Radio frequency identification method and system of disturbing products

Information

  • Patent Grant
  • 7942321
  • Patent Number
    7,942,321
  • Date Filed
    Tuesday, June 8, 2004
    20 years ago
  • Date Issued
    Tuesday, May 17, 2011
    13 years ago
Abstract
A method and system for vending products from a defined area, such as a micro-warehouse with a door. The method includes fitting each product with a radio frequency identification tag, positioning the plurality of products in a micro-warehouse, sensing opening and closing of the micro-warehouse door, scanning the plurality of products in the micro-warehouse upon sensing closing of the door to determine the number and type of products in the micro-warehouse, generating a message based on the number and type of products in the micro-warehouse, transmitting the message to a remote processor or server, and maintaining an inventory in the remote processor based on the message. The system is designed to be accessed by authorized individuals possessing some type of code or identifying mechanism. The micro-warehouses may be cabinets, refrigerators, secured rooms, or similar storage units or areas.
Description
BACKGROUND OF THE INVENTION

The present invention relates to methods and systems for distributing products to customers. More particularly, the invention relates to a method and system that tracks the use of products using radio frequency tags and provides information to a central computer to enable automated restocking, inventory, tracking, or reordering of the products.


The Internet, EDI, and similar systems permit businesses and ordinary consumers to order goods. However, the delivery of those goods still depends on distribution systems that are based in the physical world. The science-fiction ideal of being able to instantly have goods pop out of a computer or to receive them through a “transporter” or some other device has not yet been realized, and probably will not for many, many years. Presently, consumers may have goods shipped via various overnight delivery services. One drawback of present delivery technology is that it is primarily paper-based. Orders are made on paper and delivery involves shipping invoices, receipts, and other paperwork, which is costly to handle and annoying to many people. Even with technology that is not paper-based, ordering and receiving goods requires a number of steps. For example, for a typical Internet order, a consumer must view the applicable Web site, select the item, such as by clicking on an icon, fill out an electronic order form, and wait for the product to be delivered. Regardless of whether paper-based or electronic technology is used, present delivery methods usually require that the customer or his or her agent be present at a physical location to take the delivery of the ordered product. Further, delivery is usually made to a loading dock or similar location. This requires some internal distribution system to deliver the goods from the initial delivery point to the location where it is actually needed.


SUMMARY OF THE INVENTION

Accordingly, there is a need to improve the distribution of goods so that consumers experience distribution of goods at a location proximate to where the consumer will use the goods without requiring paper or computer ordering. There is also a need for a distribution system that requires less user intervention and data input than existing systems.


The invention provides a system and method where a user need only find the product of interest and take that product. As compared to most Internet-based systems and methods, the invention is “clickless.” In other words, the invention requires little or no manual input from users. The invention provides a system for distributing a plurality of products. Each of the products has a radio frequency (“RF”) tag. As used herein, radio frequency means electromagnetic radiation that lies between audible and infrared radiation. Each tag is encoded with a unique identifying code. In one embodiment, the system is designed to be accessed by individuals possessing a radio frequency user badge with an identifying code. Alternatively, the system could rely on magnetic swipe cards, password systems, biometric devices (such as a retinal scanner, thumbprint reader, voice identification unit, or the like), or other systems for limiting access to authorized individuals.


The system includes one or more cabinets, refrigerators, similar storage units, (generically referred to as “micro-warehouses”) or even secured rooms that are stocked with the RF tagged products and accessed by individuals through one of the mechanisms described above. In one embodiment, each micro-warehouse has a door that may be equipped with a lock (such as an electric actuated lock), an antenna or antenna array mounted on or in the micro-warehouse, a client controller coupled to the lock and the antenna, and an output device such as a light or display. Using a signal from the antenna or other input device, the client controller checks the identity of the individual accessing the micro-warehouse, such as by reading the code of the user badge. The output device is then activated to indicate whether the individual attempting to access the micro-warehouse is authorized to access the unit. If the code or other identifier matches stored records of authorized users, the client controller opens the door and the user may remove desired products from the micro-warehouse. Once the user closes the door, the client controller performs a scan of the products remaining in the micro-warehouse to determine the identity of each of the products. The client controller then generates a message including the identity of each of the products or other message related to the products taken, and sends that message to a server. The server tracks product and user information automatically, that is, without relying on user input. In particular, the server tracks product inventory, customer usage, restocking, usage frequency, faults, micro-warehouse temperature, timing, and other information. The server also generates orders for products taken from the micro-warehouse by the user. The server can be programmed to automatically place those orders, with the result that the system is “clickless.” That is, the system eliminates the need for the customer to re-order consumed items.


In addition to the features noted above, the system may also locate the position or presence of one or more specific products in a micro-warehouse by conducting a scan of the micro-warehouse. In this way, the system can sense a disordered state of the product in the micro-warehouse. For example, the system can detect whether all of the components in a kit product are in the relevant kit box. Further, a product scan can detect whether any product in the micro-warehouse has been recalled, expired, or is otherwise not suitable for use. Upon detecting such a product, the system refuses access to the micro-warehouse until an administrator removes the product or otherwise addresses the situation.


The invention also provides a method of distributing a plurality of products from a micro-warehouse. The method may include fitting each product with a radio frequency identification tag, positioning the plurality of products in the micro-warehouse, sensing opening and closing of the micro-warehouse door, scanning the plurality of products in the micro-warehouse upon sensing closing of the door to determine the number and type of products in the micro-warehouse, generating a message based on the number and type of products in the micro-warehouse, transmitting the message to a remote processor or server, and maintaining an inventory in the server based on the message.


The method and system permit up-to-date information to be provided to the server which, in turn, can be connected to ordering and manufacturing information systems to ensure prompt re-stocking of the micro-warehouses. The system can be designed with multiple levels of access. For example, multiple micro-warehouses may be located within a secure room and a user badge may be encoded to permit a user to access the room only, a limited number of warehouses in the room, or all the warehouses in the room.


As is apparent from the above, it is an advantage of the present invention to provide a method and system of identifying and distributing products. Other features and advantages of the present invention will become apparent by consideration of the detailed description and accompanying drawings.





BRIEF DESCRIPTION OF THE DRAWINGS

In the drawings:



FIG. 1 is a schematic diagram of a system embodying the invention.



FIG. 2 is schematic diagram of the server and client controller of the system shown in FIG. 1 illustrating the architecture of the enterprise application of the server and the architecture of the software on the client controller.



FIG. 3 is an illustration of the flow of products and information in a distribution system of the invention.



FIG. 4
a is a flowchart of the software's boot up routine of the invention.



FIG. 4
b is a flowchart of the software of the invention.





