The present disclosure relates to a rescue system and a rescue method as well as a server used for the rescue system and the rescue method, and more particularly relates to a system using a vehicle to detect a person to be protected (protection target) who is absent without leave, so as to protect the person.
Recently, with the aging of the society, the number of elderly people suffering from diseases and symptoms such as dementia has been increasing. Dementia patients who are cared for at home may leave home without permission while the caregiver is absent to eventually go missing or suffer an accident, for example.
A system for searching for such an elderly person or lost child for example has been known. For example, Japanese Patent Laying-Open No. 2015-111906 discloses a search system for determining whether a person whose image is captured by a camera is a search target, based on images and/or video captured by a plurality of cameras connected to a network such as monitoring cameras installed on streets and moving cameras mounted on movable bodies like vehicles, and also based on text information derived from a name tag or the like shown on the images.
Japanese Patent Laying-Open No. 2016-218865 discloses a rescue system for identifying a user such as dementia patient based on a serial number on an accessory worn by the user. The serial number is read by a smart phone or the like of a finder of the user and transmitted to a data management company from the smart phone.
The technique disclosed in above-referenced Japanese Patent Laying-Open No. 2015-111906 conducts a search using cameras installed across a large area. Based on positional information about a camera transmitted together with image information captured by the camera, the identified search target is located. As for the moving cameras mounted on movable bodies such as vehicles, however, the movable body may go out of an area to be searched, resulting in the possibility that the search system loses sight of the search target during the search or becomes unable to search for the target.
The present disclosure is given to provide solutions to the above problems. An object of the present disclosure is to efficiently search for a person to be protected (hereinafter referred to as “protection target”), by a system for identifying the protection target based on information from a detection device mounted on a movable body, so as to rescue the protection target.
A rescue system according to the present disclosure is a rescue system for identifying and rescuing a protection target, using information from a detection device. The rescue system includes: a plurality of movable bodies each equipped with the detection device; and a server configured to communicate with the plurality of movable bodies. The server is configured to (a) define a search area to be searched for the protection target, (b) acquire positional information about the plurality of movable bodies and select, from movable bodies located within the search area, at least one movable body to be used for searching for the protection target, the movable body being selected as a selected movable body, and (c) output, to the selected movable body, a search command for searching for the protection target.
When the rescue system in the present disclosure searches for a protection target, the server first defines a search area to be searched for the protection target, selects a movable body from movable bodies (vehicles, for example) located within the defined search area, so as to use the selected movable body for collecting information for the search. A command to search is then output to the selected movable body. In this way, the search for the protection target is conducted based on information from the movable body at an appropriate position within an appropriate search area defined based on a usual range of activities of the protection target. Therefore, even when the camera position moves with movement of the vehicle, the system will not lose sight of the protection target, and the search for the protection target can be conducted efficiently. Moreover, information is limited to information from vehicles within the specific search area. It is therefore possible to limit the amount of communication between the vehicles and the server and suppress increase of the amount of information processing by the server.
When receiving the search command, the selected movable body transmits to the server information acquired from the detection device. The server identifies the protection target, based on the information transmitted from the selected movable body.
In the system thus configured, information acquired by a movable body is transmitted to the server and the server identifies the protection target. Generally, the server stores more information and has a controller of a higher throughput than the movable body. The server therefore identifies the protection target to thereby enable accurate identification of the protection target.
The detection device is a camera. The server identifies the protection target, using an image captured by the camera and transmitted from the selected movable body.
The server uses a characteristic of a candidate included in the image captured by the camera to identify the candidate as the protection target. The characteristic includes text information about the candidate, and clothing, belonging, and behavioral pattern of the candidate.
In the system thus configured, the protection target can be identified based on an image from a camera mounted on a movable body as a detection device.
The protection target has a belonging with ID information. The detection device is a sensor configured to read the ID information. The server uses the ID information transmitted from the selected movable body to identify the protection target.
In the system thus configured, the server can identify the protection target, based on the ID information of the belonging of the protection target.
The server transmits to the selected movable body information for identifying the protection target. The selected movable body compares information acquired from the detection device with the information transmitted from the server to identify the protection target, and transmits, to the server, detection information of the protection target.
