The present invention relates to power tools that communicate with an external device.
One embodiment provides a method of programming a power tool from an external device. The method includes establishing, with an external wireless communication controller of the external device, a first communication link with a server. The server includes a profile bank that includes mode profiles generated by a plurality of users, and the mode profiles include power tool configuration data. The method further includes receiving, with the external wireless communication controller over the first communication link, a list of mode profiles representing a subset of the mode profiles of the profile bank. The method further includes receiving, in response to user input from a first user on the external device, a selection of a mode profile from the list of mode profiles. The method further includes transmitting, with the external wireless communication controller over the first communication link, the selection of the mode profile. The method further includes receiving, with the external wireless communication controller over the first communication link, the mode profile, the mode profile having been generated by a second user. The method further includes transmitting wirelessly, to the power tool, the mode profile to configure the power tool.
Another embodiment provides a method of providing power tool configuration data to an external device. The method includes establishing, with a network interface of a server, a first communication link with the external device. The server includes a profile bank that includes mode profiles generated by a plurality of users, and the mode profiles include power tool configuration data. The method further includes transmitting, from the network interface over the first communication link, a list of mode profiles representing a subset of the mode profiles of the profile bank. The method further includes receiving, with the network interface over the first communication link, a selection of a mode profile from the subset of the mode profiles. The selection of the mode profile is made by a first user. The method further includes transmitting, from the network interface over the first communication link, the mode profile, the mode profile having been generated by a second user.
Another embodiment provides a server accessible by an external device. The server comprises a processor, a network interface, and a memory. The network interface establishes a first communication link with the external device. The memory includes a profile bank that includes mode profiles generated by a plurality of users. The mode profiles include power tool configuration data. The network interface is configured to transmit, over the first communication link, a list of mode profiles representing a subset of the mode profiles of the profile bank. The network interface is further configured to receive, over the first communication link, a selection of a mode profile from the subset of the mode profiles. The selection of the mode profile is made by a first user. The network interface is further configured to transmit, over the first communication link, the mode profile, wherein the mode profile was generated by a second user.
Before any embodiments of the invention are explained in detail, it is to be understood that the invention is not limited in its application to the details of construction and the arrangement of components set forth in the following description or illustrated in the following drawings. The invention is capable of other embodiments and of being practiced or of being carried out in various ways. Also, it is to be understood that the phraseology and terminology used herein is for the purpose of description and should not be regarded as limited. The use of “including,” “comprising” or “having” and variations thereof herein is meant to encompass the items listed thereafter and equivalents thereof as well as additional items. The terms “mounted,” “connected” and “coupled” are used broadly and encompass both direct and indirect mounting, connecting and coupling. Further, “connected” and “coupled” are not restricted to physical or mechanical connections or couplings, and can include electrical connections or couplings, whether direct or indirect.
It should be noted that a plurality of hardware and software based devices, as well as a plurality of different structural components may be utilized to implement the invention. Furthermore, and as described in subsequent paragraphs, the specific configurations illustrated in the drawings are intended to exemplify embodiments of the invention and that other alternative configurations are possible. The terms “processor” “central processing unit” and “CPU” are interchangeable unless otherwise stated. Where the terms “processor” or “central processing unit” or “CPU” are used as identifying a unit performing specific functions, it should be understood that, unless otherwise stated, those functions can be carried out by a single processor, or multiple processors arranged in any form, including parallel processors, serial processors, tandem processors or cloud processing/cloud computing configurations.
The external device 108 may be, for example, a smart phone (as illustrated), a laptop computer, a tablet computer, a personal digital assistant (PDA), or another electronic device capable of communicating wirelessly with the power tool device 102 and providing a user interface. The external device 108 provides the user interface and allows a user to access and interact with tool information. The external device 108 can receive user inputs to determine operational parameters, enable or disable features, and the like. The user interface of the external device 108 provides an easy-to-use interface for the user to control and customize operation of the power tool.
The external device 108 includes a communication interface that is compatible with a wireless communication interface or module of the power tool device 102. The communication interface of the external device 108 may include a wireless communication controller (e.g., a Bluetooth® module), or a similar component. The external device 108, therefore, grants the user access to data related to the power tool device 102, and provides a user interface such that the user can interact with the controller of the power tool device 102.
In addition, as shown in
The power tool device 102 is configured to perform one or more specific tasks (e.g., drilling, cutting, fastening, pressing, lubricant application, sanding, heating, grinding, bending, forming, impacting, polishing, lighting, etc.). For example, an impact wrench is associated with the task of generating a rotational output (e.g., to drive a bit), while a reciprocating saw is associated with the task of generating a reciprocating output motion (e.g., for pushing and pulling a saw blade). The task(s) associated with a particular tool may also be referred to as the primary function(s) of the tool.
The particular power tool devices 102 illustrated and described herein (e.g., an impact driver) are merely representative as embodiments include a variety of types of power tools 102 (e.g., a power drill, a hammer drill, a pipe cutter, a sander, a nailer, a grease gun, etc.).
As also shown in
The switching network 216 enables the controller 226 to control the operation of the motor 214. Generally, when the trigger 212 is depressed as indicated by an output of the trigger switch 213, electrical current is supplied from the battery pack interface 222 to the motor 214, via the switching network 216. When the trigger 212 is not depressed, electrical current is not supplied from the battery pack interface 222 to the motor 214.
In response to the controller 226 receiving the activation signal from the trigger switch 213, the controller 226 activates the switching network 216 to provide power to the motor 214. The switching network 216 controls the amount of current available to the motor 214 and thereby controls the speed and torque output of the motor 214. The switching network 216 may include numerous field-effect transistors (FETs), bipolar transistors, or other types of electrical switches. For instance, the switching network 216 may include a six-FET bridge that receives pulse-width modulated (PWM) signals from the controller 226 to drive the motor 214.
The sensors 218 are coupled to the controller 226 and communicate to the controller 226 various signals indicative of different parameters of the power tool 104 or the motor 214. The sensors 218 include Hall sensors 218a, current sensors 218b, among other sensors, such as, for example, one or more voltage sensors, one or more temperature sensors, and one or more torque sensors. Each Hall sensor 218a outputs motor feedback information to the controller 226, such as an indication (e.g., a pulse) when a magnet of the motor's rotor rotates across the face of that Hall sensor. Based on the motor feedback information from the Hall sensors 218a, the controller 226 can determine the position, velocity, and acceleration of the rotor. In response to the motor feedback information and the signals from the trigger switch 213, the controller 226 transmits control signals to control the switching network 216 to drive the motor 214. For instance, by selectively enabling and disabling the FETs of the switching network 216, power received via the battery pack interface 222 is selectively applied to stator coils of the motor 214 to cause rotation of its rotor. The motor feedback information is used by the controller 226 to ensure proper timing of control signals to the switching network 216 and, in some instances, to provide closed-loop feedback to control the speed of the motor 214 to be at a desired level.
The indicators 220 are also coupled to the controller 226 and receive control signals from the controller 226 to turn on and off or otherwise convey information based on different states of the power tool 104. The indicators 220 include, for example, one or more light-emitting diodes (“LED”), or a display screen. The indicators 220 can be configured to display conditions of, or information associated with, the power tool 104. For example, the indicators 220 are configured to indicate measured electrical characteristics of the power tool 104, the status of the power tool 104, the mode of the power tool (discussed below), etc. The indicators 220 may also include elements to convey information to a user through audible or tactile outputs.