DETAILED DESCRIPTION

Before the invention is explained in detail, it is to be understood that the invention is not limited in its application to the details of the construction and the arrangements of the components set forth in the following description or illustrated in the drawings. The invention is capable of other embodiments and of being practiced or being carried out in various ways. Also, it is to be understood that the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting.



FIG. 1 illustrates a system 10 embodying the invention. The system 10 includes two servers (maintenance and commerce) 11 and 12 that create and maintain user lists, perform inventory, account, ordering functions, and monitoring functions, such as microwarehouse status, monitoring temperature and other faults. Servers 11 and 12 may communicate with a client (discussed below) using standard protocols such as TCP/IP, or other protocols over a network 13. The network 13 may be the Internet, a telephone network, a wireless network, power line carrier (“PLC”) network, or combinations thereof. Servers 11 and 12 include standard hardware and operating system software (not shown). Running on top of the hardware and operating system software is a micro-warehouse (“MW”) enterprise application 14. The MW enterprise application 14 accesses a profile database 15 that includes a registration module 16, an order history module 18, an account set-up module 20, and a stock request module 22. Each of the modules 16-22 is maintained for each client coupled to the server 12. The modules may be configured with web content designed to be accessible using protocols for the World Wide Web section of the Internet.


As best seen by reference to FIG. 2, the MW enterprise application 14 performs numerous functions. Broadly, the MW enterprise application 14 controls the arrangement of the RFID user badges (discussed below), manages communication sessions with clients connected to the server 12, maintains an inventory of products for each client connected to the servers 11 and 12, checks inventory of the MW and other local MWs before ordering a product, manages security of communications, provides system administration functionality, and monitors and maintains the health of clients connected to the servers.


The registration module 16 provides part of the inventory functionality of the server 12 by providing access to information regarding the location of clients connected to the server 12. In the invention, the clients take the form of MWs. The registration module also provides access to information regarding sales persons assigned to a particular MW and identification numbers for each MW. The registration module 16 may access a MW database 24.


The order history module 18 provides a history of orders for each MW and product preferences for each MW. The account set-up module provides administrative screens for payment authorization, user information, and similar information. The stock request module 22 controls inventory replenishment based on usage and on specific customer requests and similar information.


The server 12 also accesses a commerce engine 30 that uses information received from the client to generate orders that are delivered to the manufacturing infrastructure (not shown) that produces products to be distributed using the system and method of the invention. The information may be used by marketing, customer relation management (“CRM”), billing, and other systems and functions. For example, the invention may be used in the distribution of life science research products such as enzymes, assays, cloning vectors, component cells, and the like. (Of course, a wide variety of non-biological products could be distributed using the invention.) The information provided by the server 12 is used in the manufacturing infrastructure to ensure proper production of products according to the demand for such products. As noted above, the server 12 may be coupled to a plurality of clients. An exemplary client in the form of a MW 35 is shown in FIGS. 1 and 2. While only one client is shown, the number of clients connected to the server 12 is limited only by the server's internal capacity and the capacity of the network 13.


The MW 35 may take the form of a refrigerated cabinet, a freezer, or other storage container. A secured storeroom, similar location, or other defined area could also be outfitted with a client controller and other components, as described herein, and be used to store products. As shown, the MW 35 includes a door 37, an electric actuated lock 39 and/or a proximity sensor 40, and an output device that may take the form of audio device or light 41. Other output devices such as a voice synthesis device, a display screen, and the like may also be used. The MW 35 is configured with an antenna array 43. The antenna array 43 is coupled to a client controller 45. In one embodiment, the invention may include an antenna with two vertically polarized array antennas. The antenna 43 is an RF receive and transmit device which communicates with a transponder device or tag (discussed in greater detail below). In one embodiment, the tag is a passive tag and powered by energy from the antenna.


The MW 35 may include a specialized card reader 47 in the form of a magnetic card swipe device, an antenna, a fingerprint reader, or similar device. The specialized card reader 47 is coupled to the client controller 45 via a communication link 49. The MW 35 may also include an internal and ambient temperature sensor 55. If included, the temperature sensor 55 is preferably positioned such that it can sense the temperature of the interior of the MW 35. The temperature sensor 55 is coupled to the client controller 45 to provide temperature information to the client controller. Additional information may be provided to the client controller through optional input devices. The location of the MW 35 may be monitored by a global positioning system (GPS) device (not shown) plus inertial frame recognition for fine measurement and for interpolation between GPS satellite acquisitions. The voltage, frequency, and other characteristics of electrical supply lines may be monitored and provided to the client controller 45 by a power line monitoring device (also not shown). Additional input devices, such as cameras, microphones, sensors, etc., could be coupled to the client controller to monitor environmental and other conditions.


The client controller 45 includes software to carry out several functions. The software included on the client controller 45 may be better understood by reference to FIG. 2. As shown, the client controller 45 includes an operating system 60. The operating system 60 is dependent on the type of processor used in the client controller. Preferably, the client controller 45 is an X86 single chip computer controller with a compatible operating system. If desired, the client controller 45 may be a consumer grade device such as a Palm Pilot personal digital assistant or Packet PC device, and modified according to the teachings herein. Depending on the hardware used, the client controller 45 may be configured with a graphical user interface (“GUI”) to facilitate interaction between the system 10 and its users.


The client controller 45 also includes an I/O interface 62, which may take the form of an analogue-digital, digital-analogue converter, digital input/output (ADC, DAC, and DIO) interface. The interface 62 handles input from the electric actuated lock 39, input from the temperature sensor 55, output to the electric actuated lock 39, and input from optional monitoring devices such as the GPS and power line monitoring devices.


In addition to the interface 62, the client controller 45 may have two other modules: an RFID user sensing subsystem 64 and a radio frequency data collector (“RFDC”) inventory interface 66. The REID user sensing subsystem 64 handles input and output to and from the specialized card reader 47. The RFDC inventory interface 66 handles input and output from the antenna 43 and handles links or sessions between the MW 35 and servers 11 and 12.


The client controller 45 includes software (not shown) which may incorporate the RFDC inventory interface 66 that reads the RFID signatures from tagged products (discussed below) placed inside the MW 35. The software may be implemented according to algorithms disclosed in International Publication No. W099/45495 and International Publication No. W099/45494, the disclosures of which are hereby incorporated by reference herein. The referenced publications teach identification systems that can identify a plurality of RFID tagged items using an interrogator. The interrogator sends signals from antennas and cooperates with passive, transponder RFIIID tags in such a way as to eliminate or reduce interference problems that are typically associated with reading RF signals from multiple devices. The system 10 could also be implemented with active tags, although presently available active tags need to be improved so as to perform in the temperatures that the system is expected to operate within and at roughly the same cost and power consumption.


