The invention relates in general to security systems which allow operation upon the receipt of a properly coded signal. More particularly, the invention relates to a security system or to a barrier operator system, such as a garage door operator, employing a transmitter and a receiver which communicate via code streams having at least a portion thereof which changes with multiple operation of the device.
It is well known in the art to provide garage door operators or other barrier operators which include an electric motor connectable through a transmission to a door or other movable barrier which is to be opened and closed. Since many of these systems are associated with residences, as well as with garages, it is important that opening of the barrier be permitted only by one who is authorized to obtain entry to the area which the barrier protects. Some garage door operator systems have in past employed mechanical lock and key arrangements associated with electrical switches mounted on the outside of the garage. While these systems enjoy a relatively high level of security, they are very inconvenient to use for a person because it necessitates them exiting their vehicle in order to send the command to open the garage door. This also may present some danger to people when they exit the relative security of their vehicle if someone may be waiting to do injury to them.
It is also well known to provide radio-controlled garage door operators which include a garage door operator unit having a radio receiver and a motor connected to be driven from the radio receiver. The radio receiver is adapted to receive radio frequency signals or other electromagnetic signals having particular signal characteristics which, when received, cause the door to be opened. More recently, such transmitter and receiver systems have become relatively more sophisticated in that they use radio transmitters which employ coded transmissions of multiple or three-valued digits, also known as “trinary bits” or other serial coded transmission techniques. Among these systems are U.S. Pat. No. 3,906,348 to Willmott, which employs a transmitter and receiver system wherein a plurality of mechanical switches may be used to set a stored authorization code.
U.S. Pat. No. 4,529,980 to Liotine et al. discloses a transmitter and receiver combination for use in a device such as a garage door operator wherein the transmitter stores an authorization code which is to be transmitted to and received by the receiver via a radio frequency link. In order to alter or update the authorization code contained within the transmitter, the receiver is equipped with a programming signal transmitter or light emitting diode which can send a digitized optical signal back to the transmitter where it is stored. Other systems also employing encoded transmissions are U.S. Pat. Nos. 4,037,201, 4,535,333, 4,638,433, 4,750,118 and 4,988,992.
While each of these devices have provided good security for the user, it is apparent that persons wishing to commit property or person-related crimes have become more sophisticated as well. It is known in the security industry today that devices are being made available that can intercept or steal rolling code.
Transequatorial Technology, Inc. sells integrated circuit code hopping encoders identified as Keeloq Model NTQ105, NTQ115, NTQ125D and NTQ129. Some of the Keeloq code hopping encoders generate serial codes having fixed portions, i.e., which do not change with repeated actuation of the encoding portion of the chip and rolling code portions which alter with each actuation of the encoding portion of the chip. In order to avoid, however, having the problem of the encoding portion of the chip having been inadvertently enabled and causing the rolling code to be altered on successive enabling attempts thereby leading to a rolling code which is transmitted and not recognized by a receiver, the keeloq code hopping encoders provide a window forward system, that is they are operable with systems having code receivers which recognize as a valid code not a single rolling code, but a plurality of rolling codes within a certain code window or window of values which are the values which would be generated on a relatively small number of switch closures as compared to the total number of rolling codes available. The problem with such a system, however, might arise if a user was away for a period of time or had inadvertently caused codes to be transmitted excluding the number of codes normally allowed within the valid forward code window. In that case, the rolling code would not be recognized by the receiver and the user could not gain entry without taking other measures to defeat the locking system or the garage door operator system which might involve the intervention of a trained engineer or technician.
Texas Instruments also has a prior system identified as the Mark Star TRC1300 and TRC1315 remote control transmitter/receiver combination. The System involves the user of a rolling code encoder which increments or rolls potentially the entire code, that is it does not leave a fixed portion. The system also includes a forward windowing function which allows an authorized user to be able to cause the receiver to be enabled within a limited number of key pushes. Like the keeloq system, if the forward window is exceeded, the Texas Instruments system must be placed in a learn mode to cause the system to relearn the code. In order to place the system into the learn mode, the person must obtain direct access to the receiver to cause a programming control system associated with the receiver to be hand actuated causing the receiver to enter a learn mode. Once the receiver has learned the new code, the receiver will then construct a new valid forward code window within which valid rolling codes may be received. The problem, of course, with such a system is that if, for instance in a garage door operator, the only portal of entry to the garage door is through the overhead door controlled by the garage door operator, the user will not be able to obtain entry to the garage without possibly having to do some damage to the structure. This problem is sometimes referred to in the industry as a “vaulted garage.”
