This invention relates generally to object tracking and control systems and more particularly to enhancements usable with such systems for tracking larger or collections of keys and loose objects other than keys.
Many objects have intrinsic value or have value because they provide access to other valuable objects. For instance, jewelry and coins have inherent and intrinsic value while keys, such as keys to vehicles, have value because they provide access to other valuable objects, namely automobiles and trucks. Further, access to and control of some items, such as narcotics for example, needs to be monitored, tracked, and controlled to assure against unauthorized access or to assure that proper and appropriate access is catalogued. There is a serious need to be able to track, catalogue access to, and control such objects in a way that is reliable, simple to implement, and virtually tamper proof.
In the past, a variety of systems have been implemented to track and control objects. In the case of keys in an automobile dealership, for example, peg boards have been used to keep track of the keys as salespersons, maintenance personnel, and others remove keys for access to vehicles. Generally, sign-out sheets have been used to log the check-in and check-out of such keys. Obviously, such a manual system of tracking has numerous shortcomings due in large part to the very real potential of human error and forgetfulness in carrying out the sign-in and sign-out procedures.
More recently, automated computer controlled key tracking systems have been implemented for tracking, for example, vehicle keys at car lots and keys to the apartments of apartment complexes. One such system particularly applicable to the present invention is the key tracking system disclosed and claimed in my U.S. Pat. Nos. 5,801,628; 6,075,441; 6,317,044; 6,204,764; and 6,407,665, the disclosures of which are hereby incorporated fully by reference. In this system, referred to herein as the “Key Track” system, keys to a vehicle are attached with a rivet or the like to a thin plastic key tag having a depending tongue. The tongue carries a small button-shaped electronic touch memory device, which stores a ID code. The tongues of the key tags are configured to be insertable in an array of slots formed in a panel within a storage drawer. A printed circuit back plane is disposed beneath the array of slots and is provided with a plurality of pairs of metal contacts, each pair of contacts being aligned with a corresponding one of the slots. When the tongue of a key tag is inserted in a selected one of the slots, its touch memory device is engaged by the corresponding pair of contacts.
A computer based controller is electronically coupled through a data matrix to the contacts on the back plane and periodically polls each pair of contacts, preferably several times per second, to determine the presence or absence of a touch memory device and thus which slots contain key tags and which do not. When a slot contains a key tag, the touch memory device of the tag is read to determine its ID code, from which the identity of the particular key on the tag can be determined through a table lookup. In this way, the absence or presence and location of the key tags and their associated keys can be noted by the controller each time the array of contacts are polled. If a tag present in a slot on a prior polling is absent on a subsequent polling, then the controller notes that that the tag and its key has been removed from the storage drawer. Conversely, if a key tag is detected in a previously empty slot, the controller notes that the tag and its key have been replaced in the storage drawer. The removal and replacement of keys is therefore continuously monitored.
An access feature requires an authorized user such a salesperson to enter an ID code to unlock and access the storage drawer. When the history of removal and replacement of key tags and their keys is combined with other information, such as the time at which tags are removed and replaced and the identities of the persons who accessed the drawer and times of access, access to the keys in the drawer can be controlled and a detailed tracking log can be created. This system greatly decreases instances of lost keys, reduces the time required to find checked-out keys, and generally provides automatic tracking and control of the keys, and thus, to a large extent, controls and tracks the vehicles to which they provide access.
While the Key Track system described above has proven extremely valuable in the tracking and control of keys, it nevertheless has been limited somewhat in the situations to which it is readily applicable. For example, the tags used with the system are made of thin relatively flat plastic material that generally provides for the attachment of a single or only a few keys to the tag. It has been difficult to attach a large collection of keys such as keys on a key ring and even more difficult to attach larger special function keys such as keys that incorporate electronic transmitters for locking and unlocking a car remotely. In these situations, it has been experienced that keys can fall or hang into the slots of the Key Track drawer and short out one or more of the contacts on the backplane, resulting in system errors or failure. While simply providing larger tags is helpful, it has not proven to be a complete solution. Furthermore, the system has generally been poorly applicable to the tracking of loose items such as, for example, jewelry, narcotics, and the like because such items cannot easily be attached to a tag. The present invention is intended to enhance and expand the basic Key Track system for application to these and other situations.