As described above, the controller 226 is electrically and/or communicatively connected to a variety of modules or components of the power tool 104. In some embodiments, the controller 226 includes a plurality of electrical and electronic components that provide power, operational control, and protection to the components and modules within the controller 226 and/or power tool 104. For example, the controller 226 includes, among other things, a processing unit 230 (e.g., a microprocessor, a microcontroller, or another suitable programmable device), a memory 232, input units 234, and output units 236. The processing unit 230 (herein, processor 230) includes, among other things, a control unit 240, an arithmetic logic unit (“ALU”) 242, and a plurality of registers 244 (shown as a group of registers in
The memory 232 includes, for example, a program storage area 233a and a data storage area 233b. The program storage area 233a and the data storage area 233b can include combinations of different types of memory, such as read-only memory (“ROM”), random access memory (“RAM”) (e.g., dynamic RAM [“DRAM”], synchronous DRAM [“SDRAM”], etc.), electrically erasable programmable read-only memory (“EEPROM”), flash memory, a hard disk, an SD card, or other suitable magnetic, optical, physical, or electronic memory devices. The processor 230 is connected to the memory 232 and executes software instructions that are capable of being stored in a RAM of the memory 232 (e.g., during execution), a ROM of the memory 232 (e.g., on a generally permanent basis), or another non-transitory computer readable medium such as another memory or a disc. Software included in the implementation of the power tool 104 can be stored in the memory 232 of the controller 226. The software includes, for example, firmware, one or more applications, program data, filters, rules, one or more program modules, and other executable instructions. The controller 226 is configured to retrieve from memory and execute, among other things, instructions related to the control processes and methods described herein. The controller 226 is also configured to store power tool information on the memory 232 including operational data, information identifying the type of tool, a unique identifier for the particular tool, and other information relevant to operating or maintaining the power tool 104. The tool usage information, such as current levels, motor speed, motor acceleration, motor direction, number of impacts, may be captured or inferred from data output by the sensors 218. Such power tool information may then be accessed by a user with the external device 108. In other constructions, the controller 226 includes additional, fewer, or different components.
The wireless communication controller 250 is coupled to the controller 226. In the illustrated embodiment, the wireless communication controller 250 is located near the foot of the power tool 104 (see
As shown in
In the illustrated embodiment, the wireless communication controller 250 is a Bluetooth® controller. The Bluetooth® controller communicates with the external device 108 employing the Bluetooth ® protocol. Therefore, in the illustrated embodiment, the external device 108 and the power tool 104 are within a communication range (i.e., in proximity) of each other while they exchange data. In other embodiments, the wireless communication controller 250 communicates using other protocols (e.g., Wi-Fi, cellular protocols, a proprietary protocol, etc.) over different types of wireless networks. For example, the wireless communication controller 250 may be configured to communicate via Wi-Fi through a wide area network such as the Internet or a local area network, or to communicate through a piconet (e.g., using infrared or NFC communications). The communication via the wireless communication controller 250 may be encrypted to protect the data exchanged between the power tool 104 and the external device/network 108 from third parties.
The wireless communication controller 250 is configured to receive data from the power tool controller 226 and relay the information to the external device 108 via the transceiver and antenna 254. In a similar manner, the wireless communication controller 250 is configured to receive information (e.g., configuration and programming information) from the external device 108 via the transceiver and antenna 254 and relay the information to the power tool controller 226.
The RTC 260 increments and keeps time independently of the other power tool components. The RTC 260 receives power from the battery pack 215 when the battery pack 215 is connected to the power tool 104 and receives power from the back-up power source 252 when the battery pack 215 is not connected to the power tool 104. Having the RTC 260 as an independently powered clock enables time stamping of operational data (stored in memory 232 for later export) and a security feature whereby a lockout time is set by a user and the tool is locked-out when the time of the RTC 260 exceeds the set lockout time. The other components of the wireless communication controller 250 also receive power from the battery pack 215, if present, or else from the back-up power source 252. Accordingly, the wireless communication controller 250 is operable to function, at least on a limited basis, when the battery pack 215 is not present or has a low state of charge. For instance, the tool 104 is operable to identify itself to the external device 108 even when the battery pack 215 is not present or is low. In some embodiments, the wireless communication controller 250 includes the voltage sensor 265 (see
The power tool 104 periodically, or upon request, broadcasts identifying information to the external device 108. The memory 232 stores various identifying information of the power tool 104 including the unique binary identifier (UBID), an ASCII serial number, an ASCII nickname, and a decimal catalog number. The UBID both uniquely identifies the type of tool and provides a unique serial number for each power tool 104. For instance, the UID is five bytes total, with two bytes dedicated to the type of tool and three bytes dedicated to the serial number of the tool. For instance, the first two byes may identify the type of tool as hammer drill model number 1234, impact driver model number 2345, or circular saw model number 3456. The ASCII serial number is a thirteen ASCII character code that uniquely identifies the tool 104. The ASCII nickname may be limited to a certain number of characters, such as twenty ASCII characters. The UBID, serial number, and catalog number are set and stored in the memory 232 at the manufacturer and are intended to be permanent. At the time of manufacture, a default nickname may also be provided to each power tool 104 (e.g., “impact driver”). However, the ASCII nickname may be over-written by a user via the external device 108. Additional or alternative techniques for uniquely identifying the power tool 104 are used in some embodiments. For instance, in addition to or instead of the above-noted identifiers, the memory 232 stores an Internet Protocol (IP) address, a media access control (MAC) address, and/or subscriber identity module (SIM) address to uniquely identify the power tool 104. Each of these identifiers may be stored on both the power tool 104 and the server 112 and are associated with one another. Thus, the power tool 104 can be named and identified in multiple ways that are globally unique, and cross referenced with other identifiers that are personally unique or meaningful for users. In some embodiments, a radio frequency identification (RFID) tag is incorporated in or on the power tool 104. The RFID tag includes one or more of the noted identifiers of the power tool 104, and the external device 108 is operable to scan and read the identifier(s) from a memory of the RFID tag to identify the associated power tool 104.
The power tool 104 has five selectable modes (one, two, three, four, and adaptive), each associated with a different one of the mode indicators 294a-e. The mode selection switch 290 is a pushbutton that cycles through the five selectable modes upon each press (e.g., mode 1, 2, 3, 4, 5, 1, 2, and so on). The adaptive mode is represented by the indicating symbol 298e (the radio wave symbol). In the adaptive mode, the user is able to configure the power tool 104 via the external device 108, as is described in further detail below. In other embodiments, the power tool 104 has more or fewer modes, and the mode selection switch 290 may be a different type of switch such as, for example, a slide switch.
