After unlocking the lock, it is detected whether the lock is operated by an external force (S239). When no external force is applied to operate the lock, the electronic lock remains the wireless power supply (S251). On the other hand, when it is detected that the lock is operated by an external force, the lock uses the power wirelessly supplied from the electronic key (S255) to proceed with a locking operation, and the wireless power supply is then cut off (step S257).
In an example, the lock is a door lock installed on a door and is paired with the electronic key. When it is intended to unlock the door lock, it is detected whether the door is opened or a handle for opening the door is rotated. In an embodiment, a first micro switch is mounted in the door lock. When the first micro switch in the door lock is not activated, it is identified that no external force is applied to operate the door lock. In this case, the electronic key continues the wireless power supply (S251), such that the door lock remains in an operable state or an unlocked state and has power to detect whether the handle of the door lock is operated. When the handle of the door lock is operated and the first micro switch is activated, the door lock uses the wirelessly supplied power to drive the motor to thereby return the door lock to the locked state. After door lock is locked, a second micro switch can be used for detection. The second micro switch is activated when the door lock is locked. In this case, the door lock transmits a signal (demanding cutting off of the wireless power supply) to the electronic key, such that the electronic key cuts off the wireless power supply (S257).
A pre-set period of time is set and is counted down from the moment the lock is unlocked or the electronic key outputs the unlocking command. In step S253, it is identified whether the pre-set period of time has expired. The electronic key continues the wireless power supply procedure when the pre-set period of time has not expired (S251).
Namely, in a case that a holder of the electronic key does not operate the lock at all or does not operate the lock immediately, actual use of the lock will be inconvenient if the wireless power supply procedure is not maintained for a period of time. For example, if the wireless power supply is cut off before the lock is operated, the motor of the lock cannot be driven to achieve the locking operation due to lack of electricity.
When the lock is not operated, continuous wireless supply to the lock by the electronic key is a waste of the power of the electronic key whereas the lock remains in the unlocked state, which jeopardizes the safety. Thus, after the lock is unlocked, the wireless power supply must be maintained for a specific period of time to assure that the lock has sufficient power to set back to the locked state. In an example, the pre-set period of time is set to a value in a range of 5-30 seconds. For example, when the pre-set period of time is 10 seconds, a countdown of 10 seconds begins immediately after the lock is unlocked. Thus, the electronic key still wirelessly supplies power to the lock for 10 seconds.
Note that the starting time of the countdown of the pre-set period of time can be varied. For example, the countdown begins when the unlocking command is outputted by the electronic key, or when unlocking of the lock is completed.
In step S255, when the pre-set period of time has expired, the lock uses the power wirelessly supplied from the electronic key to proceed with the locking operation. Namely, when the lock is operated or the countdown of the pre-set period of time finishes, the lock will return to the unlocked state. This assures the lock is normally in the locked state to avoid the holder of the electronic key from being unaware of wireless power supply to the lock (which keeps the lock in the unlocked state).
After the lock is locked, the communication between the electronic key and the lock is cut off, and the wireless power supply is stopped (S257). Namely, no matter the lock is locked by an external force or completion of the countdown of the pre-set period of time, the lock will use the wireless supplied power to send a signal (for terminating the wireless power supply) to the electronic key, such that the electronic key cuts off the wireless power supply (S257). Thus, the electronic key cuts off the wireless power supply to the lock, such that the lock becomes a powerless state and is, thus, difficult to decrypt.
In addition to the first embodiment shown in
When the authentication identification executed by the electronic key is successful, it is identified whether the electronic key and the lock are in the communication range (S218). When the distance between the electronic key and the lock exceeds the communication range, the electronic key does not wirelessly supply power to the lock (S220). Namely, no matter the authentication identification of the electronic key is successful or not, the electronic key and the lock remain offline as long as the distance between the electronic key and the lock exceeds the communication range. Note that the communication range is not intended to restrict the maximum communication range. For example, the communication range is not limited to the wireless power supply range. Assume the maximum distance permitting wireless power supply is 3 meters, the communication range can be set as 2 meters. Given this setting, when the distance between the electronic key and the lock is in a range between 2-3 meters, the distance between the electronic key and the lock will still be considered as exceeding the communication range.