Another relative shortcoming of present electronic key tracking systems such as the Key Track system, and object tracking systems in general, has been limitations resulting from the fact that the keys are only detectable upon check-in and check-out at a central storage location. This has meant that tracking of keys has generally been limited to keeping a log of when the keys are physically removed and replaced in a central storage receptacle. The disposition of keys in the interim has not been trackable. Nevertheless, it is clearly useful to track the movement and use of keys and other objects in the interim between the times when they are checked out and checked back in at the central storage location. For example, in the case of tracking use of keys to apartments by maintenance personnel, it is desirable to know not only that a group of keys were checked out and checked back in at particular times, but also when the keys were used in the interim to access apartments. such information can be useful, for example, when claims of theft or vandalism are levied against security personnel. It can also be useful in general security dispatching to insure that security guards check in at all required stations while making security rounds and to log the activities of such guards during their rounds. In the tracking of narcotics at a hospital, it is desirable to know when and by whom particular narcotics are checked out and checked back in and also the time at which the narcotics are accessed in the interim between check-out and check-in times. In this way, confirmation that patients receive the proper prescriptions at the proper times can easily be made by referring to the resulting log of check-out, access, and check in times. The basic Key Track system has not been readily applicable to such situations. Further, in prior Key Track systems, when a key is requested by a user, the computer controller identifies the location of the key in the Key Track drawer by displaying the row and column of the key. Thus user must then locate this row and column to check out the key. In some cases, users consider this system of identifying and locating a requested key to be inconvenient and cumbersome and it can be subject to human error.
Thus, even though the Key Track system has proven very useful, there exists a continuing need to enhance the system by, among other things, providing for the tracking of larger and bulkier keys and key collections, by providing for the tracking and control of the use of keys and other articles in the interim between check out and check in, and, in a more general sense, to provide for the tracking and control of larger or loose items such as jewelry and narcotics. A further need exists for a convenient and more robust method of identifying a requested key or other object to a user so that the user can quickly locate the object for check-out. It is to the provision of such enhancements and improvements that the present invention is primarily directed.
Briefly described, the present invention, in one preferred embodiment thereof, comprises enhancements to the Key Track system disclosed in my above referenced and incorporated U.S. patents in order to adapt the system for use in tracking and controlling large collections of or bulky keys, such as keys on a key ring or remote access transmitter keys, and in tracking and controlling larger or loose objects other than keys. The invention further comprises improved methods, devices, and circuits for identifying a requested key or other object to a user visually by activating a light on a tag or box associated with the requested object.
The heart of the first enhancement is a carrier or box adapted to contain a ring of keys, a larger electronic access key, or objects other than keys, such as, for example, jewelry or narcotics. In one embodiment, the carrier comprises a rectangular box-shaped container with an openable door panel on one side. The door panel may be hinged for access to the container or may be displacably or removably attached in another way such as by sliding attachment slots. In one configuration for use with keys on a key ring, the container has a slot on its bottom side and the key ring is provided with an ID tag having a relatively thin plastic tongue carrying a touch memory device. In use, the container is opened and the key ring is placed in the container with its ID tag extending through the slot in the bottom of the container. The container is then shut to contain the key ring and its keys whereupon the entire container can be selectively placed in and removed from the Key Track drawer with the protruding ID tag extending into one of the key tag slots in the drawer. The key ring is thus tracked and access to it controlled in the same manner as a single key attached to a traditional key tag.
To facilitate the alignment of containers with slots in the Key Track drawer, an overlay formed of stamped metal or a wire grid can be attached within the Key Track drawer overlying the slots. The overlay defines an array of openings, each sized to receive a container. The openings are positioned such that when a container is slid into one of the openings, the protruding ID tag is directed into one of the slots in the drawer allowing the controller to read the presence of the ID tag and its key ring within the drawer.