In the system thus configured, the movable body can perform a part of the process performed for identifying the protection target. Accordingly, transmission/reception of information between the movable bodies and the server and the processing load on the server can be reduced.
Search for the protection target is performed in response to a request from a requester. When the protection target is identified, the server provides the requester with a notification that the protection target has been found.
The system configured in this way can immediately inform the requestor of the fact that the protection target has been found.
When the protection target is identified, the server outputs, to the selected movable body, a command to watch the protection target.
In the system configured in this way, when the protection target is identified, the movable body can keep tracking the protection target. Thus, the system can be prevented from losing sight of the found protection target.
When the protection target is identified, the server makes a rescue request, to a rescue group, to rescue the protection target.
In the system configured in this way, even when the requester cannot immediately rush to the location where the protection target is found, a person in charge belonging to the rescue group can protect the protection target.
The server uses information from the selected movable body to determine a protection level for the protection target. When the protection level is larger than a threshold value, the server makes the rescue request to the rescue group. The protection level is determined in accordance with at least one of a location where the protection target is detected, a time when the protection target is detected, weather when the protection target is detected, and a condition of the protection target when the protection target is detected.
When a location where the protection target is detected is out of a predetermined range, the server makes the rescue request to the rescue group.
When the server makes the rescue request to the rescue group, the server provides the rescue group with a notification of positional information about the protection target. In response to the rescue request from the server, the rescue group dispatches a person in charge to a location indicated by the positional information.
When the requester makes a request to rescue after receiving the notification, the server makes a rescue request, to a rescue group, to rescue the protection target.
In the system configured in this way, it is determined whether to make a rescue request to the rescue group, in accordance with the protection level determined in accordance with the environment of the protection target and the condition of the protection target when the protection target is found, and a request from the requester. In some cases, the identified protection target may perform an ordinary activity such as walking or shopping, and such a protection target requires no rescue. Whether to make a rescue request to a rescue group is determined in accordance with the protection level which is determined based on detected information. Accordingly, unnecessary requests to rescue can be suppressed.
A server according to another aspect of the present disclosure is a server used for a rescue system for identifying and rescuing a protection target. The server is configured to (a) define a search area to be searched for a protection target, (b) acquire positional information about a plurality of movable bodies and select, from movable bodies located within the search area, at least one movable body to be used for searching for the protection target, the movable body being selected as a selected movable body, and (c) output, to the selected movable body, a search command for searching for the protection target.
A method according to still another aspect of the present disclosure is a rescue method for identifying and rescuing a protection target, in a system including: a plurality of movable bodies each equipped with a detection device; and a server configured to communicate with the plurality of movable bodies. The method includes, by the server: (a) defining a search area to be searched for the protection target; (b) acquiring positional information about the plurality of movable bodies; (c) selecting, from movable bodies located within the search area, at least one movable body to be used for searching for the protection target, the movable body being selected as a selected movable body; and (d) outputting, to the selected movable body, a search command for searching for the protection target.
The foregoing and other objects, features, aspects and advantages of the present disclosure will become more apparent from the following detailed description of the present disclosure when taken in conjunction with the accompanying drawings.
In the following, embodiments of the present disclosure are described in detail with reference to the drawings. In the drawings, the same or corresponding elements are denoted by the same reference characters, and a description thereof is not repeated.
<System Overview>
Regarding the present embodiment, an example is described in which a vehicle is used as movable body 100, and movable body 100 is also referred to simply as “vehicle 100” hereinafter. Vehicle 100 includes automobile, motorcycle, bicycle, and the like.
Vehicle 100 and server 200 are configured to transmit/receive information to/from each other through a communication network 300 such as the Internet or telephone line, for example. Vehicle 100 and server 200 may directly communicate with each other without communication network 300.
A requester requests server 200 to search for a target person, by manipulating a user terminal 500 such as a mobile terminal 510 like smart phone or a personal computer 520 at the requester's home. Server 200 receiving the request acquires information from cameras and/or a variety of sensors mounted on vehicles 100 or a stationary camera 600 installed on a street or shop, and identifies the protection target, using the acquired information.