Before the system 10 may be implemented, one or more RFID access badges 75 must be generated. Preferably, the RFID badges 75, as well as the other RFID tags (discussed below) are passive transponder tags such as the tags disclosed in the above-referenced international applications. Preferably, the RFID badges 75 are encoded with information from the account set-up module 20 based on digital signatures. In addition, it is preferred that the digital signatures encoded on the RFID badges 75 used by restocking services provide one-time access to a specific MW, and thereafter expire. The RFID access badges may be fixed on a carton of products 80. Alternatively, they may be delivered separately to the facility where the MW of interest is located.


The carton of products 80 includes a plurality of individual products 90 each with an identification tag 95. Each identification tag 95 may be the same as an RFID badge 75, except that the digital signature on tag 95 will generally not expire. In one form of the invention, each tag 95 has a 16-bit identification code and a 72-bit item identification code. The 16-bit identification tag may be programmed with information such as the manufacturer of the product. The 72-bit item identification code is used to provide descriptive information regarding the product such as serial number, product type, date, lot number, and similar information.


Once all the products 90 have been fitted with unique RFID tags 95, the products may be shipped in the carton 80 to a designated MW such as the MW 35. As shown in FIG. 3, the carton 80 is packed according to a fulfillment request that is based on either an initial order from a customer (not shown) or MW specific business rules followed by the server 12. The carton 80 may be fitted with RFID access badge 75 or the RFID access badge 75 may be shipped separately to the location of the MW of interest. If fitted with an RFID access badge 75, the carton 80 may be shipped by a delivery service contracted to deliver the package to the MW 35. Once the carton is delivered, the recipient or user may use the RFID access badge 75 to open the door 37 of the MW 35 by passing RFID access badge 75 in front of the reader 47. Client controller 45 reads the digital signature of the RFID access badge 75 and confirms reading of the code by actuating a user feedback device such as a voice synthesis module or the light 41. Since, the server 12 provides a locally based user list to the client controller 45, the client controller 45 oversees authentication of the digital code read from the RFID access badge 75. Client controller 45 checks the authenticity of the read code by matching the code to the user list. Client controller 45 may then optionally read the temperature sensors 55 and transmit temperature information to the server 11. Preferably, the temperature sensor is also read on a periodic basis, with the temperature information being transmitted to the server each time the temperature is read. Client controller 45 can also be programmed to transmit temperature data if the temperature falls beneath or above a predetermined range. In many instances, it will be important to ensure that the temperature of the MW is within an appropriate range to store the products 90. If the temperature of the MW 35 is within an appropriate range, and the user is authenticated, the client controller 45 then actuates the lock 39 to open the door 37 (of course, the MW need not be equipped with the lock 39). If the temperature of the MW 35 is not within an appropriate range, then access to the MW may be prevented by maintaining the lock 39 in a closed state. This would allow a refrigerated unit associated with the MW to cool the interior space of the MW to a desired temperature before ambient air was allowed into the MW by opening of the door. This also provides for product integrity during power failure.


Once the door 37 opens (which may be sensed by the proximity sensor 40), a communication session between the MW 35 and servers 12, which may be segmented based on appropriate events to optimize user response and network usage, begins. Having full access to the MW 35, the employee of a carrier or logistic service who delivered the carton 80 now proceeds to place the individual items 90 into the MW 35. Once the carton of products 80 is empty, the delivery employee then closes the door 37, and removes the carton, if necessary. The proximity sensor 40 senses the closing of the door 37. The client controller 45 senses the status of the sensor. Preferably, the lock 39 (if used) resets automatically after being unlocked for a predetermined time, for example five (5) seconds. The user has that predetermined time to open the door. The RFDC inventory interface 66 is disabled once the door 37 opens. When the door 37 closes, the RFDC inventory interface 66 is enabled and initiates a scan of the products placed within the MW 35. Upon completing the scan, the client controller 45 sends a change-in-inventory message 100 to the commerce server 12. To ensure integrity of the inventory change billed to the customer, the client controller 45 employs an integrity algorithm when the RFDC inventory interface 66 scans the MW 35. The algorithm is based on statistical information, historical information, and other factors including RF algorithms (frequency-hopping, etc.) and delay data.


The MW 35 may be accessed by a customer at the MW location using a separate RFID badge 75 shipped directly to that customer. Alternatively, and as noted above, the reader 47 may be configured as a magnetic card swipe device, barcode, a fingerprint reader, or some similar device that controls access to the MW 35. Regardless of its exact configuration, the reader 47 reads the input from the customer and acknowledges reading of that input by lighting the light 41. The client controller 45 then sends an input signal to the server 12. The server 12 then conducts an authenticity review of the input. If an authorized input is received, the server 12 sends an okay message to the MW 35. The client controller 45 may have the capability to authenticate the review as well. Once authentication takes place, the client controller 45 then opens the door 37 allowing the customer access to the interior of the MW 35. The customer then removes one or more products 90 from the interior of the MW and then closes the door 37. Once the door is closed, client controller 45 scans the remaining products in the MW 35 and sends a message containing the missing products to the server 12. Identifying which products have been taken, the server 12 compares the previous inventory prior to opening, to the inventory of the missing items. From the comparison, the server 12 determines the missing items in the MW 35. The inventory information is then communicated to the commerce engine 30, which stores the information for future use for both marketing and inventory functions. Receipts for the used products can then be emailed or printed and shipped via regular mail to the customer at the MW location. Invoicing can also occur using electronic and standard mechanisms.


The inventory message can be used for other purposes as well. For example, the inventory message includes information regarding individual products. Therefore, the amount of time a particular product spends in any MW may be recorded by the server, as well as the product's temperature history. If this time is recorded, it is also possible to compare the amount of time any particular product spends in a MW to a shelf life for that product. Temperature history can also be stored and compared to other data. If the shelf life is passed, then an expiration message, such as a pick list, may be generated and sent to the MW or an e-mail address of a user of the system to inform users of products that should be removed from the MW and not used. In addition, the inventory message may be used to determine the type of products in the MW 35. If any of the products present within the MW 35 are subject to a recall, the MW 35 may be placed in a “lock down” condition, whereby access to the MW is denied until an administrator or other authorized individual removes the recalled product or otherwise addresses the situation.