Another embodiment of the invention is intended for use with bulky keys having built in remote entry transmitters or with remote entry transmitters not combined with keys. It has previously been difficult to attach such items to a key tag in the traditional key track system. A smaller container, preferably made of molded plastic, is sized to contain a remote entry key or transmitter. The container comprises rectangular box having an open side for access. A tongue, similar to the tongues on the key tags of the Key Track system, is fixed to the bottom wall of the container and depends therefrom. A touch memory device is carried by the tongue and the tongue is configured to be inserted into the slots in the Key Track drawer. A sliding panel is adapted to slide onto the container from the bottom side thereof and to cover the open side for closing the container and capturing a key in the container. When a key is closed in the container, the container can be placed in one of the slots in a Key Track drawer with its tongue and touch memory device extending into the slot in the traditional way. The attached controller is thus able to detect and track the insertion and subsequent removal of the container from the drawer. Since the sliding panel is slid onto the box from the bottom to close the container, the panel cannot be removed for access to the key without first removing the container from the Key Track drawer, which will be detected by the controller. Thus, since the keys cannot be removed without detection, a measure of security for relatively expensive remote entry transmitters and keys is provided. In addition, since the key is closed within the container, it is protected and its identity cannot be determined simply by looking into the Key Track drawer. Only the controller is able to identify the location of a particular key within the drawer upon a proper query by an authorized user.
In yet another embodiment of the invention, the carrier and Key Track system are enhanced to expand the system beyond its traditional use for tracking keys to a general object tracking and control system. This embodiment is particularly useful for tracking valuable objects such as jewelry or for tracking the use of controlled substances such as narcotics and medication. A set of containers is provided, each container having a box with an open side and a hinged panel that covers the open side and closes the container. The container is provided with a slot or pocket in which a printed circuit board can be slid. The printed circuit board carries a memory device storing a ID code and may also carry other components such as a microcontroller, ancillary memory, an RF transmitter, an RFID tag, and related components. Conductive pads on the printed circuit board are coupled to the components on the board for electronically accessing the components.
A drawer or other storage receptacle is provided for receiving the containers of this embodiment. The drawer has an overlay panel formed with an array of openings or bays each sized to receive one of the containers. A printed circuit back plane is disposed behind the overlay panel and has a plurality of sets of conductive contacts, each set of contacts positioned to engage the conductive pads of a container's printed circuit board when the container is inserted into the corresponding bay. The contacts are wired in a data matrix, which is connected to a computer-based controller as in the traditional Key Track system. Use of this embodiment is similar to use of the traditional Key Track system. The controller detects and logs the removal and replacement of containers in the drawer by reading the ID codes of the memory devices associated with the containers.
This embodiment also may include a further enhancement wherein the printed circuit boards in the containers are more sophisticated and are configured to log the opening and closing of the container between the times when it is checked out and checked back in at the storage drawer. The container may also be provided with sensors to gather other information in the interim period such as, for example, the times when the container passed location transmitters, identification numbers from patient arm bands or ID buttons, or other information. This information can be downloaded to the controller upon check in and correlated with other information to provide valuable data compilations and reports. Such information is useful, for example, in the dispensing of drugs to patients in a hospital, where it is desired to log when the drugs are checked out, by whom, at what times the container was opened while checked out for access to the drugs stored inside, and the identities of patients provided with drugs. This information can be correlated to medication schedules for patients to insure that patients are being provided with the proper drugs at the proper times.
The printed circuit boards of this embodiment can be even further enhanced with simple RF transmitters and/or RFID tags available from a variety of manufacturers. RFID tags are adapted to transmit a code and/or other information to a receiver coupled to the computer-based controller and can be used as an alternative to touch memory devices. Other RF transmitters can be provided if desired to transmit a code upon the occurrence of prescribed events such as, for example, each time the door of the container is opened and its contents accessed. Such functionality provides for real time tracking of access to the container in the interim between check-out and check-in times.
