A portion of the disclosure of this patent document contains material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyright rights whatsoever. The following notice applies to the software and data as described below and in the drawings that form a part of this document: Copyright ©2019-2020 Wheels Inc. All Rights Reserved.
Personal Mobility Vehicle” filed on Oct. 3, 2019 (Attorney Docket No. 5148.013PRV), which is hereby incorporated by reference herein in its entirety.
The shared vehicle ecosystem has moved from a nascent set of startup companies to a vibrant industry with a number of companies in a large number of markets, each company specializing in short distance rentals of bicycles and powered scooters. The industry has also experienced growing pains in the areas of safety. There have been a number of highly publicized accidents, injuries and deaths of subscribers to these services. Several safety measures have been fielded including rental of safety devices (e.g. traditional bicycle helmets rented or various disposable helmet types). In each case, these half measures have left much to be desired in the areas of helmet sanitation, item loss/theft and validation that the safety device is being used and were ultimately unsuccessful commercially. Additionally, there has been no methodology attached to the shared ride systems deployed that will actively create a safer ride for the rider. In all previous cases, the safety device is not in communication with the shared vehicle, not integrated to the deployment or recovery of the safety device before and after the shared vehicle rental. Additionally, each shared vehicle is not in active communication with the shared ride provisioning system to monitor rides and riders for safety related behaviors. Additionally, all of the previous safety devices also rely heavily on a direct human involvement (helmet rental/recovery by a human) (sanitation and restocking by a human) and there was virtually no ability to prevent a rider from ignoring the use of a safety device.
The present inventors have recognized, among other things, that a problem to be solved can include minimizing the labor involved in deploying safety devices with a shared ride system. Another aspect of the problem solved is the integration of safety system, sensors and user safety devices into the actual design of the personal mobility vehicle. Another aspect of the problem solved is the ongoing upkeep and maintenance of personal mobility vehicles (shared vehicles) by web enabled servicing of the invention. A third aspect of the problem solved is the integration of service items with the integral safety sensors and interconnects in the described solution. A fourth aspect of the problem solved is the closed loop monitoring of safety protocols from sensors in the personal mobility vehicle components, the safety equipment worn by the user, mobile devices of the user, and the vehicle management/servicing protocols.
The present subject matter provides a solution to these problems, such as by using integrally designed safety devices associated or integrated with a personal mobility vehicle that a) are deployed within the shared vehicle, b) are communicatively coupled to the vehicle, c) coupled to the system as a whole, which is in constant communication between the vehicle, the shared vehicle management system, and the various safety devices, thereby integrating safety and serviceability in the design of the shared vehicle. that interacts with the user who is using the various safety checks during a ride, d) the retrieval of any deployed user safety devices, and e) the verified sanitation of any deployed user safety devices, and f) the reset of any user safety device to be ready for the next user. By accomplishing these integrations, the present solution comprises a number of aspects where the solution can jointly validate a user to use the personal mobility vehicle, deploy the personal mobility vehicle, manage the deployment of a wearable user safety devices at the time of rental, validate the use of the helmet, monitor the use of a helmet by a shared vehicle renter during the rental, monitor the personal mobility vehicle during the rental, and the retrieval and sanitization of the helmet without the intervention of a servicing personnel allowing the immediate redeployment of the shared vehicle with the same wearable safety device, as well as detecting whether a user is safely using the shared vehicle. The present solution can additionally monitor the safety state of a user during a ride by use of additional sensors on the personal mobility vehicle.
Each of these non-limiting examples can stand on its own or can be combined in various permutations or combinations with one or more of the other examples.
This overview is intended to provide an overview of subject matter of the present patent application. It is not intended to provide an exclusive or exhaustive explanation of the invention. The detailed description is included to provide further information about the present patent application.
To easily identify the discussion of any particular element or act, the most significant digit or digits in a reference number refer to the figure number in which that element is first introduced.
In the drawings, which are not necessarily drawn to scale, like numerals may describe similar components in different views. Like numerals having different letter suffixes may represent different instances of similar components. The drawings illustrate generally, by way of example, but not by way of limitation, various embodiments discussed in the present document.