After identifying the protection target, server 200 requests a rescue group 400 to protect the protection target as required. Rescue group 400 includes, for example, a public office such as city office or municipal office, a police, a fire station, a security company, an NPO (Non-Profitable Organization), and a public transportation facility such as taxi company, or local social worker. Alternatively, rescue group 400 may be a vehicle or a shop located around the location where the protection target is detected. Rescue group 400 receiving the request temporarily accepts the protection target until a protector arrives, or sends the protection target to the protection target's home.
<Configuration of Vehicle and Server>
Communication unit 160 is a communication interface between vehicle 100 and communication network 300. Vehicle 100 transmits/receives information to/from server 200 through communication unit 160.
Camera 110 is a CCD (Charge Coupled Device) camera, for example, and attached to a front portion and/or a rear portion of vehicle 100. Camera 110 is mounted as a part of a drive recorder for recording images and/or video when vehicle 100 suffers an accident or the like, for example. The images captured by camera 110 are transmitted to server 200 through communication unit 160. The images are captured by camera 110 not only during running of vehicle 100 but also during parking of vehicle 100 at a parking area or the like.
Sensor 120 is a receiver for wirelessly detecting information stored on an ID tag or the like, or a reader for reading information from a barcode or QR Code® (two-dimensional barcode), for example. The information acquired by sensor 120 is transmitted to server 200 through communication unit 160 and used for identifying a protection target. Camera 110 and sensor 120 mentioned above correspond to “detection device” in the present disclosure.
Position detection unit 150 is mounted for example on a navigation device (not shown) to acquire information about the absolute position of the vehicle on which this position detection unit 150 is mounted, by means of the GPS (Global Positioning System). Position detection unit 150 outputs the acquired positional information to server 200.
Display 170 is constructed for example of a liquid crystal panel to display various types of information acquired by vehicle 100 as well as information transmitted from server 200. Display 170 is formed for example in a window of vehicle 100 and configured to provide information to those who are outside the vehicle (protection target, for example). Conversation through audio output unit 180 as well as display 170 like videophone, and communication by answering to a question indicated on display 170 through touch operation are also possible.
Controller 130 includes a CPU (Central Processing Unit), a storage such as memory, and an input/output buffer (they are not shown), to perform overall control of vehicle 100. Receiving from server 200 a command to search for a protection target, controller 130 acquires information from the detection device (camera 110 and/or sensor 120) and transmits the acquired information to server 200. When vehicle 100 is to identify the protection target, controller 130 stores in storage unit 140 information regarding the protection target which is transmitted from server 200, and compares the information acquired from the detection device with the information stored in storage unit 140 to identify the protection target.
Server 200 includes a control unit 210, a storage unit 220, and a communication unit 230. Control unit 210 includes a protection target determination unit 212, and an action determination unit 214.
Communication unit 230 is a communication interface between server 200 and communication network 300. Server 200 transmits/receives information to/from vehicle 100 and rescue group 400 for example through communication unit 230.
Storage unit 220 stores in advance information about characteristics of a protection target for identifying the protection target. The characteristics used for identifying the protection target include text information such as the name, the address, and the phone number of the protection target, image information such as a photograph of the face of the protection target, characteristics of favorite clothing and belongings (hat/cap, gloves, shoes, bag, and the like) often worn by the protection target, or information about characteristic behavioral patterns of the protection target such as the manner of walking and body language.
Protection target determination unit 212 included in control unit 210 receives image information acquired by camera 110 of vehicle 100 and/or information acquired by sensor 120. Protection target determination unit 212 analyzes the image information from camera 110 to detect characteristics of the face, clothing, and belongings of any person (candidate) included in the image and extract text information included in the image. Protection target determination unit 212 compares these pieces of information with the information stored in storage unit 140 to determine whether the candidate included in the image is the protection target who is being searched for by request. Protection target determination unit 212 may also compare the ID information extracted by sensor 120 with the information stored in storage unit 140 to identify the protection target. It may also extract, from the image (video image) from camera 110, behavioral patterns of the candidate by big data analysis, so as to identify the protection target.
Action determination unit 214 determines what action is to be taken, when protection target determination unit 212 identifies the protection target. Specifically, action determination unit 214 determines whether to inform the search requester of the fact that the protection target has been found, and determines whether to make a rescue request to a rescue group, in accordance with standards stored in storage unit 220.