In another embodiment of the invention, an object container or a key tag is provided with an LED that, when lit, projects a light that is visible to a user when observing all the tags and containers within a Key Trak drawer. Circuitry within the container or tag is adapted to activate the LED when a user requests a key or other trackable object attached to a tag or contained within a container. In one embodiment, the entire upper portion of a key tag is made of a transparent material and the LED directs its light into the bottom of this material. In this way, the edges of the upper portion of the key tag appears to light up when a key attached to the tag is requested by a user. Thus, the user can easily identify the location of and remove a requested key simply by looking into a crowded Key Track drawer and noting the carrier or tag that is lighted. Preferably, a delay function is incorporated into the tag so that the LED remains on for a few seconds after the tag is removed from its slot.
Thus, an improved and enhanced method and system for tracking and controlling keys and other objects is now provided. The traditional Key Track system is enhanced to accommodate large numbers of keys on a key ring, bulky or unusually shaped keys and remote entry transmitters, and valuable or controlled loose objects other than keys. In one embodiment, object containers are provided with active electronics, which tracks and logs access to the container between the times when it is check out and checked back in. In another embodiment, an RF transmitter or RFID tag is provided for radio frequency communication to the controller. Further enhancements include lighting a tag or container associated with a requested object to identify it visually to a requesting user. These and other features, objects, and advantages of the invention will become more apparent upon review of the detailed description set forth below taken in conjunction with the accompanying drawing figures, which are briefly described as follows.
Referring now in more detail to the drawings, in which like numerals refer to like parts throughout the several views,
The bottom panel 14 is provided with a slot 21 that extends from the front edge of the bottom panel to a position inwardly spaced from the front edge. A lateral partition 23 spans the left and right side panels and a pair of guide walls 20 extend between the partition 23 and the bottom panel 14 straddling the location of the slot 21 to define a guide slot 22 between the guide walls 20.
An ID tag 24 is adapted to be received in the guide slot 22 and comprises a head 26 from which a relatively thin tongue 27 depends. The head 26 is sized and shaped to slide, as indicated by arrows 25, into and fit partially within the guide 22 with its tongue 27 projecting downwardly through the slot 21. The tongue 27 may be formed of plastic if desired but also may be formed of a more durable and tamper resistant material such as stainless steel or aluminum. A tongue of stainless steel or aluminum renders the ID tag much less susceptible to tampering or defeat by cutting the ID tag and absconding with the keys, although it requires electrically isolated mounting of the touch memory device as described in more detail below. The location of the ID tag in the slot as described also serves to locate the key ring and the keys attached thereto in the upper portion of the carrier. In this way, the keys are isolated from the tag, are held in place in an organized fashion, and do not interfere with operation of the touch memory device.
The head 26 of the ID tag is adapted to be mounted on a key ring with a group of keys 31 (only a few of which are shown in
In use, the key ring 29 and keys 31 are placed in the carrier 11 as indicated by arrows 25 with the head 26 of the ID tag 24 being inserted into the guide 22 such that its tongue 27 projects downwardly from the container 12 through the slot 21. When so inserted, the keys and key ring reside in the upper portion of the carrier above the location of the partition 23 and the tongue 27 with its touch memory device projects downwardly from the bottom panel 14 through the slot 21. The front panel 19 can then be hinged shut to enclose and contain the keys and keep them from flopping about. The front panel can be releasably latched shut with latch 10 if desired and a lock or tamper evident ring can be installed in the locking tabs 30 and 35 for enhanced security.
When the front panel 19 is closed, the carrier 11 with keys inside forms a rectangular box as illustrated in
It will be noted from
Additional receptacles 44 are also provided in the guide 36 extending therealong and defining an array of carrier receptacles. The guide 36 thus functions to provide an array of receptacles for receiving carriers 11 with each socket properly aligning its respective carrier with a selected slot 33 in the Key Track tray. In addition, the receptacles hold the hinged front panels 19 of the carriers shut when they are in position within the receptacles. This is important because it prevents a thief from opening the receptacle without first removing it from the tray, which will be detected by the controller. If an unauthorized removal is detected by the controller, appropriate alarms can be generated and actions taken to alert security personnel. Thus, an extra measure of security is provided by the overlay.