The external device 108 includes a memory 310 storing core application software 312, tool mode profiles 314, temporary configuration data 316, tool interfaces 318, tool data 320 including received tool identifiers 322 and received tool operational data 324, and permissions data 326. The external device 108 further includes a processor 330, a touch screen display 332, and an external wireless communication controller 334. The processor 330 and memory 310 may be part of a controller having similar components as controller 226. The touch screen display 332 allows the external device 108 to output visual data to a user and receive user inputs. Although not illustrated, the external device 108 may include further user input devices (e.g., buttons, dials, toggle switches, and a microphone for voice control) and further user outputs (e.g., speakers and tactile feedback elements). Additionally, in some instances, the external device 108 has a display without touch screen input capability and receives user input via other input devices, such as buttons, dials, and toggle switches. The external device 108 communicates wirelessly with the wireless communication controller 250 via the external wireless communication controller 334, e.g., using a Bluetooth® or Wi-Fi® protocol. The external wireless communication controller 334 further communicates with the network 114. In some instances, the external wireless communication controller 334 includes two separate wireless communication controllers, one for communicating with the wireless communication controller 250 (e.g., using Bluetooth® or Wi-Fi® communications) and one for communicating with the network 114 (e.g., using Wi-Fi or cellular communications).
The server 112 includes a processor 340 that communicates with the external device 108 over the network 114 using a network interface 342 and a search engine 343. The communication link between the network interface 342, the network 114, and the external wireless communication controller 334 may include various wired and wireless communication pathways, various network components, and various communication protocols. The server 112 further includes a memory 344 including a tool profile bank 346, tool data 348, and permissions and group data 349. The search engine 343 receives search requests, e.g., from the external device 108, having search parameters. The search engine 343 searches one or more databases on the memory 344 (e.g., the tool profile bank 346) and generates a result list. The results list is transmitted back to the requester via the network interface 342.
Returning to the external device 108, the core application software 312 is executed by the processor 330 to generate a graphical user interface (GUI) on the touch screen display 332 enabling the user to interact with the power tool 104 and server 112. In some embodiments, a user may access a repository of software applications (e.g., an “app store” or “app marketplace”) using the external device 108 to locate and download the core application software 312, which may be referred to as an “app.” The tool profiles 314, tool interfaces 318, or both may be bundled with the core application software 312 such that, for instance, downloading the “app” includes downloading the core application software 312, tool profiles 314, and tool interfaces 318. In some embodiments, the app is obtained using other techniques, such as downloading from a website using a web browser on the external device 108. As will become apparent from the description below, at least in some embodiments, the app on the external device 108 provides a user with a single entry point for controlling, accessing, and/or interacting with a multitude of tool types. This approach contrasts with, for instance, having a unique app for each tool type or for small groupings of related tool types.
The UBID received from the advertising tools 354 is used by the external device 108 to identify the tool type of each advertising tool 354. For instance, the external device 108 converts the first two bytes of the UBID to decimal and displays on the identified tool list 356 the tool type by listing the catalog number (e.g., “2757-20” and “7206-20”). In some instances, a table of tool types is included in the external device 108 indexable by the UBID (e.g., the first two bytes), allowing the external device 108 to display the tool type in another form or language (e.g., “impact driver” or “circular saw”).
Additionally, UBIDs received from advertising tools 354 in response to a scan are used to obtain further information about the tool, if available. For instance, the tool data 348 of the server 112 may be a database storing tool information according to UBIDs and the permissions and group data 349 may also be a database storing tool permission levels indexable using the UBID. Accordingly, the UBID may be sent to the server 112, used as an index in the tool data 348 and in the permissions and group data 349, and the server 112 may respond to the external device 108 with tool information and permission levels from these databases. For instance, the database may store and respond to the external device 108 with the ASCII nickname, other tool identifiers, an icon, and permission levels. The external device 108, in turn, displays the ASCII nickname, ASCII serial number, and icon. As shown in the nearby devices screen 350, the advertising tool 354a and 354b include the ASCII nickname, serial number 359, and icon. In some instances, the advertising tools 354 provide the further tool identifiers to the external device 108, rather than the external device 108 obtaining the information from the server 112. In some instances, the external device 108 includes a cache of tool information stored in tool data 320 for power tools 104 previously paired with the external device 108, and which is indexable by the UBID. The cached tool information may include the icon and other identifiers. In some instances, the advertising tool 354c does not include an ASCII nickname and serial number in the identified tool list 356 because the advertising tool 354c is in an advertising state and (a) the additional identifiers are not transmitted to the external device 108 while in the advertising state and (b) the external device 108 has not yet obtained the additional identifiers from the server 112 or the additional identifiers are not available on the server 112.
From the nearby devices screen 350, a user can select one of the advertising tools 354 from the identified tool list 356 to communicatively pair with the selected advertising tool 354. Each type of power tool 104 with which the external device 108 can communicate includes an associated tool graphical user interface (tool interface) stored in the tool interfaces 318. Once a communicative pairing occurs, the core application software 312 accesses the tool interfaces 318 (e.g., using the UBID) to obtain the applicable tool interface for the type of tool that is paired. The touch screen 332 then shows the applicable tool interface. A tool interface includes a series of screens enabling a user to obtain tool operational data, configure the tool, or both. While some screens and options of a tool interface are common to multiple tool interfaces of different tool types, generally, each tool interface includes screens and options particular to the associated type of tool. The power tool 104 has limited space for user input buttons, triggers, switches, and dials. However, the external device 108 and touch screen 332 provide a user the ability to map additional functionality and configurations to the power tool 104 to change the operation of the tool 104. Thus, in effect, the external device 108 provides an extended user interface for the power tool 104, providing further customization and configuration of the power tool 104 than otherwise possible or desirable through physical user interface components on the tool. Examples further explaining aspects and benefits of the extended user interface are found below.
Selecting tool controls 374 causes a control screen of the tool interface to be shown, such as the control screen 380 of
When in the adaptive mode, the currently selected profile that is shown on the control screen is the temporary profile 300e. Additionally, when the power tool 104 is in the adaptive mode, the power tool 104 is operated according to the temporary profile 300e. Upon entering the adaptive mode, a default profile or one of the profiles 300a-d may be saved as the temporary profile 300e. Further, assuming that the power tool 104 is in the adaptive mode, after the external device 108 initially loads the control screen (e.g., control screen 380) upon selecting the tool controls 374, the user may select a new source of profile data for the temporary file. For instance, upon selecting one of the mode profile buttons 400 (e.g., mode 1, mode 2, mode 3, or mode 4) the associated profile 300a-d is saved as the temporary profile 300e and sent to the external device 108 and populates the control screen (according to the profile type and profile parameters).
Additionally, assuming the power tool 104 is in the adaptive mode, a user may select a profile type using the setup selector 401. Upon selecting the setup selector 401, a list of available profiles (profile list) 402 for the particular type of paired power tool 104 is shown (see, e.g.,
If the adaptive mode is currently selected on the power tool 104, as indicated by the indicating symbol 298e (
When the power tool 104 is in the adaptive mode and the user selects the tool controls 374 on the home screen, the user is able to configure profile data of the power tool 104 using a control screen of the tool interface. For instance, via the control screen 380, the user is able to configure the current profile data of the temporary profile 300e of the power tool 104. As illustrated, the user is able to adjust the maximum speed via the speed text box 390 or the speed slider 391; enable/disable the custom drive control using the toggle 392; alter the trigger ramp up parameter via slider 393; adjust the work light duration with slider 394a, work light text box 394b, and “always on” toggle 394c; and adjust the work light intensity via the work light brightness options 396. Upon enabling the toggle 392, the torque level control elements become active and are no longer greyed-out, such that a user can adjust the torque level using the slider 397 or torque text box 398.