In such a system, the server recognizes and identifies the protection target to be searched for, based on information transmitted from a plurality of vehicles. In order to collect a large amount of information, it is necessary to acquire information from a large number of vehicles distributed across a large area. If information is acquired from an excessively large number of vehicles, however, the amount of information communicated between the server and the vehicles increases and accordingly the processing load on the server increases.
Generally, the usual range of activities of a protection target such as dementia patient is limited to a certain extent. It may be possible to invariably designate vehicles as vehicles from which information is to be collected, in order to limit the amount of information. However, because vehicles are movable, any vehicle going out of the usual range of activities of the protection target could transmit unnecessary information or lose sight of the protection target.
In view of the above, the present embodiment employs the following scheme. Specifically, when a requester makes a request to search for a protection target, a search area is defined in advance for the protection target to be searched for. From among vehicles located within the defined search area, a vehicle from which information is to be collected is determined based on the positional information about the vehicle. According to this scheme, it is possible to use only the information from the vehicle at an appropriate position within the appropriate search area which is determined based on the range of activities of the protection target, so as to recognize and identify the protection target. Even when the vehicle moves and accordingly the camera position moves, the system can be prevented from losing sight of the protection target. Efficient search for the protection target is therefore possible. In addition, because the information is limited to the information from the vehicle within the specified search area, transmission and reception of unnecessary information between vehicles and the server can be suppressed.
<Description of Control Details>
Referring to
Acquiring information about the protection target, server 200 proceeds to S110 to define a search area to be searched for the protection target. The search area is preferably defined based on the usual range of activities of the protection target. The search area may be defined based on the address of the protection target, such as an area of 20 km from the protection target's home, for example, or the search area may be within a range designated by the requester.
In S115, server 200 acquires positional information about a plurality of vehicles through communication network 300. From among vehicles located within the defined search area, at least one vehicle is selected (selected movable body) to be used for the search for the protection target. In S115, server 200 outputs a search command to selected vehicle 100 to search for the protection target. Although not shown in the flowchart, if the selected vehicle moves to go out of the search area or a new vehicle enters the search area, the vehicle to be used for search may be changed as appropriate.
Acquiring information about a candidate from selected vehicle 100 to which the search command is output (S125), server 200 determines whether the candidate is identified as the protection target of the requested search, based on the information acquired from vehicle 100 (S130).
When the candidate is not the protection target (NO in S130), the process returns to S125 in which server 200 further acquires information from the aforementioned or another vehicle 100 and further compares the acquired information with the information about the protection target (S130).
When the candidate is the protection target (YES in S130), server 200 informs, in step S135, the requester of the fact that the protection target of the requested search has been found, and informs each vehicle 100 conducting the search of the information about the location where the protection target was found and the latest information about characteristics of the protection target, for example. In response, each vehicle 100 watches the found protection target.
In S140, server 200 transmits a command to protect (request for rescue) to rescue group 400 such as a security company or a police office near the location where the protection target was found. Receiving the request for rescue, the rescue group dispatches a person in charge to the location indicated by the positional information about the protection target transmitted from server 200. In this way, even under situations where the requester cannot immediately rush to the location where the protection target was found, the requester can request the rescue group to rescue the found protection target, so that the protection target may be appropriately protected.
After this, in S145, server 200 determines whether the requester or an administrator of server 200 has instructed server 200 to end the search process. When the instruction to end the search process has not been given (NO in S145), the process proceeds to S125 in which server 200 keeps searching for and watching the protection target. When the instruction to end the search process is given (YES in S145), the process proceeds to S150 in which server 200 transmits to each vehicle a command to end the search. The command to end the search in S150 may be issued based on information indicating that protection of the protection target is completed which is given from rescue group 400.
Next, a process performed by vehicle 100 is described. While
In S200, vehicle 100 determines whether the vehicle has received from server 200 a command to search for a protection target, i.e., whether the vehicle itself has been selected as a vehicle for searching for the protection target. When the vehicle has not received from server 200 the command to search (NO in S200), the process returns to S200 and the search process is kept on standby until the command to search is given from server 200.