Vertically depending legs 146 project downwardly from the rails 142 and 143 and are anchored to the key track tray with appropriate fasteners such as shoulders and bolts. The legs 146 secure the wire frame guide to the key track tray and properly position the rectangular receptacles so that when a carrier 11 is inserted into one of the receptacles, the tongue 27 thereof is directed into one of the slots 33. Thus, the wire frame guide performs a function similar to that of the guide of
An ID tab 72 is provided with a touch memory or other ID device 73 and is secured at one end to the bottom panel 62 of the case 57. The ID tab is sized and configured to be inserted into a selected slot of a Key Track tray. In use, a key 71 is placed in the carrier and closed therein by sliding the sliding cover 67 into place. Preferably, the key is secured to the box with a loop of cabling or other appropriate tether (not shown) to prevent the box from becoming separated from its key. The carrier is then stored on the Key Track tray by inserting its ID tab into a selected slot of the tray. The Key Track controller can then track and control access to the key within the carrier in the usual way. Preferably, the carrier 57 is sized to take up no more than one space on the Key Track tray so that other key tags or carriers can be inserted into adjacent slots of the tray.
The carriers of
A back plane 84 is mounted behind or beneath the receptacle panel 83 and preferably is spaced therefrom a distance substantially equal to the height of the rectangular carrier 81. In this way, when the carrier is inserted into the receptacle 82 to the back plane, its top panel 86 is substantially flush with the surface of the receptacle panel 83. As described in more detail below, this configuration inhibits a thief from removing the carrier from the receptacle panel by force.
It will be understood that while only one receptacle and one carrier is illustrated in
In addition to its top panel 86, the carrier 81 is formed with a bottom panel 87, a left side panel 88, a right side panel 89, a back panel 91, and a hinged front panel 92 (
The lower left-hand corner of the carrier 81 is formed with a latch 99 defined by a sloped strike 101 and an indentation 102. A solenoid and plunger assembly 103 is mounted to the back plane 84 at a position adjacent the location of the latch 99 by means of an appropriate mounting bracket (omitted from
A leaf spring or other spring 107 preferably is provided for exerting upward biasing force on a carrier locked in the receptacle. In this way, when the carrier is released by applying an appropriate control signal to the solenoid 103 to retract its plunger, the leaf spring causes the carrier to “pop” up out of the receptacle so that it can be grasped for removal.
As illustrated in
Referring now to
The circuit board 93 carries integrated circuit components for performing the method of the invention. In one embodiment, for example, the circuit board 93 is provided with a touch memory chip such as the touch memory devices provided on ID tags as discussed above. In this case, the chip preferably is surface mounted to the board to save space rather than being housed in a metal case or button. However, the primary function of the memory chip remains the same; that is, to store and transmit its unique internal code when appropriately polled with a polling signal. The memory chip is electrically coupled to the conducting pads 94 at the bottom of the circuit board and the contacts 97 on the back plane are configured and positioned to engage the conductive pads for receiving the ID code of the memory device and transmit it through the data matrix to the controller for detecting the absence or presence and location of the associated carrier within one of the receptacles.
Alternatively, the circuit board might be provided with more sophisticated electronics including a microcontroller or microprocessor 118 and associated components including a crystal 121 and battery 119. A wide variety of configurations are possible and a simple circuit is depicted in
The embodiment of
Alternatively, the microcontroller can be programmed to activate the RF transmitter at intermittent times while the carrier is checked out or to activate the transmitter whenever the door of the carrier is opened or closed. This information, when transmitted back to the main computer based controller, can be tallied in real time as a means of tracking use of the contents of the carrier. These capabilities are useful in a wide variety of situations such as, for example, to track not only when medication was checked out to give to a patient, but the time at which the carrier was opened to administer the medication. Questions about medication delivery can thus be readily answered. A wide variety of other sensors and data gathering capabilities can be provided in such a carrier embodiment including, but not limited to, biometrics information, time and ambient temperature information, information gathered through data ports, and information from various types of on board switches. Further, with on board intelligence, enhanced substantially autonomous functionality is possible. For example, the carrier may be provided with an internal lock that is activated only when an authorized user has checked out or attempts to open the carrier.