In some embodiments, the external device 108 and power tool 104 enable live updating of the temporary profile 300e. When live updating, the temporary profile 300e of the power tool 104 is updated as changes to the parameters are made on the control screen 380 without requiring a subsequent saving step or actuation being taken by the user on the graphical user interface of the external device 108 or on the power tool. For instance, with respect to
A user is also able to save a profile set via a control screen (e.g., the control screen 380) to the power tool 104. More particularly, the user is able to overwrite one of the profiles 300a-d in the profile bank 302 with the profile as specified on a control screen. To save the profile generated by the user via the control screen 380, the user selects the save button 408. As shown in
In addition to sending the generated profile to the power tool 104 in response to saving the generated profile via save button 412, the external device 108 sends the generated profile to the server 112 via the network 114 for saving in the tool profile bank 346. In some instances, the generated profile is also stored locally on the external device 108 within the tool profiles 314 upon selecting the save button 412. In the power tool 104, server 112, and external device 108, the profile name entered by the user on save prompt 410 is saved with the generated profile. In some embodiments, rather than the actual profile name, a unique hash of the profile name is saved with the generated profile.
The profiles in the tool profile bank 346 of the server 112 may be saved according to a user identifier and a group of which the user is a member. For instance, a user may enter a user name/identifier (User A or bob_smith), a group name/identifier (Group I or Acme Company), and password via the touch screen 332 when initially accessing the graphical user interface of the core application software 312 (e.g., just after launching the app). The external device 108 may provide the user identifier and group identifier to the server 112 along with sending the generated profile for saving in the tool profile bank 346. Accordingly, the profiles generated and saved by a user are associated with the user and the user's group in the tool profile bank 346. In some instances, the user need not provide the group name at login (or for other requests) because the server 112 maintains user-group associations and, therefore, the username is sufficient for the server 112 to determine a group affiliation of the user.
Returning to
Additionally, a user can select or filter the profiles to be displayed in the profile list 402 using a default profiles tab 418, a my profiles tab 420, a group profiles tab 422, and an all profiles tab 424. Upon selection of the default profiles tab 418, the profiles list 402 lists the default profiles associated with the particular type of tool to which the external device 108 is paired (e.g., profiles from the power tool manufacturer that are associated with the tool type). In the example of
Upon selection of the group profiles tab 422, the profiles list 402 lists the profiles added by an administrator of the group, added by other users of the group, or both, depending on the embodiment. In the example of
The server 112 may include one or more databases associating users and groups with the profiles in the tool profile bank 346. For instance, for each user, the server 112 may track the profiles of the tool profile bank 346 that are part of the user's “my profiles,” and for each group, the server 112 may track the profiles that are part of the group's “group profiles.” Thus, in response to a user selecting the my profiles tab 420, the external device 108 sends a request with the user's identity to the server 112 for the profiles of the tool profile bank 346 that are associated with the user's “my profiles.” The server 112 then responds with the listing of profiles, which are displayed as a profiles list on the external device 108. The server 112 includes another database having default profiles associated with particular tools to provide the list of default profiles to the external device 108 in response to the user selecting the default profiles tab 418.
The graphical user interface of
For instance, the user can input “deck” as a keyword and check the “user-generated” box of the filters 432, and then select a search button 433. The external device 108 would provide the keywords and filter selections to the server 112, which includes the search engine 343 for searching the tool profile bank 346. The search engine 343 will return to the external device 108 names of profiles in the tool profile bank 346 that were user-generated and that match or nearly match the keywords. For instance,
The share level of each profile defines whether a particular profile will be able to be found through searching and added to another user's profiles. The share level may be, for example, public, private, or group. Profiles with a public share level are generally discoverable by all users. Profiles with a private share level are generally not discoverable through searching and are only retrievable by the creator of that profile. Profiles with a group share level are discoverable by the creator of the profile as well as by other users/members of the group to which the creator belongs. For instance, if user A and user B are in a group I, and user A creates a profile (“profile 123”) with a share level of “group,” user B will be able to search and find profile 123, add profile 123 to the my profiles list of user B, and assign the profile 123 to a paired power tool 104. However, a user C who is not a member of group I will not be able to find profile 123 through searching and, thus, will not be able to add profile 123 to the my profiles list of user C or assign the profile 123 to a paired tool 104. In some embodiments, other share levels are assigned to profiles to provide different levels of access and modification rights to a profile.
As shown in
While
Returning to
Returning to
Additionally, via the profile information screen, the external device 108 provides additional management options: rename, edit, delete, and share. By selecting rename, a user can modify the profile name of the profile. By selecting edit, the user can modify the parameter values of the profile. Renaming and editing involves the external device 108 receiving modification input from the user, the external device 108 providing the modification input to the server 112, and updating the profile in the tool profile bank 346 by the server 112. However, such updates are not sent to the tool. Rather, a user would navigate via the tool controls 374 on the home screen 370 to update a profile stored on the tool 104. By selecting delete, the profile is deleted from the list of profiles forming “my profiles.” The profile, however, may remain in the tool profile bank 346 on the server 112. Upon selecting share, a user is able to specify one or more other users or groups to which the profile is to be offered. The server 112, in turn, generates a share profile offer to the recipient(s) including profile information (e.g., the information illustrated in
Furthermore, upon selecting share, a user may alter the share level (privacy setting) of the profile. For instance, when a profile is created and saved in the tool profile bank 346, by default, the saved profile may have a share level set to private. As noted above, the search engine may ignore profiles set to private when generating a list of search results. Thus, another user that searches for profiles to add (e.g., via the profile search screen 428) would not be able to locate or add profiles that a user has set to private. However, via the share option on the profile information screen, the user is able to change the share level to be public, private, group, or another share level. In turn, the search engine will be able to generate a results list that includes shareable profiles. In some embodiments, the default share level setting is set to public or group.
Thus, the communication system 100 enables the creation and sharing of tool profiles among different users, who can assign the received, shared profiles to their respective tools. For instance, the communication system 100 enables the sharing of profiles with a second external device 446 and a second power tool 448 (see
In some instances, the profile sent to the server 112 for saving originates from an administrative device 480. The administrative device 480 may be, for instance, a personal computer or laptop having a web browser 482 that is communicatively coupled to the server 112 via the network 114. For instance, an administrator may navigate to a web server (not shown), which may be part of or separate from the server 112, and that provides a user interface via the web browser 482 for interacting with the tool profile bank 346, tool data 348, and/or permissions and group data 349. The administrator may be, for example, the manufacturer of the tool or a third party, such as a manufacturer of an accessory used by the power tool.
After saving at block 454, or if no profile was received at block 452, the server 112 proceeds to block 456 and determines whether a profile search request has been received. For instance, such a request can be generated by the second external device 446 via the profile search screen 428 as described with respect to
At block 462, the server 112 receives a user selection from the requesting device (e.g., the second external device 446) in response to a user input, such as by selecting the profile X from the displayed search results. At block 464, the server 112 sends the selected profile back to the requesting device. For instance, the server 112 sends the profile X to the second external device 446. The server 112 may also update the my profiles list (see, e.g.,
Referring to
At block 1510, the external device 108 establishes a first communication link with the server 112 using the external wireless communication controller 334. At block 1515, the external device 108 transmits the profile request to the server 112 over the first communication link. At block 1520, the external device 108 receives, from the server 112 over the first communication link, a list of mode profiles that meet the criteria of the profile request. At block 1525, the external device 108 displays the list of mode profiles on the display 332 of the external device 108 (see, for example, search results screen 436 of
At block 1530, the external device 108 receives a selection of one of the mode profiles from the list of mode profiles in response to a second user input on the external device 108. At block 1535, the external device 108 transmits the selection of the mode profile to the server 112 over the first communication link. At block 1540, the external device 108 receives the selected mode profile from the server 112 over the first communication link. As noted above, in some embodiments, the selected mode profile received by the external device 108 is generated by a different user than the user operating the external device 108.