FIGS. 4
a and 4b are flow charts of the software used in the invention. Once the client controller 45 is turned on in FIG. 4a at step 138, it executes a standard boot up routine at step 140. Part of the standard boot up process enables the software to automatically update itself. At step 142, a message is sent to the maintenance server 11 to query the current version of the controller software. If the version on the server 11 is the same as the version on the client controller 45, the client controller 45 establishes a wait state as shown in step 152. If the version on the server 11 is newer than the version on the client controller 45, then the newer version is downloaded over the Internet, as shown at step 144. The newer version is loaded into the alternative pocket or partition and written to flash memory, as shown at step 146. Then the software is booted, as shown at step 148. A garbage collection routine clears the old version. A message packet accompanies each boot to the maintenance server, including version status and operating status. Each boot then requests a reload of the list of authorized users from the server 11 at step 150. The list is then reloaded at step 151. As shown in FIG. 4b at step 152, the client controller 45 then establishes the wait state of the system by initializing various variables or objects such as a USER, MSG 1, MSG 2, CNT1, TEMP 1, TEMP 2, and SOLENOIDS. In addition, the client controller 45 initializes variables or objects SWITCHES, POWER, and LIGHT. Once initialization is complete, the unit is ready for user access. During this wait state, the client controller 45 performs periodic checks on the status of the MW 35. When a customer approaches the MW and presents an RFID badge, the client controller 45 reads the user RFID badge at step 154 and checks the validity of the identification code read from the badge at step 158. If the code does not match a valid code, an invalid user message is generated at step 162. The message may be displayed on an output device (not shown). If an optional lock is installed on the door of the MW 35, the client controller 45 then opens the solenoids in the lock on the MW 35., as shown at step 166, if the code is valid. An internal timer is then started, as shown at step 170. In one embodiment of the invention, the proximity sensor 40 is used to detect opening of the door 37 and the status of the door. Once the door opens, the proximity sensor 40 switches its status. At step 174, the client controller 45 checks to see if the door has been opened by reading the status of the proximity sensor 40. If the proximity sensor 40 has not changed status, the client controller 45 will continue to check for a predetermined amount of time, as shown at step 178. If the predetermined amount of time is exceeded, the solenoids are closed (step 182), which locks the lock 39, a timeout error message is generated (step 184), and the client controller 45 returns to the initial state, as shown at step 186.


If the door 37 is opened within the predetermined amount of time (currently set through practice at five (5) seconds), a second timer is started, as shown at step 190. The client controller 45 then records the internal temperature of the MW 35 at step 194 and then checks to see if the door 37 has been closed at step 200. The client controller 45 continues to check for closing of the door for a predetermined amount of time, as shown at step 204. If the predetermined amount of time expires, a close door message is generated as shown at step 208 and steps 190-204 are re-executed.


Once the door 37 is closed, the client controller 45 closes the solenoids, as shown at step 212. The client controller 45 then confirms that the door 37 is closed at step 216 and performs an inventory scan at step 220. The data from the inventory scan is then sent to the server 12, as shown at step 224. The client controller 45 then returns to the initial state (step 186).


In another embodiment, the system utilizes a defined area to enclose the tagged products rather than a cabinet. The defined area uses an access point to serve as its entryway. The products within the area are fitted with identification tags and specifically positioned in the area to be recognized by the RFDC inventory interface. Product scans begin when a sensor senses a user passing through the access point. The access point is controlled by a processor, such as the client controller 45, and is able to restrict access to the area and products, if necessary.


As can be seen from the above, the invention provides a method and system for distributing products. Various features and advantages of the invention are set forth in the following claims.