Another use of the embodiment of
I/O 1 of the addressable switch 140 in the embodiment illustrated in
In the circuit of
The lower section 208 of the PCB, which defines the lower portion 202 of the key tag, carries electrically conductive pads 212 that are configured and positioned to couple with corresponding electrical contacts of a Key Track system when the lower portion 202 of the key tag is inserted in a slot 210 of the system. In the preferred embodiment, a conductive pad is formed on each side of the lower portion (the pad on one side is hidden in
The upper portion 203 of the key tag 201 is securely mounted within the mid portion 204 of the tag and has a bottom edge that generally abuts the top edge of the PCB within the mid portion. The upper portion 203 extends upwardly from the mid portion 206 to a top edge that, in this embodiment, is shaped with tapers to resemble the top edge of a standard key tag. The upper portion 302 also has vertically extending side edges that merge with the top edge thereof. A key attachment hole 217 is bored through the upper portion 203 of the key tag adjacent the top edge thereof. The hole 217 is sized to receive a rivet 219 or other appropriate fastener for securely fastening a key (or keys) 218 to the key tag in the same way that a key is attached to a standard key tag of a Key Track system. It will be understood in view of the forgoing and upon review of the incorporated patents that the key tag of
The upper portion 203 of the key tag of
It should be appreciated in view of the forgoing that when the LED 216 is lighted upon a request by a user for the key 218, the light projected from the LED into the light guide is carried or directed upwardly within and spreads throughout the upper portion 203 of the key tag. When this light reaches the vertical side edges and top edge of the light guide, it exits the light guide and is projected outwardly from the edges of the key tag as indicated by rays in
As mentioned above, a light guide such as that of
The housing 236 has an internal compartment terminating in a slot 240 with the slot and compartment being configured to receive the upper portion 228 of the PCB. The housing is sized such that when it is slid over the PCB, the electronic circuit 231 is enclosed within and protected by the housing with only the lower portion 227 and its conductive pads depending from the housing for insertion into a slot of a Key Track system (
The housing 236 is further formed with a key attachment hole 237 that aligns with the hole 235 in the PCB when the two components are assembled so that a key or keys can be securely attached to the tag with a rivet or other fastener extending through the aligned holes. A light opening 238, which may or may not include a integral lens, is formed in the top edge of the housing 236 and a similar light opening 239 is formed in the side face of the housing. The light openings 238 and 239 are positioned to align with the LEDs 233 and 234 respectively when the housing and PCB are joined so that light emitted from the LED's can be seen through the holes. Thus, the LED's, when lit, project their light upwardly from the top edge of the key tag and sidewise from the side face of the tag. As with the prior embodiment, when a user requests a key associated with a key tag stored in a Key Track system, the circuit 231 of that key tag lights the LEDs 233 and 234, which, in turn, identify the requested key to the user regardless of the viewing perspective of the user.
The addressable switch in the circuit of
It has been noted during development of lighted key tags that the LED shuts off when the key tag is removed from its slot because the I/O port of the addressable switch resets to a floating state and is pulled high immediately by the battery. However, it is desirable for the key tag to stay lighted for a short period after it is removed from its slot as a confirmation to the user that the correct tag has indeed been removed from the Key Track system. In order to address this need, the circuit of
The invention has been described herein in terms of preferred embodiments and methodologies. It will be clear to those of skill in the art, however, that various additions, deletions, and modifications might well be made to the illustrated embodiments within the scope of the invention. For example, the tag lighting technique of
The present patent application is a continuation of U.S. patent application Ser. No. 10/355,773, filed on Jan. 31, 2003, now U.S. Pat. No. 6,891,473; which application is a continuation-in-part of co-pending U.S. patent application Ser. No. 10/005,235 filed on Dec. 5, 2001, now U.S. Pat. No. 6,693,538, which is a continuation of U.S. patent application Ser. No. 09/792,987 filed Feb. 26, 2001, now U.S. Pat. No. 6,501,379, which is a continuation of U.S. patent application Ser. No. 09/393,225 filed Sep. 9, 1999, now U.S. Pat. No. 6,195,005, which, in turn, claims the benefit of the filing date of U.S. provisional patent application Ser. No. 60/099,954 filed Sep. 11, 1998.