At block 1545, the external device 108 establishes a second communication link with the power tool 104 using the external wireless communication controller 334. At block 1550, the external device 108 transmits the selected mode profile to the power tool 104 over the second communication link in response to a third user input as described previously herein. Thereafter, the power tool 104 may be configured to operate according to the selected mode profile. In some embodiments, the external device 108 of a first user may establish a communication link with an external device of a second user. In such embodiments, the communication link may be used to transmit and receive mode profiles between the external devices of different users without use of the server 112 (in other words, peer-to-peer sharing of mode profiles created by other users). For example, in some embodiments, such peer-to-peer sharing may occur over a Bluetooth™ network or a near field communication (NFC) network. Additionally, as noted above, in some embodiments, the power tool 104 may relay information received from the external device 108 to one or more additional powers tools. For example, the power tool 104 may relay the mode profile received from the external device 108 to the one or more additional power tools when the one more additional power tools are outside the communication range of the external device 108.
As noted above, the memory 344 of the server 112 includes the permissions and group data 349. The permissions and group data 349 stores information defining users as being either an independent operator or a group member. Independent operators are users that are not assigned to a group. Group members are users that are assigned to a group including two or more users. A group of users may be, for example, all users of a particular company (Bob's Drywall Co.), a set of users for a particular jobsite, or another grouping. Grouping of users together can assist in managing tools and ensuring consistent, proper usage of those tools on particular jobs.
In some embodiments, the graphical user interface screens and permitted functions provided by the external device 108 (at block 725 of
In table 500 (see
A user with the appropriate permissions (e.g., administrative level or foreman level) is also operable to update mode profiles stored in the tool profile bank 346 for the group to which the user belongs. Accordingly, a foreman at a particular jobsite can ensure that all operators at the jobsite have access to the same, foreman-approved mode profiles. In the case of a user with the lowest permission level (“none”), the foreman is able to assign particular profiles to an associated tool (e.g., crimper 6) and the user G is not able to alter the profile. Accordingly, the foreman can ensure that the user G is using the correct tool settings. Other examples of permitted functions based on the permission level of a user are shown in table 502 of
An independent operator may have full permission levels for tools that the operator pairs with using the external device 108 or that have been associated with the operator. However, if one of the power tools 104 has been assigned or associated with a particular group, which may be stored in the memory 344 of the server 112, the independent operator is not able to configure the tool. In other words, the external device 108 of the independent operator determines after communication with the server 112 that the tool is assigned to a particular group to which the independent operator does not belong, and the external device 108 thereafter prevents the independent operator from configuring the tool (e.g., updating profiles on the tool). Accordingly, users may have different permission levels for different power tools and for different groups in which they are members. In some instances, power tools 104 have stored thereon an indication of whether the power tool 104 has been assigned to a particular group or user. In response to receiving this indication from the power tool 104, the external device 108 disables tool configuration options for that tool until the server 112 confirms to the external device 108 that the user is associated with the group or power tool 104.
When the server 112 receives the selections of users, power tools, and permission levels from the administrative device 480, the server 112 creates and saves this information as a new group in the permissions and group data 349. Upon a user of the new group logging into the core application software 312 using the external device 108, the server 112 transmits the permission level of the user and a list of the power tools associated with the new group to the external device 108. Additionally, the server 112 responds to search requests in accordance with the information of the new group saved in the permissions and group data 349.
Through the administrative device 480, the administrator may modify the settings of the group (for example, users in the group, permission levels of users, power tools in the group, mode profiles available to be used on power tools of the group, and the like).
At block 552, the administrative device 480 determines whether an external request to add a user to the group has been received by the administrative device 480. Such a request may be generated by a user (e.g., via the external device 108) and may include user information including a username and the group name to identify the user and the desired group. In some embodiments, if a request has been received, the administrative device 480 may prompt the administrator for a user input to indicate whether the new user is allowed to enter the group. In such embodiments, when the user input received from the administrator by the administrative device 480 indicates that the new user is not allowed in the group, the method 550 proceeds back to block 552 and does not add the new user to the group. Alternatively, when the user input received from the administrator by the administrative device 480 indicates that the new user is allowed in the group, the method 550 proceeds to block 554 where the new user's permission level is set. For instance, the administrative device 480 provides a graphical user interface screen identifying the user and providing available permission levels (e.g., as a drop down list), which enables the administrator to select the desired permission level for the new user.
At block 556, the administrative device 480 adds one or more tools as the associated tools of the new user. For instance, the administrative device 480 provides a graphical user interface screen identifying the user and providing a list of the associated tools of the administrator, which enables the administrator to select the desired tools for the new user. At block 558, the administrative device 480 sends a request to the server 112 to update the permissions and group data 349 by adding the new user with the selected permission levels and the associated tools. The method 550 then returns to block 552. In some embodiments, blocks 554, 556, and 558 are carried out in a different order. For instance, the administrative device 480 may first add the user to the group (block 558) with default settings, and then proceed to blocks 554 and 556 to update permission levels and associated tools.
If, at block 552, an external request to add a new user is not received, the administrative device 480 determines whether it has received a selection (i.e., a user input) from the administrator, via the web browser 482, for example, to add a user to the group or to modify settings of a user that is already a member of the group. For example, such a selection may be made to adjust the permission level associated with a user. If such a selection has been received, the administrative device 480 receives user information (e.g., input via a graphical user interface) identifying the particular user at block 560. In some instances, blocks 560 and 562 occur simultaneously (i.e., the selection received at block 560 includes the user information). Thereafter, the administrator is able to set or update permission levels associated with the particular user at block 554 and set or update tools associated with the particular user at block 556 as described above. At block 558, the administrative device 480 sends a request to the server 112 to update the permissions and group data 349 by adding the user or modifying the user data as specified at blocks 554 and 556. The method 550 then returns to block 552.
If no selection to add a user or modify settings of a user was received at block 560, the administrative device 480 determines whether a selection to delete a user from the group has been received at block 564. If such a selection has been received, the administrative device 480 receives user information identifying the particular user at block 566. In some embodiments, blocks 564 and 566 occur simultaneously (i.e., the selection received at block 564 includes the user information). At block 558, the administrative device 480 sends a request to the server 112 to update the permissions and group data 349 to delete the specified user's affiliation with the group and to set the user as an independent operator. The method 550 then returns to block 552.