When the vehicle has received the command to search (YES in S200), the process proceeds to S210 in which vehicle 100 starts the search process. As described above with reference to
When no candidate is detected (NO in S220), the process returns to S220 and vehicle 100 continues the search for a candidate. When the candidate is detected (YES in S220), the process proceeds to S230 in which vehicle 100 transmits to server 200 information acquired by camera 110 and/or sensor 120.
Receiving the information that server 200 has identified the protection target based on the information from vehicle 100, vehicle 100 acquires from server 200, in S240, information about the location where the protection target was detected and information about characteristics of the protection target at the time when the protection target was detected, for example, and watches the protection target based on the acquired information. Watching of the protection target is, for example, tracking of the identified protection target by this vehicle or other vehicles around the former vehicle. Thus, the identified protection target is kept being watched and accordingly the system can be prevented from losing sight of the protection target.
Vehicle 100 thereafter determines, in S250, whether server 200 has transmitted a command to end the search for the protection target. When vehicle 100 has not received the command to end the search (NO in S250), the process returns to S240 in which the watching of the protection target is continued. If the protection target goes out of the field of view of camera 110, for example, the process may return to S220 in which the search for a candidate may be newly performed.
When the vehicle has received the command to end the search (YES in S250), the process proceeds to S260 and vehicle 100 accordingly ends the search process.
Although not shown in
Under control performed in accordance with the process as described above, when a requester makes a request to search for a protection target, the command to search is output from the server to a specific vehicle located within the defined search area. In this way, the amount of communication between the vehicles and the server can be limited to a certain extent. It is therefore possible to conduct the search for the protection target while suppressing increase of the amount of information processing by the server. Moreover, because a vehicle to be used for the search is selected appropriately based on the position of the vehicle in the defined search area, the search can be conducted efficiently.
According to the first embodiment, the vehicle detects a candidate based on information acquired from the camera for example, and the final recognition and identification of the protection target are performed by the server. The identification of the protection target requires an analysis by means of big data for example, or requires a check against many pieces of registered data. This processing can be performed by the server with a high throughput to thereby improve the accuracy in recognition and identification of the protection target.
The above description of the first embodiment relates to an example in which the recognition and identification of a protection target are performed by the server. As described above, the server stores a large amount of information. In addition, a controller with a high throughput is used for the server. The server can therefore make determinations with higher accuracy for the recognition and identification of a protection target.
If the number of vehicles used for conducting a search for a target person increases, the total amount of information transmitted and received to/from the vehicles and the server increases, which may result in increase of the time taken for communication and/or increase of the processing load on the server.
Regarding a second embodiment, a scheme is described according to which a specific part or the whole of the recognition and identification of a protection target is performed by the controller in the vehicle so as to reduce the amount of communication between the vehicles and the server and reduce the processing load on the server.
Referring to
Receiving, in S200A, the command to search and the information about a protection target transmitted from server 200, vehicle 100 starts the search for the protection target, following the command to search (S210). Then, in S220A, based on the information received from server 200 for identifying the protection target, vehicle 100 identifies the protection target, from the information acquired by camera 110 or sensor 120.
The throughput of the controller and the storage capacity of the storage device mounted on vehicle 100 are commonly inferior to those of server 200. Therefore, the process for identifying the protection target that is performed by vehicle 100 is preferably limited to a scheme that enables the process to be performed with a relatively low processing load, rather than a scheme which requires a high throughput like use of big data, for example. For example, the process for reading ID information by sensor 120 or the process for extracting text information from images captured by camera 110, for example, so as to identify the person to be protected, are examples of the process that is executable by vehicle 100.
When vehicle 100 has identified the protection target, vehicle 100 transmits to server 200 detection information of the protection target. When server 200 performs a part of the process for identifying the protection target, vehicle 100 additionally transmits, in S230A, information necessary for the process to be performed by server 200.
Receiving from vehicle 100 the detection information of the protection target (S125A), server 200 gives the requester a notification that the protection target has been found (S135), and makes a rescue request to rescue group 400 to rescue the protection target, based on the detection information (S140). Although not shown in
Control performed in accordance with the process as described above enables the vehicle to execute at least a part of the recognition and identification of the protection target. Accordingly, the protection target can be searched for efficiently with a reduced amount of communication between the vehicle and the server and a reduced processing load on the server.