Number | Name | Date | Kind |
---|---|---|---|
29236 | Walter | Jul 1860 | A |
527589 | Bristol | Oct 1894 | A |
2859789 | Buckett | Nov 1958 | A |
2971806 | Andreasen | Feb 1961 | A |
3451043 | Krause | Jun 1969 | A |
3648241 | Naito et al. | Mar 1972 | A |
4060795 | Harumiya et al. | Nov 1977 | A |
4112717 | Bradley | Sep 1978 | A |
4209787 | Freeny, Jr. | Jun 1980 | A |
4267942 | Wick, Jr. et al. | May 1981 | A |
4275385 | White | Jun 1981 | A |
4419734 | Wolfson et al. | Dec 1983 | A |
4519522 | McElwee | May 1985 | A |
4549170 | Serres et al. | Oct 1985 | A |
4575719 | Bertagana et al. | Mar 1986 | A |
4595922 | Cobb et al. | Jun 1986 | A |
4635053 | Banks et al. | Jan 1987 | A |
4636634 | Harper et al. | Jan 1987 | A |
4636950 | Caswell et al. | Jan 1987 | A |
4658357 | Carroll et al. | Apr 1987 | A |
4661806 | Peters et al. | Apr 1987 | A |
4673915 | Cobb | Jun 1987 | A |
4737910 | Kimbrow | Apr 1988 | A |
4783655 | Cobb et al. | Nov 1988 | A |
4796209 | Burk | Jan 1989 | A |
4799587 | Desanto | Jan 1989 | A |
4812985 | Hambrick et al. | Mar 1989 | A |
4814592 | Bradt et al. | Mar 1989 | A |
4827395 | Anders et al. | May 1989 | A |
4839875 | Kuriyama et al. | Jun 1989 | A |
4845492 | Cobb et al. | Jul 1989 | A |
4853692 | Wolk et al. | Aug 1989 | A |
4866661 | dePrins | Sep 1989 | A |
4882569 | Dey | Nov 1989 | A |
4885571 | Pauley et al. | Dec 1989 | A |
4889977 | Haydon | Dec 1989 | A |
4896024 | Morello et al. | Jan 1990 | A |
4918432 | Pauley et al. | Apr 1990 | A |
4926161 | Cupp | May 1990 | A |
D308777 | Gambello | Jun 1990 | S |
4940966 | Pettigrew et al. | Jul 1990 | A |
4960651 | Pettigrew et al. | Oct 1990 | A |
4967906 | Morello et al. | Nov 1990 | A |
5021778 | Walton | Jun 1991 | A |
5038023 | Saliga | Aug 1991 | A |
5062151 | Shipley | Oct 1991 | A |
5099227 | Geiszler et al. | Mar 1992 | A |
5172829 | Dellicker, Jr. | Dec 1992 | A |
5182570 | Nysen et al. | Jan 1993 | A |
5218344 | Ricketts | Jun 1993 | A |
5287414 | Foster | Feb 1994 | A |
5319544 | Schmerer et al. | Jun 1994 | A |
5335170 | Petteruti et al. | Aug 1994 | A |
5374815 | Waterhouse et al. | Dec 1994 | A |
5402104 | LaRosa | Mar 1995 | A |
5404384 | Colburn et al. | Apr 1995 | A |
5405048 | Rogers et al. | Apr 1995 | A |
5426284 | Doyle | Jun 1995 | A |
5434775 | Sims et al. | Jul 1995 | A |
5448110 | Tuttle et al. | Sep 1995 | A |
5455409 | Smith et al. | Oct 1995 | A |
5480062 | Rogers et al. | Jan 1996 | A |
5510770 | Rhoads | Apr 1996 | A |
5521815 | Rose, Jr. | May 1996 | A |
5525969 | LaDue | Jun 1996 | A |
5528222 | Moskowitz et al. | Jun 1996 | A |
5533079 | Colburn et al. | Jul 1996 | A |
5554974 | Brady et al. | Sep 1996 | A |