What is needed is an economical encoding system which provides good security by using a rolling code, but which enables a user of the system to proceed via a gradually degraded pathway in the event that the receiver detects a signal condition indicative of what might be a lack of security.
The invention relates in general to an electronic system for providing remote security for entry of actuation of a particular device. Such a system may include a transmitter and receiver set, for instance with a hand-held transmitter and a receiver associated with a vehicle such as an automobile or the like. The transmitter, upon signaling the receiver, causing the vehicle to start up or to perform other functions. The system may also be useful in a barrier operator system such as a garage door operator by allowing the garage door to be opened and closed in a relatively secure fashion while preventing persons who may be intercepting the radio frequency signals from being able to, although unauthorized, cause the vehicle to being running or to allow access to the garage.
The system includes a transmitter generally having means for developing a fixed code and a rolling or variable code. The rolling or variable code is changed with each actuation of the transmitter. The fixed code remains the same for each actuation of the transmitter. In the present system, the transmitter. In the present system, the transmitter includes means for producing a 32-bit frame comprising the fixed portion of the code and a second 32-bit frame comprising the variable portion of the code. The 32-bit rolling code is then mirrored to provide a 32-bit mirrored rolling code. The 32-bit mirrored rolling code then has its most significant bit “deleted” by setting it to zero. The transmitter then converts the 32-bit fixed code and the mirrored variable code to a three-valued or trinary bit fixed code and a three-valued or trinary bit variable code or rolling code.
To provide further security, the fixed code and the rolling codes are shuffled so that alternating trinary bits are comprised of a fixed code bit and a rolling code bit to yield a total of 40 trinary bits. The 40 trinary bits are then packaged in a first 20-trinary bit frame and a second 20-trinary bit frame which have proceeding them a single synchronization and/or identification pulse indicating the start of the frame and whether it is the first frame or the second frame. Immediately following each of the frames, the transmitter is placed into a quieting condition to maintain the average power of the transmitter over a typical 100 millisecond interval within legal limits promulgated by the United States Federal Communications Commission. The first trinary frame and the second trinary frame are used to modulate a radio frequency carrier, in this case via muplitude modulation to produce an amplitude modulated encrypted signal. In a preferred embodiment, the radio frequency signal is amplitude modulated. The amplitude modulated signal is then launched and may be received by an AM receiver. In the preferred embodiment, the AM receiver receives the amplitude modulated signal, demodulates it to produce a pair of trinary bit encoded frames. The trinary bits in each of the frames are converted on the fly to 2-bit or half nibbles indicative of the values of the trinary bits which are ultimately used to form two 16-bit fixed code words and two 16-bit variable code words. The two 16-bit fixed code words are used as a pointer to identify the location of a previously stored rolling code value within the receiver. The two 16-bit rolling code words are concatenated by taking the 16-bit words having the more significant bits, multiplying it by 310 and then adding it to the second of the words to produce a 32-bit encrypted rolling code. In order to make certain that if the transmitter was inadvertently actuated a number of times, the authorized user can still start his car or gain entry to his garage. The 32-bit encrypted code is then compared via a binary substraction with the stored rolling code. If the 32-bit code is within a window or fixed count, in the present embodiment 1000, the microprocessor produces an authorization signal which is then responded to by other portions of the circuit to cause the garage door to open or close as commanded. In the event that the code is greater than the stored rolling code, plus 1000, indicative of a relatively large number of incrementations, the user is not locked out of the garage, but is allowed to provide further signals or indicia to the receiver that he is an authorized user without any significant degradation of the security. This is done by the receiver entering an alternate mode requiring two or more successive valid codes to be received, rather than just one. If the two or more successive valid codes are received, the garage door will open. However, in order to prevent a person who has previously or recently recorded a recent valid code from being able to obtain access to the garage, a trailing window, in this case starting at a count of 300 less than the present stored count and including all code values between the present stored count and 300 less is compared to the received code. If the received code is within this backward window, the response of the system simply is to take no further action, nor to provide authorization during that code cycle on the assumption that the code has been purloined.