If no selection to delete a user was received at block 564, the administrative device 480 determines whether a selection to add, delete, or modify a power tool from the group has been received at block 568. If no such selection has been received, the method 550 returns to block 552. If such a selection has been received, the administrative device 480 receives power tool information identifying the particular power tool at block 570. In some embodiments, blocks 568 and 570 occur simultaneously (i.e., the selection received at block 568 includes the power tool information). At block 572, the administrative device 480 receives a selection to add, delete, or modify settings associated with the selected power tool. For example, the selection may indicate to add a power tool to the group or deleting a power tool from the group. Additionally, in some embodiments, an administrator may modify settings of a power tool by selecting a mode profile of the power tool and adjusting parameters of the mode profile as explained previously herein. At block 558, the administrative device 480 sends a request to the server 112 to update the permissions and group data 349 to add the specified power tool to the group, delete the specified power tool's affiliation with the group, or modify the settings of the specified power tool. The method then returns to block 552.
In some embodiments, the administrative device 480 allows for a mode profile for multiple power tools to be modified simultaneously. For example, in some embodiments, at block 570 of
Accordingly,
When the server 112 receives the request from the administrative device 480 (at block 558 of
In some embodiments, a method that may be performed by a first external device of a first user is provided. The method includes receiving, via a user input on the first external device, a request to share a mode profile with a second external device. The method further includes establishing a communication link with the second external device and transmitting the mode profile to the second external device over the communication link. After receiving the mode profile from the first external device, the second external device 108 establishes a second communication link with a power tool and transmits the received mode profile to the power tool over the second communication link. Thereafter, the power tool may be configured to operate according to the received mode profile.
In some embodiments, a method that may be performed by a server is provided. The method includes receiving a first profile request with a first group identifier from a first external device. The method further includes transmitting a first list of a first plurality of mode profiles based on the first group identifier to the first external device in response to the first profile request. The method further includes receiving a second profile request with a second group identifier from a second external device. The method further includes transmitting a second list of a second plurality of mode profiles based on the second group identifier to the second external device in response to the second profile request. Additionally, the server may receive selections from one or both of the first external device and the second external device of a mode profile on the respective received lists. In response to such selections, the server transmits the respective selected mode profile to the one or both of the first external device and the second external device. The first and second external devices may then transmit the respective selected mode profile to a respective power tool, which is configured to operate according to the respective selected mode profile.
In some embodiments, a method that may be performed by an administrative device is provided. The method includes providing a list of users on a display of the administrative device. The method further includes receiving, via user input on the administrative device, a selection of a plurality of users from the list of users. The method further includes providing a list of power tools on the display of the administrative device. The method further includes receiving, via user input on the administrative device, a selection of a plurality of power tools from the list of power tools. The method further includes receiving, via user input on the administrative device, a selection of a permission level for each of the selected users. The method further includes transmitting the selections of the users, the power tools, and the permission levels to a server to be saved as a group.
When the server receives the selections from the administrative device, the server updates permissions and group data accordingly. Upon a user of the group logging into core application software using an external device, the server transmits updated group information to the external device. Additionally, the server responds to search requests (see, for example,
Thus, the invention provides, among other things, a power tool communication system that permits sharing of mode profiles among users and third parties, provides user groupings, and sets permission levels for tool and group configuration.
This application claims priority to U.S. Provisional Application No. 62/180,592, filed on Jun. 16, 2015, the entire contents of which are hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
3882305 | Johnstone | May 1975 | A |
4545106 | Juengel | Oct 1985 | A |
4680862 | Wieland et al. | Jul 1987 | A |
4685050 | Polzer et al. | Aug 1987 | A |
4854786 | Alexander et al. | Aug 1989 | A |
5277261 | Sakoh | Jan 1994 | A |
5315501 | Whitehouse | May 1994 | A |
5592396 | Tambini et al. | Jan 1997 | A |
5903462 | Wagner et al. | May 1999 | A |
5942975 | Sorensen | Aug 1999 | A |
6005489 | Siegle et al. | Dec 1999 | A |
6055484 | Lysaght | Apr 2000 | A |
6123241 | Walter et al. | Sep 2000 | A |
6157313 | Emmermann | Dec 2000 | A |
6161629 | Hohmann et al. | Dec 2000 | A |