According to the first and second embodiments, the finding of the protection target is always followed by a rescue request given to a rescue group. In some cases, the protection target may perform an ordinary activity such as walking or shopping, for example. If the request to rescue is given to the rescue group in such a case as well, an unnecessary call-out may be made to a person in charge, for example, which leads to inefficiency.
Regarding a third embodiment, a description is given of the features that a protection level for the detected protection target is determined depending on the situation or condition of the protection target at the time of detection, and whether to make a request to rescue is determined based on the protection level. More specifically, server 200 determines, by action determination unit 214 in
The protection level is determined based on at least one of the location where the protection target was detected, the time when the protection target was detected, the weather when the protection target was detected, and the condition of the protection target, for example. More specifically, as to the location where the protection target was detected, the protection level is determined based on the distance from a location of heavy traffic, or from a location where accidents are more likely to occur such as river and pond. As to the time when the protection target was detected, the protection level is determined based on whether it was daytime, nighttime, or midnight, for example. As to the weather when the protection target was detected, the protection level is determined based on rainfall, snowfall, wind velocity, and issuance of weather warning or alert, for example. As to the behavioral patterns of the protection target, the protection level is determined based on whether the manner of walking is that of a drunken person and/or any characteristic habit of the protection target, for example. The protection level may be determined in accordance with an instruction from a protector when contact is made with the protector.
Referring to
After the protection level is determined, server 200 compares the determined protection level with a preset threshold value to determine whether it is necessary to protect (rescue) the protection target in S137. When the protection level is set to one of five levels, it is determined that rescue of the protection target is necessary when the protection level is “4” or higher, for example.
When rescue is necessary (YES in S137), the process proceeds to S140 in which a request to rescue is transmitted to rescue group 400. When rescue is not necessary (NO in S137), the process proceeds to S125 and server 200 continues the search and watching of the protection target.
Under control performed in accordance with the process as described above, it is determined whether to request the rescue group to rescue the protection target, based on the environment and/or the condition of the protection target when the protection target was detected. Accordingly, an inappropriate rescue request to the rescue group or unnecessary call-out to a person in charge can be prevented.
According to the above description of the first to third embodiments, a search is started in response to a request, from a requester, to search for a specific protection target.
Regarding a fourth embodiment, a scheme is described according to which when a running or stopping vehicle detects a possible candidate, the vehicle detecting the candidate voluntarily makes an inquiry to the server, even when a search request has not been given from a requester.
Referring to
Receiving the detection information from vehicle 100 (S125), server 200 acquires from storage unit 220 information about a registered protection target (S126). In S130, server 200 checks the detection information from vehicle 100 against the registered information from storage unit 220 to determine whether the candidate detected by vehicle 100 is the protection target who is registered in advance. When the candidate is the protection target (YES in S130), server 200 gives a notification to a protector of the protection target (S135A) and makes a rescue request to rescue group 400 as required.
Under control performed in accordance with the process as described above, a vehicle located in a predetermined area conducts patrol to find whether a protection target is present or not, even when no search request has been given from a requester. For example, even when a protector of a protection target who is registered in advance is not aware of the fact that the protection target is absent without leave, the protection target can be found in an early stage and occurrence of an accident can be prevented.
The above-described first to fourth embodiments may be combined as appropriate within the range that causes no inconsistency.
[Modifications]
According to the above description of each embodiment, a vehicle is used as movable body 100. Movable body 100, however, may represent a concept including human or animal. For example, as the camera mounted on the movable body in the above description, a mobile terminal (smart phone or the like) having the photography function or a wearable camera which is wearable on a human/animal body may also be used. If the movable body is a human, the movable body is not limited to those who are experts in search, but images taken by an ordinary person who is taking a stroll, jogging, or walking may be transmitted to server 200.