Thus, the present system provides important advantages over the previous garage door operator systems and even previous rolling code systems. The system provides a multiple segmented windowed system which provides a valid code window, a second relatively insecure code window in which two successive valid codes must be received and finally a window in which no valid codes are recognized due to the likelihood of the receiver having been stolen.
It is a principal object of the present invention to provide a security system involving a radio frequency transmitter and receiver wherein multiple security conditions may exist requiring different levels of signal security.
It is another object of the present invention to provide a secure radio transmitter receiver system which may rapidly and easily decode a relatively large code combination.
Other advantages of the invention will become obvious to one of ordinary skill in the art upon a perusal of the following specification and claims in light of the accompanying drawings.
Referring now to the drawings and especially to
An optical emitter 42 is connected via a power and signal line 44 to the head unit. An optical detector 46 is connected via a wire 48 to the head unit 12.
Referring now to
The microcontroller is coupled via the serial bus 79 to a chip select port, a clock port and a DI port to which and from which serial data may be written and read and to which addresses may be applied. As will be seen hereinafter in the operation of the microcontroller, the microcontroller 78 produces output signals at the lead 81, which are supplied to a resistor 125 which is coupled to a voltage dividing resistor 126 feeding signals to the lead 127. A 30-nanohenry inductor 128 is coupled to an NPN transistor 129 at its base 130. The transistor 129 has a collector 131 and an emitter 132. The collector 131 is connected to the antenna 83 which, in this case, comprises a printed circuit board, loop antenna having an inductance of 25-nanohenries, comprising a portion of the tank circuit with a capacitor 133, a variable capacitor 134 for tuning, a capacitor 135 and a capacitor 136. An 30-nanohenry inductor 138 is coupled via a capacitor 139 to ground. The capacitor has a resistor 140 connected in parallel with it to ground. When the output from lead 81 is driven high by the microcontroller, the capacitor Q1 is switched on causing the tank circuit to output a signal on the antenna 83. When the capacitor is switched off, the output to the drive the tank circuit is extinguished causing the radio frequency signal at the antenna 83 also to be extinguished.
Referring now to
Referring now to
The microcontroller 214 may have its mode of operation controlled by a programming or learning switch 300 coupled via a line 302 to the P25 pin. A command switch 304 is coupled via a jumper 306 to a line 308 and ultimately through a resistor to the input pin P22. A pin P21 sinks current through a resistor 314 connected to a light emitting diode 316, causing the diode to light to indicate that the receiver is active. The microcontroller 214 has a 4 MHz crystal 328 connected to it to provide clock signals and includes an RS232 output port 332 that is coupled to the pin P31. A switch 340 selects whether constant pressure or monostable is to be selected as the output from output terminals P24 and P23 which are coupled to a transistor 350 which, when switched on, sinks current through a coil 352 of a relay 354, causing the relay to close to provide an actuating signal on a pair of leads 356 and 358 to an electric motor.
It may be appreciated that the power supply 204 may receive power from an external transformer or other AC source through a jack 370 which is connected to a pair of RJ uncoupling capacitors 372 and 374. The input signal is then set to a full-wave rectifier bridge 376 which provides an output current at a resistor 378. An 18-volt Zener diode 380 is connected between ground and the resistor 378 and includes high frequency bypass capacitor 382 connected in parallel with it. An 8.2-volt Zener diode 384 is connected in back-biased configuration to the resistor 378 to receive a signal therefrom to guarantee that at least an 8.2-volt signal is fed to a resistor 390 causing an LED 293 to be illuminated and also causing power to be supplied to a 5-volt 78LO5 voltage regulator 396. The voltage regulator 396 supplies regulated voltage to an output line 398. Filtering capacitors 400a, 400b, 400c and 400d limit the fluctuations at the power supply.