6279668 | Mercer | Aug 2001 | B1 |
6349266 | Lysaght et al. | Feb 2002 | B1 |
6390205 | Wallgren et al. | May 2002 | B2 |
6405598 | Bareggi | Jun 2002 | B1 |
6424799 | Gilmore | Jul 2002 | B1 |
6431425 | Moorman et al. | Aug 2002 | B1 |
6469615 | Kady et al. | Oct 2002 | B1 |
6508313 | Carney et al. | Jan 2003 | B1 |
6520270 | Wissmach et al. | Feb 2003 | B2 |
6522949 | Ikeda et al. | Feb 2003 | B1 |
6598684 | Watanabe | Jul 2003 | B2 |
6668212 | Colangelo, III et al. | Dec 2003 | B2 |
6675196 | Kronz | Jan 2004 | B1 |
6768994 | Howard et al. | Jan 2004 | B1 |
6687567 | Watanabe | Feb 2004 | B2 |
6784801 | Watanabe et al. | Aug 2004 | B2 |
6836614 | Gilmore | Dec 2004 | B2 |
6848516 | Giardino | Feb 2005 | B2 |
6872121 | Wiener et al. | Mar 2005 | B2 |
6913087 | Brotto et al. | Jul 2005 | B1 |
6923285 | Rossow et al. | Aug 2005 | B1 |
6938689 | Farrant et al. | Sep 2005 | B2 |
6954048 | Cho | Oct 2005 | B2 |
6968908 | Tokunaga et al. | Nov 2005 | B2 |
6981311 | Seith et al. | Jan 2006 | B2 |
6989749 | Mohr | Jan 2006 | B2 |
6992585 | Saleh et al. | Jan 2006 | B2 |
7034711 | Sakatani et al. | Apr 2006 | B2 |
7035710 | Balling | Apr 2006 | B2 |
7035898 | Baker | Apr 2006 | B1 |
7036703 | Grazioli et al. | May 2006 | B2 |
7062998 | Hohmann et al. | Jun 2006 | B2 |
7064502 | Garcia et al. | Jun 2006 | B2 |
7086483 | Arimura et al. | Aug 2006 | B2 |
7102303 | Brotto et al. | Sep 2006 | B2 |
7112934 | Gilmore | Sep 2006 | B2 |
7123149 | Nowak et al. | Oct 2006 | B2 |
7137541 | Baskar et al. | Nov 2006 | B2 |
7211972 | Garcia et al. | May 2007 | B2 |
7218227 | Davis et al. | May 2007 | B2 |
7243440 | DeKeyser | Jul 2007 | B2 |
7298240 | Lamar | Nov 2007 | B2 |
7319395 | Puzio et al. | Jan 2008 | B2 |
7322503 | Odoni et al. | Jan 2008 | B2 |
7391326 | Puzio et al. | Jan 2008 | B2 |
7328086 | Perry et al. | Feb 2008 | B2 |
7328757 | Davies | Feb 2008 | B2 |
7330129 | Crowell et al. | Feb 2008 | B2 |
7336181 | Nowak et al. | Feb 2008 | B2 |
7339477 | Puzio et al. | Mar 2008 | B2 |
7343764 | Solfronk | Mar 2008 | B2 |
7346406 | Brotto et al. | Mar 2008 | B2 |
7346422 | Tsuchiya et al. | Mar 2008 | B2 |
7359762 | Etter et al. | Apr 2008 | B2 |
7382272 | Feight | Jun 2008 | B2 |
7383882 | Lerche et al. | Jun 2008 | B2 |
7437204 | Lev-Ami et al. | Oct 2008 | B2 |
7464769 | Nakazawa et al. | Dec 2008 | B2 |
7501778 | Hashimoto et al. | Mar 2009 | B2 |
7540334 | Gass et al. | Jun 2009 | B2 |
7613590 | Brown | Nov 2009 | B2 |
7646155 | Woods et al. | Jan 2010 | B2 |
7649464 | Puzio et al. | Jan 2010 | B2 |
RE41185 | Gilmore et al. | Mar 2010 | E |
7690569 | Swanson et al. | Apr 2010 | B2 |
7750811 | Puzio et al. | Jul 2010 | B2 |
7772850 | Bertness | Aug 2010 | B2 |
7784104 | Innami et al. | Aug 2010 | B2 |
7787981 | Austin et al. | Aug 2010 | B2 |
7795829 | Seiler et al. | Sep 2010 | B2 |
7809495 | Leufen | Oct 2010 | B2 |
7817062 | Li et al. | Oct 2010 | B1 |
7834566 | Woods et al. | Nov 2010 | B2 |
7850071 | Sakamoto et al. | Dec 2010 | B2 |
7868591 | Phillips et al. | Jan 2011 | B2 |
7898403 | Ritter et al. | Mar 2011 | B2 |
7900524 | Calloway et al. | Mar 2011 | B2 |
7911379 | Cameron | Mar 2011 | B2 |
7928673 | Woods et al. | Apr 2011 | B2 |
7928845 | LaRosa | Apr 2011 | B1 |
7931096 | Saha | Apr 2011 | B2 |
7942084 | Wilson, Jr. et al. | May 2011 | B2 |
7942211 | Scrimshaw et al. | May 2011 | B2 |
7953965 | Qin et al. | May 2011 | B2 |
7982624 | Richter et al. | Jul 2011 | B2 |
8004397 | Forrest et al. | Aug 2011 | B2 |
8004664 | Etter et al. | Aug 2011 | B2 |
8005647 | Armstrong et al. | Aug 2011 | B2 |
8044796 | Carr, Sr. | Oct 2011 | B1 |
8049636 | Buckingham et al. | Nov 2011 | B2 |
8082181 | Panasik | Dec 2011 | B2 |
8161613 | Schuele et al. | Apr 2012 | B2 |
8169298 | Wiesner et al. | May 2012 | B2 |
8171828 | Duvan et al. | May 2012 | B2 |
8210275 | Suzuki et al. | Jul 2012 | B2 |
8255358 | Ballew et al. | Aug 2012 | B2 |
8260452 | Austin et al. | Sep 2012 | B2 |
8264374 | Obatake et al. | Sep 2012 | B2 |
8281871 | Cutler et al. | Oct 2012 | B2 |
8286723 | Puzio et al. | Oct 2012 | B2 |
8294424 | Bucur | Oct 2012 | B2 |
8306836 | Nichols et al. | Nov 2012 | B2 |
8310206 | Bucur | Nov 2012 | B2 |
8316958 | Schell et al. | Nov 2012 | B2 |
8330426 | Suzuki et al. | Dec 2012 | B2 |
8344879 | Harmon et al. | Jan 2013 | B2 |
8351982 | Rofougaran | Jan 2013 | B2 |
8406697 | Arimura et al. | Mar 2013 | B2 |
8412179 | Gerold et al. | Apr 2013 | B2 |
8438955 | Wilson, Jr. et al. | May 2013 | B2 |
8464808 | Leü | Jun 2013 | B2 |
8485049 | Yokoyama et al. | Jul 2013 | B2 |
8576095 | Harmon et al. | Nov 2013 | B2 |
8600932 | Poling et al. | Dec 2013 | B2 |
8611250 | Chen et al. | Dec 2013 | B2 |
8645176 | Walton et al. | Feb 2014 | B2 |
8657482 | Malackowski et al. | Feb 2014 | B2 |
8666936 | Wallace | Mar 2014 | B2 |
8678106 | Matsunaga et al. | Mar 2014 | B2 |
8818617 | Miller et al. | Aug 2014 | B2 |
8823322 | Noda et al. | Sep 2014 | B2 |
8890449 | Suzuki et al. | Nov 2014 | B2 |
8919456 | Ng et al. | Dec 2014 | B2 |
8954222 | Costantino | Feb 2015 | B2 |
8954227 | Bertosa et al. | Feb 2015 | B2 |
8965841 | Wallace | Feb 2015 | B2 |
8972291 | Rimnac et al. | Mar 2015 | B2 |
8981680 | Suda et al. | Mar 2015 | B2 |
8996237 | Bertosa et al. | Mar 2015 | B2 |
9002572 | Lipscomb et al. | Apr 2015 | B2 |
9030145 | Brennenstuhl et al. | May 2015 | B2 |
9031585 | Kahle et al. | May 2015 | B2 |
9038743 | Aoki | May 2015 | B2 |
9041561 | Wallace et al. | May 2015 | B2 |
9043402 | Fosburgh et al. | May 2015 | B2 |
9061392 | Forgues et al. | Jun 2015 | B2 |
9094793 | Kusakari et al. | Jul 2015 | B2 |
9111234 | Wallace et al. | Aug 2015 | B2 |
9126317 | Lawton et al. | Sep 2015 | B2 |
9144875 | Schlesak et al. | Sep 2015 | B2 |
9194917 | Brochhaus | Nov 2015 | B2 |
9216505 | Rejman et al. | Dec 2015 | B2 |
9232614 | Hiroi | Jan 2016 | B2 |
9233457 | Wanek et al. | Jan 2016 | B2 |
9242356 | King et al. | Jan 2016 | B2 |
9256988 | Wenger et al. | Feb 2016 | B2 |