Although the present disclosure has been described and illustrated in detail, it is clearly understood that the same is by way of illustration and example only and is not to be taken by way of limitation, the scope of the present disclosure being interpreted by the terms of the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
2017-218371 | Nov 2017 | JP | national |
This is a continuation application of U.S. patent application Ser. No. 16/189,092, filed Nov. 13, 2018, which is based on Japanese Patent Application No. 2017-218371 filed on Nov. 13, 2017 with the Japan Patent Office, the entire contents of which are both hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
7336189 | Thomas | Feb 2008 | B1 |
7916066 | Osterweil | Mar 2011 | B1 |
8086351 | Gaudiano | Dec 2011 | B2 |
9471059 | Wilkins | Oct 2016 | B1 |
9481367 | Gordon et al. | Nov 2016 | B1 |
9648107 | Penilla et al. | May 2017 | B1 |
9804596 | Slavin | Oct 2017 | B1 |
9826415 | Byrne | Nov 2017 | B1 |
10155587 | Tang | Dec 2018 | B1 |
10395332 | Konrardy | Aug 2019 | B1 |
20010040506 | Boulay | Nov 2001 | A1 |
20020156646 | Kaiwa et al. | Oct 2002 | A1 |
20040233414 | Jamieson et al. | Nov 2004 | A1 |
20060066723 | Iwase et al. | Mar 2006 | A1 |
20060152592 | Chishima et al. | Jul 2006 | A1 |
20060184323 | Park | Aug 2006 | A1 |
20060187027 | Smith | Aug 2006 | A1 |
20070205937 | Thompson et al. | Sep 2007 | A1 |
20080077322 | Sumizawa | Mar 2008 | A1 |
20090204600 | Kalik et al. | Aug 2009 | A1 |
20100198514 | Miralles | Aug 2010 | A1 |
20100262367 | Riggins et al. | Oct 2010 | A1 |
20110066368 | Koyasu et al. | Mar 2011 | A1 |
20120316768 | Haran | Dec 2012 | A1 |
20130002869 | Yuasa et al. | Jan 2013 | A1 |
20130178185 | Park et al. | Jul 2013 | A1 |
20130194421 | Kita | Aug 2013 | A1 |
20130217332 | Altman et al. | Aug 2013 | A1 |
20140108377 | West | Apr 2014 | A1 |
20140111332 | Przybylko et al. | Apr 2014 | A1 |
20140133656 | Wurster et al. | May 2014 | A1 |
20140167954 | Johnson et al. | Jun 2014 | A1 |
20140263615 | Deangelo | Sep 2014 | A1 |
20140309866 | Ricci | Oct 2014 | A1 |
20140353422 | Westbrook, Sr. | Dec 2014 | A1 |
20150066248 | Arbeit et al. | Mar 2015 | A1 |
20150124099 | Evanitsky | May 2015 | A1 |
20150194034 | Shim et al. | Jul 2015 | A1 |
20150237569 | Jalali | Aug 2015 | A1 |
20150300837 | Hisano | Oct 2015 | A1 |
20160284038 | Johnson | Sep 2016 | A1 |
20160340006 | Tang | Nov 2016 | A1 |
20170034682 | Matsumasa et al. | Feb 2017 | A1 |
20170041743 | Artzt et al. | Feb 2017 | A1 |
20170088261 | Sequeira | Mar 2017 | A1 |
20170092109 | Trundle | Mar 2017 | A1 |
20170131727 | Kurdi | May 2017 | A1 |
20170191843 | Yadav | Jul 2017 | A1 |
20170202180 | Yang | Jul 2017 | A1 |
20170249846 | Ignaczak et al. | Aug 2017 | A1 |
20170256171 | Thomas | Sep 2017 | A1 |
20170301109 | Chan | Oct 2017 | A1 |
20170337791 | Gordon-Carroll | Nov 2017 | A1 |
20170364733 | Estrada | Dec 2017 | A1 |
20180039262 | Fox | Feb 2018 | A1 |
20180050800 | Boykin | Feb 2018 | A1 |
20180068546 | Fujimoto | Mar 2018 | A1 |
20180077617 | Xue | Mar 2018 | A1 |
20180082560 | Gillum | Mar 2018 | A1 |
20180096579 | Komatsu | Apr 2018 | A1 |
20180128894 | Kaio | May 2018 | A1 |
20180249127 | Sielski | Aug 2018 | A1 |
20180300964 | Lakshamanan | Oct 2018 | A1 |
20180308130 | Hafeez | Oct 2018 | A1 |
20180357247 | Siminoff et al. | Dec 2018 | A1 |
20190057252 | Ichihara | Feb 2019 | A1 |
20190086914 | Yen | Mar 2019 | A1 |
20190141948 | Sawada et al. | May 2019 | A1 |
20190147252 | Sawada et al. | May 2019 | A1 |
20190147720 | Sawada et al. | May 2019 | A1 |
Number | Date | Country |
---|---|---|
1798335 | Jul 2006 | CN |