The program code listing for the transmitter is set forth at pages A-1 through A-19 and for the receiver at pages A-20 through A-51 of the attached appendix. Referring now to
In a step 510, the next highest power of 3 is subtracted from the rolling code and a test is made in a step 512 to determine if the result is greater than zero. If it is, the next most significant digit of the binary rolling code is incremented in a step 514, following which flow is returned to the step 510. If the result is not greater than 0, the next highest power of 3 is added to the rolling code in the step 516. In the step 518, another highest power of 3 is incremented and in a step 518, another highest power of 3 is incremented and in a step 520, a test is determined as to whether the rolling code is completed. If it is not, control is transferred back to step 510. If it has, control is transferred to step 522 to clear the bit counter. In a step 524, the blank time is tested to determine whether it is active or not. If it is not, a test is made in a step 526 to determine whether the blank time has expired. If the blank time has not expired, control is transferred to a step 528 in which the bit counter is incremented, following which control is transferred back to the decision step 524. If the blank time has expired as measured in decision step 526, the blank time is stopped in a step 530 and the bit counter is incremented in a step 532. The bit counter is then tested for odd or even in a step 534. If the bit counter is not even, control is transferred to a step 536 where the output bit of the bit counter divided by 2 is fixed. If the bit counter is even, the output bit counter divided by 2 is rolling in a step 538. The bit counter is tested to determine whether it is set to equal to 80 in a step 540. If it is, the blank timer is started in a step 542. If it is not, the bit counter is tested for whether it is equal to 40 in a step 546. If it is, the blank timer is tested and is started in a step 544. If the bit counter is not equal to 40, control is transferred back to step 522.
Referring now to
In the event that the inactive time is between 20 milliseconds and 55 milliseconds, a test is made in a step 720 to determine whether the active time is greater than 1 millisecond, as shown in
In the event that the bit counter test in step 712 indicates that the bit counter is not 0, control is transferred to setup 736, as shown in
If the result of the step 744 is in the negative, the bit value is set equal to 1 in step 748. Control is then transferred to the step 743 to test whether the bit counter is set to an odd or an even number. If it is set to an odd number, control is transferred to a step 750 where the fixed code, indicative of the fact that the bit is an odd numbered bit in the frame sequence, rather an even number bit, which would imply that it is one of the interleaved rolling code bits, is multiplied by three and then the bit value added in.
If the bit counter indicates that it is an odd number trinary bit being processed, the existing rolling code registers are multiplied by three and then the trinary bit value obtained from steps 742, 746 and 748 is added in. Whether step 750 or 752 occurs, the bit counter value is then tested in the step 754, as shown in
While there has been illustrated and described a particular embodiment of the present invention, it will be appreciated that numerous changes and modifications will occur to those skilled in the art, and it is intended in the appended claims to cover all those changes and modifications which fall within the true spirit and scope of the present invention.
This is a continuation application of patent application Ser. No. 11/313,331 filed Dec. 21, 2005 now U.S. Pat. No. 7,623,663; which is a continuation of Ser. No. 10/884,051 filed Jul. 2, 2004 now U.S. Pat. No. 7,492,898; which is a continuation of application Ser. No. 10/215,900, filed Aug. 9, 2002, U.S. Pat. No. 6,810,123; which is a continuation of Ser. No. 09/981,433, filed Oct. 17, 2001, U.S. Pat. No. 6,980,655; which is a continuation of Ser. No. 09/489,073, filed Jan. 21, 2000, U.S. Pat. No. 6,690,796; which is a Division of 08/873,149, filed Jun. 11, 1997, U.S. Pat. No. 6,154,544; which is a continuation of Ser. No. 08/446,886, filed May 17, 1995 now abandoned.