9281770 | Wood et al. | Mar 2016 | B2 |
9298803 | Wallace | Mar 2016 | B2 |
9367062 | Volpert | Jun 2016 | B2 |
9878432 | Linehan | Jan 2018 | B2 |
20010052416 | Wissmach et al. | Dec 2001 | A1 |
20020033267 | Schweizer et al. | Mar 2002 | A1 |
20030121677 | Watanabe et al. | Jul 2003 | A1 |
20040054923 | Seago | Mar 2004 | A1 |
20040182587 | May et al. | Sep 2004 | A1 |
20050035659 | Hahn et al. | Feb 2005 | A1 |
20050060243 | Whetman et al. | Mar 2005 | A1 |
20050164704 | Winsor | Jul 2005 | A1 |
20060009879 | Lynch et al. | Jan 2006 | A1 |
20060076385 | Etter et al. | Apr 2006 | A1 |
20070252675 | Lamar | Nov 2007 | A1 |
20080084334 | Ballew | Apr 2008 | A1 |
20080086320 | Ballew | Apr 2008 | A1 |
20080086323 | Petrie et al. | Apr 2008 | A1 |
20080086349 | Petrie et al. | Apr 2008 | A1 |
20080086391 | Maynard et al. | Apr 2008 | A1 |
20080086427 | Petrie | Apr 2008 | A1 |
20080086428 | Wallace | Apr 2008 | A1 |
20080086685 | Janky et al. | Apr 2008 | A1 |
20080252446 | Dammertz | Oct 2008 | A1 |
20090250364 | Gerold et al. | Oct 2009 | A1 |
20090251330 | Gerold et al. | Oct 2009 | A1 |
20090273436 | Gluck et al. | Nov 2009 | A1 |
20100071042 | Hochmuth | Mar 2010 | A1 |
20100085008 | Suzuki | Apr 2010 | A1 |
20100096151 | Östling | Apr 2010 | A1 |
20100116519 | Gareis | May 2010 | A1 |
20100154599 | Gareis | Jun 2010 | A1 |
20100176766 | Brandner et al. | Jul 2010 | A1 |
20110056716 | Jönsson et al. | Mar 2011 | A1 |
20110067895 | Nobe et al. | Mar 2011 | A1 |
20110073343 | Sawano et al. | Mar 2011 | A1 |
20110162858 | Coste | Jul 2011 | A1 |
20110309931 | Rose | Dec 2011 | A1 |
20120019177 | Kaufmann | Jan 2012 | A1 |
20120046070 | Shin | Feb 2012 | A1 |
20120111589 | Schmidt et al. | May 2012 | A1 |
20120167721 | Fluhrer | Jul 2012 | A1 |
20120168189 | Eckert | Jul 2012 | A1 |
20120169485 | Eckert | Jul 2012 | A1 |
20120267134 | Matthias et al. | Oct 2012 | A1 |
20120292070 | Ito et al. | Nov 2012 | A1 |
20120325507 | Fluhrer et al. | Dec 2012 | A1 |
20130024245 | Nichols et al. | Jan 2013 | A1 |
20130062086 | Ito et al. | Mar 2013 | A1 |
20130071815 | Hudson et al. | Mar 2013 | A1 |
20130087355 | Oomori et al. | Apr 2013 | A1 |
20130109375 | Zeiler et al. | May 2013 | A1 |
20130118767 | Cannaliato et al. | May 2013 | A1 |
20130126202 | Oomori et al. | May 2013 | A1 |
20130133907 | Chen | May 2013 | A1 |
20130133911 | Ishikawa et al. | May 2013 | A1 |
20130138465 | Kahle et al. | May 2013 | A1 |
20130138606 | Kahle et al. | May 2013 | A1 |
20130153250 | Eckert | Jun 2013 | A1 |
20130187587 | Knight et al. | Jul 2013 | A1 |
20130188058 | Nguyen et al. | Jul 2013 | A1 |
20130191417 | Petrie et al. | Jul 2013 | A1 |
20130204753 | Wallace | Aug 2013 | A1 |
20130255980 | Linehan et al. | Oct 2013 | A1 |
20130304545 | Ballew et al. | Nov 2013 | A1 |
20130327552 | Lovelass et al. | Dec 2013 | A1 |
20140006295 | Zeiler et al. | Jan 2014 | A1 |
20140052384 | Poling et al. | Feb 2014 | A1 |
20140069672 | Mashiko et al. | Mar 2014 | A1 |
20140070924 | Wenger | Mar 2014 | A1 |
20140107853 | Ashinghurst et al. | Apr 2014 | A1 |
20140115003 | Paymal | Apr 2014 | A1 |
20140122143 | Fletcher et al. | May 2014 | A1 |
20140149416 | Wallace | May 2014 | A1 |
20140151079 | Furui et al. | Jun 2014 | A1 |
20140158389 | Ito et al. | Jun 2014 | A1 |
20140159662 | Furui et al. | Jun 2014 | A1 |
20140159919 | Furui et al. | Jun 2014 | A1 |
20140159920 | Furui et al. | Jun 2014 | A1 |
20140166324 | Puzio et al. | Jun 2014 | A1 |
20140180464 | Koerber | Jun 2014 | A1 |
20140184397 | Volpert | Jul 2014 | A1 |
20140258445 | McCoy | Sep 2014 | A1 |
20140266024 | Chinnadurai et al. | Sep 2014 | A1 |
20140279290 | Rimnac et al. | Sep 2014 | A1 |
20140284070 | Ng et al. | Sep 2014 | A1 |
20140292245 | Suzuki et al. | Oct 2014 | A1 |
20140316837 | Fosburgh et al. | Oct 2014 | A1 |
20140324194 | Larsson et al. | Oct 2014 | A1 |
20140331830 | King et al. | Nov 2014 | A1 |
20140334270 | Kusakawa | Nov 2014 | A1 |
20140336810 | Li et al. | Nov 2014 | A1 |
20140336955 | Li et al. | Nov 2014 | A1 |
20140350716 | Fly et al. | Nov 2014 | A1 |
20140365259 | Delplace et al. | Dec 2014 | A1 |
20140367134 | Phillips et al. | Dec 2014 | A1 |
20140379136 | Schlegel et al. | Dec 2014 | A1 |
20150000944 | Duesselberg et al. | Jan 2015 | A1 |
20150002089 | Rejman et al. | Jan 2015 | A1 |
20150042247 | Kusakawa | Feb 2015 | A1 |
20150084745 | Hertz et al. | Mar 2015 | A1 |
20150122524 | Papp | May 2015 | A1 |
20150127205 | Brochhaus | May 2015 | A1 |
20150135306 | Winkler et al. | May 2015 | A1 |
20150135907 | Hirabayashi et al. | May 2015 | A1 |
20150137721 | Yamamoto et al. | May 2015 | A1 |
20150158157 | Hirabayashi et al. | Jun 2015 | A1 |
20150158170 | Nitsche et al. | Jun 2015 | A1 |
20150162646 | Kawase et al. | Jun 2015 | A1 |
20150171654 | Horie et al. | Jun 2015 | A1 |
20150179036 | Heine et al. | Jun 2015 | A1 |
20150191096 | Becker et al. | Jul 2015 | A1 |
20150233757 | Ebner | Aug 2015 | A1 |
20150286209 | Kreuzer | Oct 2015 | A1 |
20150340921 | Suda | Nov 2015 | A1 |
20150363710 | Meier et al. | Dec 2015 | A1 |
20160071340 | Kauth | Mar 2016 | A1 |
20160171788 | Wenger et al. | Jun 2016 | A1 |
20170008159 | Boeck et al. | Jan 2017 | A1 |
20170116431 | Lee | Apr 2017 | A1 |
Number | Date | Country |
---|---|---|
203673522 | Jun 2014 | CN |
105467865 | Apr 2016 | CN |
3803357 | Aug 1989 | DE |
10029132 | Jan 2002 | DE |
10029138 | Jan 2002 | DE |
10309703 | Sep 2004 | DE |
202006014606 | Jan 2007 | DE |
2147750 | Jan 2010 | EP |
2995429 | Mar 2016 | EP |
2451957 | Feb 2009 | GB |
2000176850 | Jun 2000 | JP |
2004072563 | Mar 2004 | JP |
2006123080 | May 2006 | JP |
WO1997023986 | Jul 1997 | WO |
WO2002030624 | Apr 2002 | WO |
WO2007090258 | Aug 2007 | WO |
WO2009013045 | Jan 2009 | WO |
WO2013116303 | Aug 2013 | WO |
Number | Date | Country | |
---|---|---|---|
20160373457 A1 | Dec 2016 | US |
Number | Date | Country | |
---|---|---|---|
62180592 | Jun 2015 | US |