Alternatively, the communication range can be the same as the maximum operation range of wireless power supply. In this case, the distance between the electronic key and the lock must be within the wireless power supply range, because the lock is a powerless lock, which is a lock without a built-in battery or a lock supplied with power by wired connection. In a case that the distance between the electronic key and the lock exceeds the wireless power supply range, the electronic key cannot wirelessly supply power to the lock, such that the lock cannot operate. In a case that the maximum operation range for wireless power supply can be set as the communication range, the communication range (such as within the powerless power supply range) can be different due to different techniques adopted. For example, the wireless charging range of a wireless charging technique of electromagnetic induction type meeting the requirements of wireless charging is smaller (such as the distance between the receiver and the transmitter is less than 30 mm), whereas the wireless power supply range of other techniques (such as the WattUp proposed by Energous Corporation and Cota proposed by Ossia Corporation) can be larger (generally lager than 1 meter). It can be appreciated that the wireless power supply techniques used in the present invention are not limited in this regard.
Paring of the electronic key and the lock includes, but not limited to, conventional pairing techniques, such as Bluetooth pairing technique, Wi-Fi pairing technique, etc. For example, information of the lock is logged into the electronic key, such that the lock is paired with the electronic key. In another example, the lock is provided with a hardware identification number which is registered into the electronic key to achieve successful pairing.
When the distance between the electronic key and the lock is in the communication range and the authentication identification is successful, the electronic key undergoes wireless power supply to the lock, such that the lock can use the power supplied wirelessly (S231). Specifically, to avoid unnecessary consumption of electricity of the electronic key, the electronic key wirelessly supplies power to the lock only when the holder holding the electronic key intends to proceed with the authentication identification. Note that in this procedure, regardless of the result of the authentication identification, the electronic key proceeds with wireless wire supply to the lock even though the inputting of the authentication identification information is still undergoing (which is different from the first embodiment). This is advantageous in providing the lock with sufficient response time to use the power supplied wirelessly. Thus, the lock enters a state receiving the wireless power supply, which is helpful in reliably receiving other signals or commands from the electronic key.
In step S235, when the electronic key wirelessly supplies power to the lock, the lock increases the voltage of the power supplied wirelessly, which is required for operation of the lock. The response time of the lock in the wireless power supply procedure (S231) can be the time required for the voltage-increasing step (S235). Specifically, the lock can include a circuit board for control purposes and a motor for locking and unlocking the lock. The voltage and electric current required for operating the motor may not directly come from the wireless power supply. For example, given the power of the wireless power supply is smaller than 5 w, the voltage and electric current may not be sufficient to drive the motor. Nevertheless, when the power of the wireless power supply is higher (such as 10-15 w), the voltage and electric current are sufficient to directly drive the motor. Note that since the lock per se is powerless, the voltage increasing procedure is carried out after the lock receives the power supplied wirelessly. Specifically, the lock includes a corresponding circuit that operates to increase the voltage of the power supplied wirelessly and that adjusts the electric current to a magnitude suitable for operation of the motor.
In step S215, it is identified whether the authentication identification is successful. When the authentication identification fails, the electronic key does not output the unlocking command to the lock (step S216). The authentication identification procedure can be, but not limited to, cooperation of the control APP installed in the smart mobile device with a lens or a fingerprint pick-up device of the smart mobile device. For example, the control APP installed on the smart mobile phone is executed and requests a holder of the smart mobile device to input a real-time face image through the lens of the smart mobile device. The smart mobile device identifies whether the real-time face image is correct. For example, the real-time face image is compared with an authenticated face image that has been authenticated by the smart mobile device. When the real-time face image does not match with the authenticated face image, the electronic key does not output the unlocking command to the lock (step S216).
In step S233, when the authentication identification by the electronic key is successful, the electronic key outputs the unlocking command to the lock. Specifically, after the lock receives power wirelessly supplied from the electronic key, the power can receive and handle the unlocking command from the electronic key.
The lock receiving the unlocking command from the electronic key proceeds with an unlocking operation by using the power wirelessly supplied from the electronic key (S237). Specifically, when the lock receives the unlocking command from the electronic key, the motor of the lock uses the power wirelessly supplied from the electronic key to drive the mechanism inside the lock, thereby achieving the unlocking operation.