Claims
  • 1. An apparatus comprising: a detecting device that is configured to detect, using RFID, removal from storage of an object having a RFID tag;a temperature detection unit that is configured to determine the temperature within the storage;an access control unit that is configured to control access to the storage;a control unit that is configured to control said access control unit so as to prevent a user from accessing the storage by maintaining the storage in a locked state in accordance with the temperature determined by said temperature detection unit; anda charging unit that is configured to charge a user for the object in response to the detection by said detecting device of the removal from the area of the object;wherein said detecting device detects the removal in accordance with a comparison between two inventory records, each prepared in accordance with RFID detection.
  • 2. An apparatus according to claim 1, wherein the storage is selected from the group consisting of a refrigerator, a freezer, a container, a room, a cabinet, and an apparatus.
  • 3. An apparatus according to claim 2, wherein the two inventory records are prepared in accordance with respective successive RFID scans of the storage.
  • 4. An apparatus according to claim 1, wherein the object comprises a life science research product.
  • 5. An apparatus according to claim 4, wherein the life science research product is selected from the group consisting of enzyme, assay, cloning vector, and competent cell.
  • 6. An apparatus according to claim 1, wherein said access control unit comprises a detection unit selected from the group consisting of a card reader, a magnetic card swipe device, an antenna, a fingerprint reader, and an RFID device, and wherein said access control unit controls access to the storage in accordance with a detection by said detection unit.
  • 7. An apparatus according to claim 1, further comprising a commerce processing unit that is configured to store information providing a correspondence between (a) a user that has used said access control unit to access the storage and (b) the removed object.
  • 8. An apparatus according to claim 7, wherein said commerce processing unit invoices the user for the removed object.
  • 9. An apparatus according to claim 8, wherein the invoicing is electronic.
  • 10. An apparatus according to claim 1, wherein a determination as to whether to restock the object is automatically made by a restock determination unit in accordance with the detection by said detecting device.
  • 11. An apparatus according to claim 10, wherein the restock determination unit is in another apparatus.
  • 12. An apparatus according to claim 1, wherein the object comprises biological material.
  • 13. An apparatus according to claim 1, further comprising a user detecting unit that is configured to detect the identity of a user that has accessed the storage.
  • 14. An apparatus according to claim 13, further comprising a commerce processing unit that is configured to store information providing a correspondence between (a) the identity of the user detected by said user detecting unit and (b) the removed object.
  • 15. An apparatus according to claim 14, wherein said commerce processing unit charges the user for the removed object.
  • 16. An apparatus according to claim 1, wherein said detecting device further detects, using RFID, addition to the storage of an object having a RFID tag.
  • 17. An apparatus according to claim 1, further comprising means for reading a fingerprint and unlocking the apparatus in accordance with the fingerprint.
  • 18. An apparatus according to claim 1, further comprising means for reading an RFID badge and unlocking the apparatus in accordance with results of the reading.
  • 19. An apparatus according to claim 18, wherein a message is generated in accordance with a comparison between an RFID scanning result and an earlier RFID scanning result, wherein the unlocking comprises controlling a solenoid of an electric actuated lock with which the apparatus is equipped,wherein the detection of closing of the door comprises sensing output of a proximity sensor,wherein the RFID scanning uses an antenna mounted in the apparatus, and wherein passive RFID tags are used.
  • 20. An apparatus according to claim 1, wherein the RFID detection is performed in response to a signal from a sensor detecting closing of a door.
  • 21. An apparatus according to claim 4, comprising: a detecting device that is configured to detect, using RFID, removal from storage of an object having a RFID tag;a temperature detection unit that is configured to determine the temperature within the storage;an access control unit that is configured to control access to the storage; anda control unit that is configured to control said access control unit so as to prevent a user from accessing the storage by maintaining the storage in a locked state in accordance with the temperature determined by said temperature detection unit,wherein said detecting device detects the removal in accordance with a comparison between two inventory records, each prepared in accordance with RFID detection,wherein the object comprises a life science research product,wherein the life science research product is selected from the group consisting of enzyme, assay, cloning vector, and competent cell.
  • 22. An apparatus according to claim 21, wherein the apparatus is selected from the group consisting of a refrigerator, a freezer, a container, and a cabinet.
  • 23. A system comprising: a detecting device that is configured to detect, using RFID, whether an object having a RFID tag is present in an area;a determination unit that is configured to determine how much time the object has spent in the area in accordance with two RFID scanning results obtained by said detecting device;a comparing unit that is configured to compare the time determined by said determination unit to a predetermined amount of time;an access control unit that is configured to control access to the area; anda lock down unit that is configured to actuate a lock of said access control unit to effect a lock down condition in accordance with the comparison by said comparing unit, wherein the lock down condition continues until removal of the object from the areawherein said access control unit is configured so as to provide one-time access to the area, expiring after use, corresponding to a delivery of one or more objects to be placed into the area.
  • 24. A system according to claim 23, wherein said determination unit is further configured to determine a temperature history for the object.
  • 25. An apparatus according to claim 23, wherein the area is selected from the group consisting of a refrigerator, a freezer, a container, a room, a cabinet, and an apparatus.
  • 26. A system according to claim 23, further comprising means for generating a message in accordance with the comparison.
  • 27. A system according to claim 26, wherein the message is an e-mail message.
  • 28. A system according to claim 27, wherein the e-mail message comprises a pick list identifying an object to be removed from the area.
  • 29. An apparatus according to claim 1, wherein the RFID detection is performed in response to a signal from a sensor detecting closing of a door.
  • 30. A system comprising: detecting means that is configured to detect, using RFID, whether an object having a RFID tag is present in an area;means for determining how much time the object has spent in the area in accordance with two RFID scanning results obtained by said detecting means;means for comparing the time determined by said determining means with a predetermined amount of time;means for controlling access to the area; andmeans for actuating a lock of said means for controlling access to the area to effect a lock down condition in accordance with the comparison by said comparing means, wherein the lock down condition continues until removal of the object from the areawherein said means for controlling access to the area comprises means for providing one-time access to the area, expiring after use, corresponding to a delivery of one or more objects to be placed into the area.
  • 31. A method according to claim 30, wherein the area is selected from the group consisting of a refrigerator, a freezer, a container, a room, a cabinet, and an apparatus.
  • 32. A system according to claim 30, wherein each RFID scanning result is obtained in response to detection by a sensor of closing of a door.
  • 33. A method comprising: detecting, using RFID, whether an object having a RFID tag is present in an area; anddetermining how much time the object has spent in the area in accordance with two RFID scanning results obtained by said RFID detecting step;comparing the time determined in said determining step with a predetermined amount of time;actuating a lock to effect a lock down condition in accordance with the comparison of said comparing step; andending the lock down condition upon removal of the object from the area: andproviding one-time access to the area, expiring after use, corresponding to a delivery of one or more objects to be placed into the area.
  • 34. A method according to claim 33, wherein the area is selected from the group consisting of a refrigerator, a freezer, a container, a room, a cabinet, and an apparatus.
  • 35. A method according to claim 33, wherein each RFID scanning result is obtained in response to detection by a sensor of closing of a door.
  • 36. A system comprising: detecting means for detecting, using RFID, a change in presence in storage of an object having an RFID tag;determining means for determining whether the object detected by said detecting means has been recalled; andmeans for actuating a lock to effect a lock down condition for a user wherein the user cannot access the object, in accordance with a determination by said determining means that the object has been recalled, wherein the lock down condition for the user ends only upon removal, by another user, of the recalled object,wherein said detecting means detects the change in presence in accordance with a comparison between two inventory records, each prepared in accordance with RFID detection, andwherein the user is a user who is not an administrator, and the another user is a user who is an administrator, each of the user and the another user having a respective RFID access badge having an identification code stored therein for requesting access to the storage.
  • 37. An apparatus comprising: detecting means for detecting, using RFID, removal from storage of a RFID tag;temperature detecting means for detecting the temperature within the storage;preventing means for preventing a user from accessing the storage by maintaining the storage in a locked state in accordance with the temperature determined by said temperature detecting means;charging means for charging a user for an object related to the RFID tag in response to the detection by said detecting device of the removal from the area of the RFID tag; andwherein said detecting means detects the removal in accordance with a comparison between two inventory records, each prepared in accordance with RFID detection.
  • 38. A system comprising: a detecting device that is configured to detect, using RFID, whether a RFID tag is present in an area;a determination unit that is configured to determine how much time an object corresponding to the RFID tag has spent in an area in accordance with two RFID scanning results obtained by said detecting device;a comparing unit that is configured to compare the time determined by said determination unit to a predetermined amount of time;an access control unit for controlling access to the area; anda lock down unit that is configured to actuate a lock of said access control unit to effect a lock down condition ending upon removal of the object, in accordance with the comparison by said comparing unit,wherein said access control unit is configured so as to provide one-time access to the area, expiring after use, corresponding to a delivery of one or more objects to be placed into the area.
  • 39. A method comprising: detecting, using RFID, a change in presence in storage of a RFID tag;determining whether an object corresponding to the RFID tag detected by said detecting means has been recalled; andactuating a lock to effect a lock down condition for a user wherein the user cannot access the object, in accordance with a determination by said determining step that the object has been recalled, wherein the lock down condition for the user ends only upon removal, by another user, of the recalled object,wherein said detecting step detects the change in presence in accordance with a comparison between two inventory records, each prepared in accordance with RFID detection, andwherein the user is a user who is not an administrator, and the another user is a user who is an administrator, each of the user and the another user having a respective RFID access badge having an identification code stored therein for requesting access to the storage.
  • 40. A system according to claim 39, wherein the RFID tag is attached to the object.
Parent Case Info

This application is a divisional application of U.S. patent application Ser. No. 09/981,219 filed Oct. 16, 2001 now U.S. Pat. No. 7,258,276, which claims the benefit of U.S. Provisional Application. No. 60/241,907 filed Oct. 20, 2000.