Number | Name | Date | Kind |
---|---|---|---|
2405500 | Guanella | Aug 1946 | A |
3716865 | Willmott | Feb 1973 | A |
3735106 | Hollaway | May 1973 | A |
3792446 | McFiggins et al. | Feb 1974 | A |
3798359 | Feistel | Mar 1974 | A |
3798360 | Feistel | Mar 1974 | A |
3798544 | Norman | Mar 1974 | A |
3798605 | Feistel | Mar 1974 | A |
3845277 | Voss et al. | Oct 1974 | A |
3890601 | Pietrolewicz | Jun 1975 | A |
3906348 | Willmott | Sep 1975 | A |
3938091 | Atalla et al. | Feb 1976 | A |
4037201 | Willmott | Jul 1977 | A |
4064404 | Willmott et al. | Dec 1977 | A |
RE29525 | Willmott | Jan 1978 | E |
4078152 | Tuckerman, III | Mar 1978 | A |
4138735 | Allocca et al. | Feb 1979 | A |
4178549 | Ledenbach et al. | Dec 1979 | A |
4195196 | Feistel | Mar 1980 | A |
4195200 | Feistel | Mar 1980 | A |
4196310 | Forman et al. | Apr 1980 | A |
4218738 | Matyas et al. | Aug 1980 | A |
4304962 | Fracassi et al. | Dec 1981 | A |
4305060 | Apple et al. | Dec 1981 | A |
4316055 | Feistel | Feb 1982 | A |
4326098 | Bouricius et al. | Apr 1982 | A |
4327444 | Court | Apr 1982 | A |
4328414 | Atalla | May 1982 | A |
4328540 | Matsuoka et al. | May 1982 | A |
RE30957 | Feistel | Jun 1982 | E |
4380762 | Capasso | Apr 1983 | A |
4385296 | Tsubaki et al. | May 1983 | A |
4393269 | Konheim et al. | Jul 1983 | A |
4418333 | Schwarzbach et al. | Nov 1983 | A |
4426637 | Apple et al. | Jan 1984 | A |
4445712 | Smagala-Romanoff | May 1984 | A |
4447890 | Duwel et al. | May 1984 | A |
4454509 | Buennagel et al. | Jun 1984 | A |
4464651 | Duhame | Aug 1984 | A |
4471493 | Schober | Sep 1984 | A |
4491774 | Schmitz | Jan 1985 | A |
4509093 | Stellberger | Apr 1985 | A |
4529980 | Liotine et al. | Jul 1985 | A |
4535333 | Twardowski | Aug 1985 | A |
4574247 | Jacob | Mar 1986 | A |
4578530 | Zeider | Mar 1986 | A |
4580111 | Swanson | Apr 1986 | A |
4581606 | Mallory | Apr 1986 | A |
4590470 | Koenig | May 1986 | A |
4593155 | Hawkins | Jun 1986 | A |
4596898 | Pemmaraju | Jun 1986 | A |
4596985 | Bongard et al. | Jun 1986 | A |
4599489 | Cargile | Jul 1986 | A |
4602357 | Yang et al. | Jul 1986 | A |
4611198 | Levinson et al. | Sep 1986 | A |
4623887 | Welles, II | Nov 1986 | A |
4626848 | Ehlers | Dec 1986 | A |
4628315 | Douglas | Dec 1986 | A |
4630035 | Stahl et al. | Dec 1986 | A |
4633247 | Hegeler | Dec 1986 | A |
4638433 | Schindler | Jan 1987 | A |
4646080 | Genest et al. | Feb 1987 | A |
4652860 | Weishaupt et al. | Mar 1987 | A |
4653076 | Jerim et al. | Mar 1987 | A |
4670746 | Taniguchi et al. | Jun 1987 | A |
4686529 | Kleefeldt | Aug 1987 | A |
4695839 | Barbu et al. | Sep 1987 | A |
4703359 | Rumbolt et al. | Oct 1987 | A |
4710613 | Shigenaga | Dec 1987 | A |
4716301 | Willmott et al. | Dec 1987 | A |
4720860 | Weiss | Jan 1988 | A |
4723121 | Van den Boom et al. | Feb 1988 | A |
4731575 | Sloan | Mar 1988 | A |
4737770 | Brunius et al. | Apr 1988 | A |
4740792 | Sagey et al. | Apr 1988 | A |
4750118 | Heitschel et al. | Jun 1988 | A |
4754255 | Sanders et al. | Jun 1988 | A |
4755792 | Pezzolo et al. | Jul 1988 | A |