The steps of opening operation (S239), keeping wireless power supply (S251), identification of expiration of the pre-set period of time (S253), locking operation (S255), and cutting off wireless power supply (S257) in the method of the second embodiment illustrated by the flowchart of
The lock used in the method for unlocking a lock using real-time wireless power supply of each of the first and second embodiments according to the present invention is not provided with a power source, such that operation of the lock requires wireless power supply which is carried out after pairing. Thus, it is difficult to decrypt the lock.
The lock used in the method for unlocking a lock using real-time wireless power supply of each of the first and second embodiments according to the present invention is not provided with a power source, a repeatedly rechargeable electronic key can be used to wirelessly supply power. Thus, it is not necessary to worry about power shortage of the lock.
In the method for unlocking a lock using real-time wireless power supply of the second embodiment according to the present invention, wireless power supply to the lock is carried out when the holder of the electronic key proceeds with the authentication identification. Thus, the lock has sufficient time to respond to the wireless power supply to permit subsequent execution of the unlocking command after successful authentication identification.
Now that the basic teachings of the present invention have been explained, many extensions and variations will be obvious to one having ordinary skill in the art. For example, the method of each of the first and second embodiments does not have to include the voltage increasing step S235. For example, when the wireless power supply from the electronic key to the lock has a higher power (such as 10-15 w) sufficient to drive the motor, it is not necessary to increase the voltage of the power wirelessly supplied to the lock.
Thus since the invention disclosed herein may be embodied in other specific forms without departing from the spirit or general characteristics thereof, some of which forms have been indicated, the embodiments described herein are to be considered in all respects illustrative and not restrictive. The scope of the invention is to be indicated by the appended claims, rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are intended to be embraced therein.
Number | Date | Country | Kind |
---|---|---|---|
110121313 | Jun 2021 | TW | national |
This is a divisional application of U.S. patent application Ser. No. 17/350,108 filed Jun. 17, 2021, now U.S. Pat. No. 11,756,355, the entire contents of which are incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
1643932 | Teich | Sep 1927 | A |
1687009 | Drexler et al. | Oct 1928 | A |
4102005 | Schnarr et al. | Jul 1978 | A |
4348835 | Jones et al. | Sep 1982 | A |
4419787 | Lieberman | Dec 1983 | A |
4867496 | Thomas | Sep 1989 | A |
5782509 | Uyeda | Jul 1998 | A |
6177771 | Kinzer et al. | Jan 2001 | B1 |
6454324 | Lewis et al. | Sep 2002 | B1 |
6634140 | Sellman | Oct 2003 | B1 |
6745603 | Shaw | Jun 2004 | B1 |
6786006 | Kowalczyk et al. | Sep 2004 | B2 |
6891479 | Eccleston | May 2005 | B1 |
7051403 | Homberg | May 2006 | B2 |