US Referenced Citations (378)
Number Name Date Kind
3827053 Willie et al. Jul 1974 A
3861433 Schier et al. Jan 1975 A
3918671 Mizusawa Nov 1975 A
4116512 Wiser Sep 1978 A
4118693 Novikoff Oct 1978 A
4223830 Walton Sep 1980 A
4227037 Layton Oct 1980 A
4354613 Desal et al. Oct 1982 A
4414690 Nordholt et al. Nov 1983 A
4496406 Dedow Jan 1985 A
4580041 Walton Apr 1986 A
4616694 Hseih Oct 1986 A
4636634 Harper et al. Jan 1987 A
4636950 Caswell et al. Jan 1987 A
4639875 Abraham et al. Jan 1987 A
4656463 Anders et al. Apr 1987 A
4688026 Scribner et al. Aug 1987 A
4694283 Reeb Sep 1987 A
4746830 Holland May 1988 A
4785969 McLaughlin Nov 1988 A
4837568 Snaper Jun 1989 A
4847764 Halvorson Jul 1989 A
4860918 Wuyten et al. Aug 1989 A
4862160 Ekchian et al. Aug 1989 A
4866661 de Prins Sep 1989 A
4881061 Chambers Nov 1989 A
4961533 Teller et al. Oct 1990 A
5008814 Mathur Apr 1991 A
5014875 McLaughlin et al. May 1991 A
5019815 Lemelson et al. May 1991 A
5021800 Rilling Jun 1991 A
5030807 Landt et al. Jul 1991 A
5036308 Fockens Jul 1991 A
5038023 Saliga Aug 1991 A
5091713 Horne et al. Feb 1992 A
5099226 Andrews Mar 1992 A
5103222 Hogen Esch et al. Apr 1992 A
5117407 Vogel May 1992 A
5144314 Malmberg et al. Sep 1992 A
5155847 Kirouac et al. Oct 1992 A
5194856 Zijlstra Mar 1993 A
5208599 Rudduck et al. May 1993 A
5214409 Beigel May 1993 A
5231844 Park Aug 1993 A
5240139 Chirnomas Aug 1993 A
5260690 Mann et al. Nov 1993 A
5266925 Vercellotti et al. Nov 1993 A
5285041 Wright Feb 1994 A
5287414 Foster Feb 1994 A
5294931 Meier Mar 1994 A
5327118 Drucker et al. Jul 1994 A
5335509 Namisniak et al. Aug 1994 A
5365551 Snodgrass et al. Nov 1994 A
5389919 Warren et al. Feb 1995 A
5392025 Figh et al. Feb 1995 A
5408443 Weinberger Apr 1995 A
5410315 Huber Apr 1995 A
5421009 Platt May 1995 A
5424858 Gillotte Jun 1995 A
5431299 Brewer et al. Jul 1995 A
5446447 Carney et al. Aug 1995 A
5450070 Massar et al. Sep 1995 A
5460294 Williams Oct 1995 A
5471203 Sasaki et al. Nov 1995 A
5487276 Namisniak et al. Jan 1996 A
5487764 Ford, Jr. Jan 1996 A
5489908 Orthmann et al. Feb 1996 A
5491715 Flaxl Feb 1996 A
5495961 Maestre Mar 1996 A
5500650 Snodgrass et al. Mar 1996 A
5519381 Marsh et al. May 1996 A
5520450 Colson, Jr. et al. May 1996 A
5521601 Kandlur et al. May 1996 A
5528222 Moskowitz et al. Jun 1996 A
5528232 Verma et al. Jun 1996 A
5530702 Palmer et al. Jun 1996 A
5537105 Marsh et al. Jul 1996 A
5539394 Cato et al. Jul 1996 A
5541604 Meier Jul 1996 A
5550547 Chan et al. Aug 1996 A
5557280 Marsh et al. Sep 1996 A
5564803 McDonald et al. Oct 1996 A
5565858 Guthrie Oct 1996 A
5573082 Conlan et al. Nov 1996 A
5583819 Roesner et al. Dec 1996 A
5600121 Kahn et al. Feb 1997 A
5602538 Orthmann et al. Feb 1997 A
5606902 Hosono et al. Mar 1997 A
5608298 Frolov et al. Mar 1997 A
5608739 Snodgrass et al. Mar 1997 A
5621199 Calari et al. Apr 1997 A
5627517 Theimer et al. May 1997 A
5627544 Snodgrass et al. May 1997 A
5629981 Nerlikar May 1997 A
5648765 Cresap et al. Jul 1997 A
5648767 O'Connor et al. Jul 1997 A
5680459 Hook et al. Oct 1997 A
5686902 Reis et al. Nov 1997 A
5689238 Cannon, Jr. et al. Nov 1997 A
5699066 Marsh et al. Dec 1997 A
5701252 Facchin et al. Dec 1997 A
5703347 Reddersen et al. Dec 1997 A
5708423 Ghaffari et al. Jan 1998 A
5711160 Namisniak et al. Jan 1998 A
5713485 Liff et al. Feb 1998 A
RE35743 Pearson Mar 1998 E
5726630 Marsh et al. Mar 1998 A
5739765 Stanfield et al. Apr 1998 A
5742618 Lowe Apr 1998 A
5745036 Clare Apr 1998 A
5745366 Higham et al. Apr 1998 A
5751221 Stanfield et al. May 1998 A
5764992 Kullick et al. Jun 1998 A
5765707 Kenevan Jun 1998 A
5771003 Seymour Jun 1998 A
5774053 Porter Jun 1998 A
5774059 Henry et al. Jun 1998 A
5774876 Woolley et al. Jun 1998 A
5777561 Chieu et al. Jul 1998 A
5786763 Canipe Jul 1998 A
5787174 Tuttle Jul 1998 A
H1743 Graves et al. Aug 1998 H
5797515 Liff et al. Aug 1998 A
5798693 Engellenner Aug 1998 A
5798694 Reber et al. Aug 1998 A
5801628 Maloney Sep 1998 A
5805455 Lipps Sep 1998 A
5805456 Higham et al. Sep 1998 A
5805897 Glowny Sep 1998 A
5818348 Walczak et al. Oct 1998 A
5822692 Krishan et al. Oct 1998 A
5822714 Cato Oct 1998 A
5825806 Tuttle Oct 1998 A
5831531 Tuttle Nov 1998 A
5836618 Perlman Nov 1998 A
5841770 Snodgrass et al. Nov 1998 A
5842118 Wood, Jr. Nov 1998 A
5842976 Williamson Dec 1998 A
5852911 Yuyama et al. Dec 1998 A
5857152 Everett Jan 1999 A
5883582 Bowers et al. Mar 1999 A
5886634 Muhme Mar 1999 A
5887176 Griffith et al. Mar 1999 A
5889474 LaDue Mar 1999 A
5892441 Woolley et al. Apr 1999 A
5894266 Wood, Jr. et al. Apr 1999 A
5902984 Planke May 1999 A