102754436 | Oct 2012 | CN |
103426211 | Dec 2013 | CN |
103956059 | Jul 2014 | CN |
106796748 | May 2017 | CN |
107170195 | Sep 2017 | CN |
107230310 | Oct 2017 | CN |
207218924 | Apr 2018 | CN |
H09220266 | Aug 1997 | JP |
2000099971 | Apr 2000 | JP |
2003109156 | Apr 2003 | JP |
2005038299 | Feb 2005 | JP |
2005092727 | Apr 2005 | JP |
2006086591 | Mar 2006 | JP |
2009064222 | Mar 2009 | JP |
2012139182 | Jul 2012 | JP |
2013157019 | Aug 2013 | JP |
2015111906 | Jun 2015 | JP |
2016036123 | Mar 2016 | JP |
2016119625 | Jun 2016 | JP |
2016218865 | Dec 2016 | JP |
2017027107 | Feb 2017 | JP |
2017126967 | Jul 2017 | JP |
2017163511 | Sep 2017 | JP |
2019091161 | Jun 2019 | JP |
20160026437 | Mar 2016 | KR |
1020170100892 | Sep 2017 | KR |
195504 | Dec 2013 | SG |
2016132492 | Aug 2016 | WO |
2016162899 | Oct 2016 | WO |
2017119505 | Jul 2017 | WO |
2017154595 | Sep 2017 | WO |
2017159680 | Sep 2017 | WO |
Entry |
---|
Notice of Allowance, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/188,752 dated Mar. 17, 2022, 11 pages. |
Notice of Allowance, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/189,395 dated Feb. 28, 2022, 11 pages. |
Non-Final Office Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/188,635 dated Jun. 27, 2019, 13 pages. |
Non-Final Office Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/188,752 dated Jul. 29, 2019, 8 pages. |
Non-Final Office Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/189,395 dated Jul. 29, 2019, 5 pages. |
Final Office Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/188,752 dated Feb. 6, 2020, 20 pages. |
Final Office Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/189,395 dated Feb. 6, 2020, 17 pages. |
Non-Final Office Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/188,635 dated Jan. 3, 2020, 24 pages. |
Advisory Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/189,395 dated May 7, 2020, 14 pages. |
Advisory Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/188,752 dated May 7, 2020, 14 pages. |
Non-Final Office Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/188,752 dated Jul. 9, 2020, 17 pages. |
Non-Final Office Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/189,395 dated Jul. 9, 2020, 17 pages. |
Notice of Allowance, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/188,635 dated Jul. 23, 2020, 12 pages. |
Final Office Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/188,752 dated Oct. 6, 2020, 34 pages. |
Final Office Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/189,395 dated Oct. 7, 2020, 21 pages. |
Non-Final Office Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/188,752 dated Apr. 29, 2021, 18 pages. |
Non-Final Office Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/189,395 dated Apr. 29, 2021, 14 pages. |
Non-Final Office Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/189,092 dated Aug. 15, 2019, 31 pages. |
Final Office Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/189,092 dated Jun. 30, 2020, 27 pages. |
Non-Final Office Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/189,092 dated Nov. 17, 2020, 30 pages. |
Notice of Allowance, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/189,092 dated Mar. 10, 2021, 14 pages. |
Final Office Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/189,395 dated Oct. 28, 2021, 28 pages. |
Final Office Action, United States Patent and Trademark Office, issued to U.S. Appl. No. 16/188,752 dated Oct. 28, 2021, 24 pages. |
Number | Date | Country | |
---|---|---|---|
20210295669 A1 | Sep 2021 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16189092 | Nov 2018 | US |
Child | 17303953 | US |