7061197 | Mullet et al. | Jun 2006 | B1 |
7068179 | Snell et al. | Jun 2006 | B2 |
7143547 | Liles, Jr. | Dec 2006 | B2 |
7234201 | Brown et al. | Jun 2007 | B2 |
7282883 | Mullet et al. | Oct 2007 | B2 |
7296380 | Backman | Nov 2007 | B2 |
7316096 | Houser et al. | Jan 2008 | B2 |
7418800 | Sellman | Sep 2008 | B1 |
7484333 | Houser et al. | Feb 2009 | B2 |
7555867 | Liles, Jr. | Jul 2009 | B2 |
7717155 | Mullet | May 2010 | B2 |
7774984 | Hsu | Aug 2010 | B2 |
7966771 | Bienek | Jun 2011 | B2 |
8109038 | Houser et al. | Feb 2012 | B2 |
8169169 | Hass et al. | May 2012 | B2 |
8248005 | Romer | Aug 2012 | B2 |
8359790 | Shin | Jan 2013 | B2 |
8382008 | Ricciardi et al. | Feb 2013 | B1 |
8390219 | Houser | Mar 2013 | B2 |
8393054 | Bienek | Mar 2013 | B2 |
8407937 | Houser | Apr 2013 | B2 |
8415902 | Burris et al. | Apr 2013 | B2 |
8434268 | Nixon | May 2013 | B2 |
8499495 | Houser et al. | Aug 2013 | B2 |
8547046 | Burris et al. | Oct 2013 | B2 |
8601744 | Wildforster et al. | Dec 2013 | B2 |
8695277 | Romer et al. | Apr 2014 | B2 |
8826598 | Ranaudo et al. | Sep 2014 | B2 |
8875344 | Salutzki et al. | Nov 2014 | B2 |
8904710 | Romer et al. | Dec 2014 | B2 |
8963683 | Romer | Feb 2015 | B2 |
9003630 | Hufen | Apr 2015 | B2 |
9045927 | Hoffberg | Jun 2015 | B1 |
9097051 | Hellwig | Aug 2015 | B2 |
9115526 | Houser et al. | Aug 2015 | B2 |
9121217 | Hoffberg | Sep 2015 | B1 |
9163446 | Houser et al. | Oct 2015 | B2 |
9181744 | Salutzki et al. | Nov 2015 | B2 |
9187942 | Wildforster | Nov 2015 | B2 |
9297194 | Bienek et al. | Mar 2016 | B2 |
9506284 | Braverman et al. | Nov 2016 | B2 |
9514583 | Zasowski et al. | Dec 2016 | B2 |
9631412 | Hellwig et al. | Apr 2017 | B2 |
9683378 | Houser et al. | Jun 2017 | B2 |
9695620 | Zasowski et al. | Jul 2017 | B2 |
9830932 | Gunderson et al. | Nov 2017 | B1 |
9869117 | Houser et al. | Jan 2018 | B2 |
9886831 | Svoboda et al. | Feb 2018 | B1 |
9995076 | Hoffberg | Jun 2018 | B1 |
10006236 | Hellwig et al. | Jun 2018 | B2 |
10024094 | Bell et al. | Jul 2018 | B2 |
10030425 | Zasowski et al. | Jul 2018 | B2 |
10030426 | Langenberg | Jul 2018 | B2 |
10077591 | Hass | Sep 2018 | B2 |
10180023 | Zasowski et al. | Jan 2019 | B2 |
10208520 | Long et al. | Feb 2019 | B2 |
10236801 | Dye et al. | Mar 2019 | B2 |
10253540 | Bell et al. | Apr 2019 | B2 |
10273736 | Hucker | Apr 2019 | B2 |
10280670 | Roberts | May 2019 | B2 |
10280678 | Rendon, Jr. et al. | May 2019 | B1 |
10304272 | Kvinge et al. | May 2019 | B2 |
10316568 | Langenberg et al. | Jun 2019 | B2 |
10344502 | McKibben et al. | Jul 2019 | B2 |
10415301 | Kuan | Sep 2019 | B2 |
10458151 | Shen | Oct 2019 | B1 |
10472873 | Ladha et al. | Nov 2019 | B2 |
10559151 | Kvinge et al. | Feb 2020 | B2 |
10648208 | Eickhoff | May 2020 | B2 |
10704310 | Barbon et al. | Jul 2020 | B1 |
10704313 | Houser et al. | Jul 2020 | B2 |
10724288 | Baumgarte | Jul 2020 | B2 |
10844644 | Langenberg et al. | Nov 2020 | B2 |
10968677 | Hass | Apr 2021 | B2 |
11002055 | Eickhoff et al. | May 2021 | B2 |
11124997 | Eickhoff | Sep 2021 | B2 |
11250655 | Shen | Feb 2022 | B2 |
11312207 | Sanders | Apr 2022 | B1 |
11417200 | Hass et al. | Aug 2022 | B2 |
11542727 | Hsu | Jan 2023 | B2 |
11544979 | Shen | Jan 2023 | B1 |