5902991 Kumar May 1999 A
5905653 Higham et al. May 1999 A
5906228 Keller May 1999 A
5909581 Park Jun 1999 A
5910776 Black Jun 1999 A
5912818 McGrady et al. Jun 1999 A
5923001 Morris et al. Jul 1999 A
5923300 Mejia Jul 1999 A
5927540 Godlewski Jul 1999 A
5929779 MacLellan et al. Jul 1999 A
5929801 Aslanidis et al. Jul 1999 A
5930145 Yuyama et al. Jul 1999 A
5930766 Gibb Jul 1999 A
5936527 Isaacman et al. Aug 1999 A
5949335 Maynard Sep 1999 A
5950630 Portwood et al. Sep 1999 A
5955298 Thomashow et al. Sep 1999 A
5955950 Gallagher, III et al. Sep 1999 A
5955951 Wischerop et al. Sep 1999 A
5959531 Gallagher, III et al. Sep 1999 A
5959568 Woolley Sep 1999 A
5959606 Goodman et al. Sep 1999 A
5960048 Haartsen Sep 1999 A
5963134 Bowers et al. Oct 1999 A
5963144 Kruest Oct 1999 A
5969606 Reber et al. Oct 1999 A
5971277 Cragun et al. Oct 1999 A
5974454 Apfel et al. Oct 1999 A
5977875 Lin et al. Nov 1999 A
5979941 Mosher, Jr. et al. Nov 1999 A
5986570 Black et al. Nov 1999 A
5990794 Alicot et al. Nov 1999 A
5993046 McGrady et al. Nov 1999 A
5995019 Chieu et al. Nov 1999 A
5995898 Tuttle Nov 1999 A
5999091 Wortham Dec 1999 A
5999741 May et al. Dec 1999 A
5999808 LaDue Dec 1999 A
6002344 Bandy et al. Dec 1999 A
6003006 Colella et al. Dec 1999 A
6006034 Heath et al. Dec 1999 A
6009274 Fletcher et al. Dec 1999 A
6011243 Arnold et al. Jan 2000 A
6011999 Holmes Jan 2000 A
6012041 Brewer et al. Jan 2000 A
6020856 Alicot Feb 2000 A
6021392 Lester et al. Feb 2000 A
6023610 Wood, Jr. Feb 2000 A
6025780 Bowers et al. Feb 2000 A
6031459 Lake Feb 2000 A
6034603 Steeves Mar 2000 A
6036099 Leighton Mar 2000 A
6037879 Tuttle Mar 2000 A
6039467 Holmes Mar 2000 A
6040773 Vega et al. Mar 2000 A
6044461 Agha et al. Mar 2000 A
6056199 Wiklof et al. May 2000 A
6057756 Engellenner May 2000 A
6068156 Liff et al. May 2000 A
6069564 Hatano et al. May 2000 A
6070012 Eitner et al. May 2000 A
6070070 Ladue May 2000 A
6075441 Maloney Jun 2000 A
6088431 LaDue Jul 2000 A
6097306 Leon et al. Aug 2000 A
6107917 Carrender et al. Aug 2000 A
6108588 McGrady Aug 2000 A
6112152 Tuttle Aug 2000 A
6112502 Frederick et al. Sep 2000 A
6116461 Broadfield et al. Sep 2000 A
6121583 Hansen Sep 2000 A
6121880 Scott et al. Sep 2000 A
6127928 Issacman et al. Oct 2000 A
6127981 Pritchett et al. Oct 2000 A
6131399 Hall Oct 2000 A
6131812 Schneider Oct 2000 A
6133835 De Leeuw et al. Oct 2000 A
6144848 Walsh et al. Nov 2000 A
6144859 LaDue Nov 2000 A
6147601 Sandelman et al. Nov 2000 A
6147655 Roesner Nov 2000 A
6147662 Grabau et al. Nov 2000 A
6151536 Arnold et al. Nov 2000 A
6152364 Schoonen et al. Nov 2000 A
6152365 Kolls Nov 2000 A
6154790 Pruett et al. Nov 2000 A
6160477 Sandelman et al. Dec 2000 A
6169483 Ghaffari et al. Jan 2001 B1
6170285 Huffman et al. Jan 2001 B1
6185198 LaDue Feb 2001 B1
6202925 Machii et al. Mar 2001 B1
6204764 Maloney Mar 2001 B1
6211782 Sandelman et al. Apr 2001 B1
6218942 Vega et al. Apr 2001 B1
6223984 Renner et al. May 2001 B1
6229443 Roesner May 2001 B1
6249227 Brady et al. Jun 2001 B1
6260049 Fitzgerald et al. Jul 2001 B1
6265976 Roesner Jul 2001 B1
6272394 Lipps Aug 2001 B1
6285868 LaDue Sep 2001 B1
6296148 Myers et al. Oct 2001 B1
6305609 Melzer et al. Oct 2001 B1
6313747 Imalchi et al. Nov 2001 B2
6327576 Ogasawara Dec 2001 B1
6338007 Broadfield et al. Jan 2002 B1
6339732 Phoon et al. Jan 2002 B1
6351215 Rodgers et al. Feb 2002 B2
6356197 Patterson et al. Mar 2002 B1
6362737 Rodgers et al. Mar 2002 B1
6375780 Tuttle et al. Apr 2002 B1
6385505 Lipps May 2002 B1
6392543 Maloney May 2002 B2
6392544 Collins et al. May 2002 B1
6393339 Yeadon May 2002 B1
6407665 Maloney Jun 2002 B2
6407669 Brown et al. Jun 2002 B1
6424260 Maloney Jul 2002 B2
6424262 Garber et al. Jul 2002 B2
6427913 Maloney Aug 2002 B1
6431438 Pires et al. Aug 2002 B1
6445297 Nicholson Sep 2002 B1
6451154 Grabau et al. Sep 2002 B1
6462661 Pfeiffer et al. Oct 2002 B2
6501435 King et al. Dec 2002 B1
6512459 Benezech et al. Jan 2003 B2
6512478 Chien Jan 2003 B1
6517000 McAllister et al. Feb 2003 B1
6522645 Lee et al. Feb 2003 B1
6529446 de la Huerga Mar 2003 B1
6563425 Nicholson et al. May 2003 B2
6568596 Shaw May 2003 B1
6590498 Helms Jul 2003 B2
6595418 Igarashi et al. Jul 2003 B1
6600420 Goff et al. Jul 2003 B2
6609047 Lipps Aug 2003 B1
6639509 Martinez Oct 2003 B1
6639514 Müller Oct 2003 B1
6640159 Holmes et al. Oct 2003 B2
6664895 Zhu Dec 2003 B2
6677852 Landt Jan 2004 B1
6677857 Bara et al. Jan 2004 B2
6686830 Schirtzer Feb 2004 B1
6687609 Hsiao et al. Feb 2004 B2
6693539 Bowers et al. Feb 2004 B2
6700491 Shafer Mar 2004 B2