4758835 | Rathmann et al. | Jul 1988 | A |
4761808 | Howard | Aug 1988 | A |
4779090 | Micznik et al. | Oct 1988 | A |
4794268 | Nakano et al. | Dec 1988 | A |
4794622 | Isaacman et al. | Dec 1988 | A |
4796181 | Wiedemer | Jan 1989 | A |
4799061 | Abraham et al. | Jan 1989 | A |
4800590 | Vaughan | Jan 1989 | A |
4802114 | Sogame | Jan 1989 | A |
4804938 | Rouse et al. | Feb 1989 | A |
4807052 | Amano | Feb 1989 | A |
4808995 | Clark et al. | Feb 1989 | A |
4825200 | Evans et al. | Apr 1989 | A |
4825210 | Bachhuber et al. | Apr 1989 | A |
4831509 | Jones et al. | May 1989 | A |
4835407 | Kataoka et al. | May 1989 | A |
4845491 | Fascenda et al. | Jul 1989 | A |
4847614 | Keller | Jul 1989 | A |
4855713 | Brunius | Aug 1989 | A |
4856081 | Smith | Aug 1989 | A |
4859990 | Isaacman | Aug 1989 | A |
4870400 | Downs et al. | Sep 1989 | A |
4878052 | Schulze | Oct 1989 | A |
4881148 | Lambropoulos et al. | Nov 1989 | A |
4885778 | Weiss | Dec 1989 | A |
4888575 | DeVaulx | Dec 1989 | A |
4890108 | Drori et al. | Dec 1989 | A |
4905279 | Nishio | Feb 1990 | A |
4910750 | Fisher | Mar 1990 | A |
4912463 | Li | Mar 1990 | A |
4914696 | Dudczak et al. | Apr 1990 | A |
4918690 | Markkula, Jr. et al. | Apr 1990 | A |
4922168 | Waggamon et al. | May 1990 | A |
4922533 | Philippe | May 1990 | A |
4928098 | Dannhaeuser | May 1990 | A |
4931789 | Pinnow | Jun 1990 | A |
4939792 | Urbish et al. | Jul 1990 | A |
4942393 | Waraksa et al. | Jul 1990 | A |
4951029 | Severson | Aug 1990 | A |
4963876 | Sanders et al. | Oct 1990 | A |
4979832 | Ritter | Dec 1990 | A |
4980913 | Skret | Dec 1990 | A |
4988992 | Heitschel et al. | Jan 1991 | A |
4992783 | Zdunek et al. | Feb 1991 | A |
4999622 | Amano et al. | Mar 1991 | A |
5001332 | Schrenk | Mar 1991 | A |
5023908 | Wiess | Jun 1991 | A |
5049867 | Stouffer | Sep 1991 | A |
5055701 | Takeuchi | Oct 1991 | A |
5058161 | Weiss | Oct 1991 | A |
5060263 | Bosen et al. | Oct 1991 | A |
5103221 | Memmola | Apr 1992 | A |
5107258 | Soum | Apr 1992 | A |
5126959 | Kurihara | Jun 1992 | A |
5144667 | Pogue, Jr. et al. | Sep 1992 | A |
5146067 | Sloan et al. | Sep 1992 | A |
5148159 | Clark et al. | Sep 1992 | A |
5153581 | Hazard | Oct 1992 | A |
5159329 | Lindmayer et al. | Oct 1992 | A |
5168520 | Weiss | Dec 1992 | A |
5193210 | Nicholas et al. | Mar 1993 | A |
5224163 | Gasser et al. | Jun 1993 | A |
5237614 | Weiss | Aug 1993 | A |
5252960 | Duhame | Oct 1993 | A |
5278907 | Snyder et al. | Jan 1994 | A |
5280527 | Gullman et al. | Jan 1994 | A |
5331325 | Miller | Jul 1994 | A |
5361062 | Weiss et al. | Nov 1994 | A |
5363448 | Koopman, Jr. et al. | Nov 1994 | A |
5365225 | Bachhuber | Nov 1994 | A |
5367572 | Weiss | Nov 1994 | A |
5369706 | Latka | Nov 1994 | A |
5412379 | Waraksa et al. | May 1995 | A |
5414418 | Andros, Jr. | May 1995 | A |
5420925 | Michaels | May 1995 | A |
5442341 | Lambropoulos | Aug 1995 | A |
5444737 | Cripps et al. | Aug 1995 | A |
5463376 | Stoffer | Oct 1995 | A |
5471668 | Soenen et al. | Nov 1995 | A |
5473318 | Martel | Dec 1995 | A |
5479512 | Weiss | Dec 1995 | A |