11661782 | Eickhoff et al. | May 2023 | B2 |
11756355 | Shen | Sep 2023 | B2 |
20030127869 | Herron et al. | Jul 2003 | A1 |
20050154612 | Smith et al. | Jul 2005 | A1 |
20060244271 | Hass | Nov 2006 | A1 |
20060261675 | Unno | Nov 2006 | A1 |
20070256362 | Hansen | Nov 2007 | A1 |
20100107495 | Bourgeois et al. | May 2010 | A1 |
20100315229 | Shin | Dec 2010 | A1 |
20110302841 | Ye et al. | Dec 2011 | A1 |
20120159852 | Houser et al. | Jun 2012 | A1 |
20120190325 | Abu-Hakima et al. | Jul 2012 | A1 |
20130009785 | Finn et al. | Jan 2013 | A1 |
20130216438 | Hill et al. | Aug 2013 | A1 |
20130308778 | Fosmark et al. | Nov 2013 | A1 |
20130346333 | Hassler et al. | Dec 2013 | A1 |
20140255252 | Stratman et al. | Sep 2014 | A1 |
20140282934 | Miasnik et al. | Sep 2014 | A1 |
20140325911 | Hass | Nov 2014 | A1 |
20150070166 | Boyden et al. | Mar 2015 | A1 |
20150113876 | Burris et al. | Apr 2015 | A1 |
20150194033 | Esposito et al. | Jul 2015 | A1 |
20150211278 | Moyer et al. | Jul 2015 | A1 |
20150262438 | Zasowski et al. | Sep 2015 | A1 |
20150339913 | Lyman et al. | Nov 2015 | A1 |
20160220716 | Childress et al. | Aug 2016 | A1 |
20160312514 | Leonard et al. | Oct 2016 | A1 |
20160348415 | Baumgarte | Dec 2016 | A1 |
20170275912 | Murphy | Sep 2017 | A1 |
20170275921 | Murphy et al. | Sep 2017 | A1 |
20170328100 | Eickhoff | Nov 2017 | A1 |
20180334841 | Langenberg et al. | Nov 2018 | A1 |
20190043289 | Cahill | Feb 2019 | A1 |
20190043296 | Baumgarte et al. | Feb 2019 | A1 |
20190145138 | Eickhoff | May 2019 | A1 |
20190153764 | Baumgarte | May 2019 | A1 |
20190203503 | Chang | Jul 2019 | A1 |
20190264486 | Toloday et al. | Aug 2019 | A1 |
20190319557 | Dye et al. | Oct 2019 | A1 |
20190338576 | Wang | Nov 2019 | A1 |
20190345738 | McKibben et al. | Nov 2019 | A1 |
20190376316 | Hsu | Dec 2019 | A1 |
20190376317 | Hsu | Dec 2019 | A1 |
20190383080 | Barbon et al. | Dec 2019 | A1 |
20200037142 | Lofton | Jan 2020 | A1 |
20200190885 | Coleman | Jun 2020 | A1 |
20200256108 | Shetty et al. | Aug 2020 | A1 |
20200327758 | Ma et al. | Oct 2020 | A1 |
20200372743 | Miller et al. | Nov 2020 | A1 |
20210011443 | Mcnamara et al. | Jan 2021 | A1 |
20210012598 | Giebat et al. | Jan 2021 | A1 |
20210023248 | Townsend et al. | Jan 2021 | A1 |
20210056791 | Shen | Feb 2021 | A1 |
20210123287 | Miller et al. | Apr 2021 | A1 |
20210134096 | Pukari | May 2021 | A1 |
20210192876 | Tikkanen | Jun 2021 | A1 |
20210217260 | Chen | Jul 2021 | A1 |
20210252179 | Grinstead et al. | Aug 2021 | A1 |
20210308311 | Stewart et al. | Oct 2021 | A1 |
20220148393 | Shen et al. | May 2022 | A1 |
20220307316 | Soderqvist | Sep 2022 | A1 |
20230104006 | Tien | Apr 2023 | A1 |
Number | Date | Country |
---|---|---|
2014339759 | May 2018 | AU |
0107151 | May 1984 | EP |
1788169 | May 2007 | EP |
3550528 | Sep 2019 | EP |
3805490 | Apr 2021 | EP |
2572027 | Sep 2019 | GB |
20210019168 | Feb 2021 | KR |
20210033154 | Mar 2021 | KR |
8800633 | Jan 1988 | WO |
2021007588 | Jan 2021 | WO |
2021050616 | Mar 2021 | WO |
2021214134 | Oct 2021 | WO |
Number | Date | Country | |
---|---|---|---|
20230343157 A1 | Oct 2023 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 17350108 | Jun 2021 | US |
Child | 18345316 | US |