6707381 Maloney Mar 2004 B1
6714121 Moore Mar 2004 B1
6717154 Black et al. Apr 2004 B2
6758802 Fitzgerald et al. Jul 2004 B2
6760643 Lipps Jul 2004 B2
6761637 Weston et al. Jul 2004 B2
6768419 Garber et al. Jul 2004 B2
6771766 Shafiee et al. Aug 2004 B1
6793127 Alsafadi et al. Sep 2004 B2
6812824 Goldinger et al. Nov 2004 B1
6829520 Green Dec 2004 B1
6830181 Bennett Dec 2004 B1
6836215 Laurash et al. Dec 2004 B1
6838989 Mays et al. Jan 2005 B1
6839604 Godfrey et al. Jan 2005 B2
6843720 Luciano et al. Jan 2005 B2
6859757 Muehl et al. Feb 2005 B2
6883710 Chung Apr 2005 B2
6892520 Rowse et al. May 2005 B2
6892545 Ishikawa et al. May 2005 B2
6908034 Alleshouse Jun 2005 B2
6909326 Jesme Jun 2005 B2
6970141 Copeland et al. Nov 2005 B2
6975834 Forster Dec 2005 B1
6982640 Lindsay et al. Jan 2006 B2
6987392 Hernandez et al. Jan 2006 B1
6989749 Mohr Jan 2006 B2
6989796 Rahim Jan 2006 B2
7020680 Defosse Mar 2006 B2
7053775 Moore May 2006 B2
7250865 Maloney Jul 2007 B2
7268742 Rahim Sep 2007 B2
7455225 Hadfield et al. Nov 2008 B1
20010000019 Bowers et al. Mar 2001 A1
20010002448 Wilson et al. May 2001 A1
20010011341 Hayes, Jr. et al. Aug 2001 A1
20010028308 De La Huerga Oct 2001 A1
20010034259 Luciano et al. Oct 2001 A1
20010034613 Rubsamen Oct 2001 A1
20010044731 Coffman et al. Nov 2001 A1
20010044804 Fitzgerald et al. Nov 2001 A1
20010045893 Swartzel et al. Nov 2001 A1
20010053980 Suliman et al. Dec 2001 A1
20020011967 Goff et al. Jan 2002 A1
20020013077 Lepine et al. Jan 2002 A1
20020027507 Yarin et al. Mar 2002 A1
20020038167 Chirnomas Mar 2002 A1
20020040968 Black et al. Apr 2002 A1
20020041234 Kuzma et al. Apr 2002 A1
20020063622 Armstrong et al. May 2002 A1
20020113082 Leatherman et al. Aug 2002 A1
20020140966 Meade, II et al. Oct 2002 A1
20020143320 Levin Oct 2002 A1
20020145036 Otto Oct 2002 A1
20020145520 Maloney Oct 2002 A1
20020153411 Wan et al. Oct 2002 A1
20020167397 Eroglu et al. Nov 2002 A1
20020180588 Erickson et al. Dec 2002 A1
20020183882 Dearing et al. Dec 2002 A1
20020190871 Stanfield et al. Dec 2002 A1
20020196126 Eisenberg et al. Dec 2002 A1
20030006907 Lovegreen et al. Jan 2003 A1
20030030539 McGarry et al. Feb 2003 A1
20030034390 Linton et al. Feb 2003 A1
20030052783 Sitzman Mar 2003 A1
20030117281 Sriharto et al. Jun 2003 A1
20030171998 Pujar et al. Sep 2003 A1
20030174046 Abrams Sep 2003 A1
20030209601 Chung Nov 2003 A1
20030216969 Bauer et al. Nov 2003 A1
20040069850 De Wilde Apr 2004 A1
20040100415 Veitch et al. May 2004 A1
20040124988 Leonard et al. Jul 2004 A1
20040263316 Dix et al. Dec 2004 A1
20050008376 Parry et al. Jan 2005 A1
20050009122 Whelan et al. Jan 2005 A1
20050088305 Greene et al. Apr 2005 A1
20050113138 Mendolia et al. May 2005 A1
20050247782 Ambartsoumian Nov 2005 A1
20060006999 Walczyk et al. Jan 2006 A1
20060017634 Meissner Jan 2006 A1
20060022827 Higham Feb 2006 A1
20060244599 Taylor et al. Nov 2006 A1
20060289650 Taylor et al. Dec 2006 A1
20080100527 Rahim May 2008 A1
Foreign Referenced Citations (58)
Number Date Country
2002211769 Mar 2007 AU
0 632 288 Jan 1995 EP
0726545 Aug 1996 EP
2786876 Jun 2000 FR
51-122498 Oct 1976 JP
4185397 Jul 1992 JP
10-316210 Dec 1998 JP
11-085858 Mar 1999 JP
11-130213 May 1999 JP
11-283123 Oct 1999 JP
2000-038202 Feb 2000 JP
2000-137758 May 2000 JP
2000-276335 Oct 2000 JP
200-310476 Nov 2000 JP
2000-310476 Nov 2000 JP
2001-097512 Apr 2001 JP
2001-229263 Aug 2001 JP
2001-240217 Sep 2001 JP
2001-317859 Nov 2001 JP
2001-317862 Nov 2001 JP
2002-032865 Jan 2002 JP
1993-0005285 Mar 1993 KR
1996-0002892 Apr 1996 KR
10-0184972 May 1999 KR
2001-0022226 Mar 2001 KR
2001-0022227 Mar 2001 KR
2001-0072457 Jul 2001 KR
10-0766679 Oct 2007 KR
2 161 329 Dec 2000 RU
2 168 761 Jun 2001 RU
WO 9612254 Apr 1996 WO
WO 9724689 Jul 1997 WO
WO 9729729 Aug 1997 WO
WO 9852168 Nov 1998 WO
WO 9905659 Feb 1999 WO
WO 9905660 Feb 1999 WO
WO 9912122 Mar 1999 WO
WO 9945493 Sep 1999 WO
WO 9945494 Sep 1999 WO
WO 9945495 Sep 1999 WO
WO 9946940 Sep 1999 WO
WO 9949337 Sep 1999 WO
WO 9952723 Oct 1999 WO
WO 9957837 Nov 1999 WO
WO 9960512 Nov 1999 WO
WO 9962196 Dec 1999 WO
WO 9967735 Dec 1999 WO
WO 0003352 Jan 2000 WO
WO 0004485 Jan 2000 WO
WO 0004520 Jan 2000 WO
WO 0155931 Aug 2001 WO
WO 0194016 Dec 2001 WO
WO 0195243 Dec 2001 WO
WO 0201467 Jan 2002 WO
WO 0235432 May 2002 WO
WO 03026724 Apr 2003 WO
WO 03073225 Sep 2003 WO
WO 03087868 Oct 2003 WO
Related Publications (1)
Number Date Country
20040232230 A1 Nov 2004 US
Provisional Applications (1)
Number Date Country
60241907 Oct 2000 US
Divisions (1)
Number Date Country
Parent 09981219 Oct 2001 US
Child 10862456 US