D375857 | De Blois | Nov 1996 | S |
5574470 | de Vall | Nov 1996 | A |
5612683 | Trempala et al. | Mar 1997 | A |
5627520 | Grubbs et al. | May 1997 | A |
5635693 | Benson et al. | Jun 1997 | A |
5661457 | Ghaffari et al. | Aug 1997 | A |
D383341 | Grosfillex | Sep 1997 | S |
5671362 | Cowe et al. | Sep 1997 | A |
5689238 | Cannon, Jr. et al. | Nov 1997 | A |
5703785 | Bluemel et al. | Dec 1997 | A |
5708419 | Isaacson et al. | Jan 1998 | A |
5721531 | Garver et al. | Feb 1998 | A |
5736929 | Schrott et al. | Apr 1998 | A |
5739765 | Stanfield et al. | Apr 1998 | A |
5745366 | Higham et al. | Apr 1998 | A |
5768921 | Hill | Jun 1998 | A |
5771003 | Seymour | Jun 1998 | A |
5777884 | Belka et al. | Jul 1998 | A |
5794213 | Markman | Aug 1998 | A |
5801628 | Maloney | Sep 1998 | A |
5805074 | Warren et al. | Sep 1998 | A |
5821859 | Schrott et al. | Oct 1998 | A |
5836002 | Morstein et al. | Nov 1998 | A |
5905653 | Higham et al. | May 1999 | A |
5934499 | Van der Hoven | Aug 1999 | A |
5936527 | Isaacman et al. | Aug 1999 | A |
5957372 | Dean et al. | Sep 1999 | A |
D415367 | Smith | Oct 1999 | S |
5961036 | Michael et al. | Oct 1999 | A |
5963134 | Bowers et al. | Oct 1999 | A |
5971593 | McGrady | Oct 1999 | A |
6054924 | Dames et al. | Apr 2000 | A |
6069563 | Kadner et al. | May 2000 | A |
6073834 | Michael et al. | Jun 2000 | A |
6075441 | Maloney | Jun 2000 | A |
D429093 | Miller | Aug 2000 | S |
6131808 | Oires et al. | Oct 2000 | A |
6148271 | Marinelli | Nov 2000 | A |
6195005 | Maloney | Feb 2001 | B1 |
6204764 | Maloney | Mar 2001 | B1 |
6232876 | Maloney | May 2001 | B1 |
6292795 | Peters et al. | Sep 2001 | B1 |
6431438 | Pires et al. | Aug 2002 | B1 |
6707381 | Maloney | Mar 2004 | B1 |
6788997 | Frederick | Sep 2004 | B1 |
Number | Date | Country |
---|---|---|
1364535 | Aug 1974 | GB |
WO9504324 | Feb 1993 | WO |
WO9512858 | May 1995 | WO |
WO 9631790 | Oct 1996 | WO |
WO 9704338 | Feb 1997 | WO |
WO 9709687 | Mar 1997 | WO |
WO 9748990 | Dec 1997 | WO |
WO 9815851 | Apr 1998 | WO |
WO 9815853 | Apr 1998 | WO |
WO 9826312 | Jun 1998 | WO |
WO 9909436 | Feb 1999 | WO |
WO 9923741 | May 1999 | WO |
WO 9935516 | Jul 1999 | WO |
Number | Date | Country | |
---|---|---|---|
20050179547 A1 | Aug 2005 | US |
Number | Date | Country | |
---|---|---|---|
60099954 | Sep 1998 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10355773 | Jan 2003 | US |
Child | 11040349 | US | |
Parent | 09792987 | Feb 2001 | US |
Child | 10005235 | US | |
Parent | 09393225 | Sep 1999 | US |
Child | 09792987 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10005235 | Dec 2001 | US |
Child | 10355773 | US |