5485519 | Weiss | Jan 1996 | A |
5517187 | Bruwer et al. | May 1996 | A |
5528621 | Heiman et al. | Jun 1996 | A |
5530697 | Watanabe | Jun 1996 | A |
5554977 | Jablonski et al. | Sep 1996 | A |
RE35364 | Heitschel et al. | Oct 1996 | E |
5563600 | Miyake | Oct 1996 | A |
5594429 | Nakahara | Jan 1997 | A |
5598475 | Soenen et al. | Jan 1997 | A |
5608723 | Felsenstein | Mar 1997 | A |
5657388 | Weiss | Aug 1997 | A |
5678213 | Myer | Oct 1997 | A |
5680131 | Utz | Oct 1997 | A |
5686904 | Bruwer | Nov 1997 | A |
5745068 | Takahashi et al. | Apr 1998 | A |
5774065 | Mabuchi et al. | Jun 1998 | A |
5778348 | Manduley et al. | Jul 1998 | A |
5872519 | Issa et al. | Feb 1999 | A |
5898397 | Murray | Apr 1999 | A |
5936999 | Keskitalo | Aug 1999 | A |
5937065 | Simon et al. | Aug 1999 | A |
6154544 | Farris et al. | Nov 2000 | A |
6166650 | Bruwer | Dec 2000 | A |
6175312 | Bruwer et al. | Jan 2001 | B1 |
6275519 | Hendrickson | Aug 2001 | B1 |
6463538 | Elteto | Oct 2002 | B1 |
6690796 | Farris et al. | Feb 2004 | B1 |
6810123 | Farris et al. | Oct 2004 | B2 |
6980655 | Farris et al. | Dec 2005 | B2 |
7332999 | Fitzgibbon | Feb 2008 | B2 |
7412056 | Farris et al. | Aug 2008 | B2 |
7492905 | Fitzgibbon | Feb 2009 | B2 |
20060109978 | Farris et al. | May 2006 | A1 |
Number | Date | Country |
---|---|---|
32 34 538 | Mar 1984 | DE |
32 34 539 | Mar 1984 | DE |
32 44049 | Sep 1984 | DE |
33 09 802 | Sep 1984 | DE |
3320721 | Dec 1984 | DE |
3407 436 | Aug 1985 | DE |
3407 469 | Sep 1985 | DE |
35 32 156 | Mar 1987 | DE |
36 36 822 | Oct 1987 | DE |
42 04 463 | Aug 1992 | DE |
0 043 270 | Jan 1982 | EP |
0 103 790 | Mar 1984 | EP |
0 154 019 | Sep 1985 | EP |
0 155 378 | Sep 1985 | EP |
0 244 322 | Nov 1987 | EP |
0 244 332 | Nov 1987 | EP |
0 335 912 | Jun 1988 | EP |
0 311 112 | Apr 1989 | EP |
0 372 285 | Jun 1990 | EP |
0 459 781 | Dec 1991 | EP |
0 857 842 | Aug 1998 | EP |
2 607 544 | Mar 1988 | FR |
2 606 232 | Jun 1988 | FR |
2 685 520 | Jun 1993 | FR |
1156279 | Jun 1969 | GB |
2 023 899 | Jan 1980 | GB |
2 051 442 | Apr 1981 | GB |
2 099 195 | Dec 1982 | GB |
2 118 614 | Nov 1983 | GB |
2 131 992 | Jun 1984 | GB |
2 133 073 | Jul 1984 | GB |
2 184 774 | Jul 1987 | GB |
2254461 | Oct 1992 | GB |
2 265 482 | Sep 1993 | GB |
H6-205474 | Jul 1994 | JP |
PCTAU9300137 | Oct 1993 | WO |
WO9320538 | Oct 1993 | WO |
PCTFR9301140 | May 1994 | WO |
WO9411829 | May 1994 | WO |
PCTDE9400147 | Aug 1994 | WO |
WO9418036 | Aug 1994 | WO |
Number | Date | Country | |
---|---|---|---|
20080297370 A1 | Dec 2008 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 08873149 | Jun 1997 | US |
Child | 09489073 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11313331 | Dec 2005 | US |
Child | 12177366 | US | |
Parent | 10884051 | Jul 2004 | US |
Child | 11313331 | US | |
Parent | 10215900 | Aug 2002 | US |
Child | 10884051 | US | |
Parent | 09981433 | Oct 2001 | US |
Child | 10215900 | US | |
Parent | 09489073 | Jan 2000 | US |
Child | 09981433 | US | |
Parent | 08446886 | May 1995 | US |
Child | 08873149 | US |