The example used in this description is intended as a median example of the solution proposed, rather than an exhaustive example of every permutation of this proposed solution. It can be appreciated that the recombination of the various aspects of this solution may result in many permutations.
One or more SIPV system application servers 104 provide server-side functionality via a network 102 to a networked user device, in the form of a user client device 106 that is accessed by a SIPV user 128. A web client 110 (e.g., a browser) and a programmatic client 108 (e.g., an “app”) are hosted and execute on the web client 110 to allow the SIPV user 128 to purchase a SIPV 700 ride.
An Application Program Interface (API) server 118 and a web server 120 provide respective programmatic and web interfaces to SIPV system application servers 104. A specific application server 116 hosts a SIPV System Code 122, which includes components, modules and/or applications as discussed earlier.
The web client 110 communicates with the SIPV System Code 122 via the web interface supported by the web server 120. Similarly, the programmatic client 108 communicates with the SIPV System Code 122 via the programmatic interface provided by the Application Program Interface (API) server 118. The third-party application 114 may, for example, be a Google Maps, Paypal or other commonly used apps to assist the SIPV user 128 in their purchase.
The application server 116 is shown to be communicatively coupled to database servers 124 that facilitates access to an information storage repository or databases 126. In an example embodiment, the databases 126 includes storage devices that store information to be published and/or processed by the SIPV System Code 122. (e.g. Rider data, prior use history and other data that assists the execution of the SIPV 700 experience.
Additionally, a third-party application 114 executing on a third-party server 112, is shown as having programmatic access to the application server 116 via the programmatic interface provided by the Application Program Interface (API) server 118. For example, the third-party application 114, using information retrieved from the application server 116, may support one or more features or functions on a website hosted by the third party. (e.g., SIPV user 128 present location, credit check, credit card transactions)
Turning now to
The Main Processor 202 is shown to be coupled to a power source 204, and to include (either permanently configured or temporarily instantiated) modules, namely a Safety component 210, a Monitoring component 212, and an Operations component 214. The Safety component 210 operationally generates all safety related interconnections between the SIPV 700 and its SIPV sensors 508, the Monitoring component 212 operationally generates all other monitoring tasks including monitoring commands or requests from the SIPV system 500 or requests from the present user devices, and the Operations component 214 operationally generates all basic functions and operations of the SIPV not related to maintaining safety or monitoring tasks, this comprises additional tasks like maintenance, system or sensor availability as well as alerting to the other processors as the Operations component 214 detects a new or projected servicing condition. As illustrated, the Main Processor 202 is communicatively coupled to both the Communication Processor 206 and Power Processor 208, and receives all external SIPV 700 communications/requests from the Communication Processor 206, as well as power status, power source status and charge condition from the Power Processor 208.
The operating system 312 manages hardware resources and provides common services. The operating system 312 includes, for example, a kernel 314, services 316, and drivers 322. The kernel 314 acts as an abstraction layer between the hardware and the other software layers. For example, the kernel 314 provides memory management, Processor management (e.g., task scheduling), component management, networking, and security settings, among other functionality. The services 316 can provide other common services for the other software layers. The drivers 322 are responsible for controlling or interfacing with the underlying hardware. For instance, the drivers 322 can include display drivers, camera drivers, BLUETOOTH® or BLUETOOTH® Low Energy drivers, flash memory drivers, serial communication drivers (e.g., Universal Serial Bus (USB) drivers), WI-FI® drivers, audio drivers, power management drivers, and so forth.
The libraries 310 provide a low-level common infrastructure used by the SIPV applications 306. The libraries 310 can include system libraries 318 (e.g., C standard library) that provide functions such as memory allocation functions, string manipulation functions, mathematic functions, and the like. In addition, the libraries 310 can include API libraries 324 such as media libraries (e.g., libraries to support presentation and manipulation of various media formats such as Moving Picture Experts Group-4 (MPEG4), Advanced Video Coding (H.264 or AVC), Moving Picture Experts Group Layer-3 (MP3), Advanced Audio Coding (AAC), Adaptive Multi-Rate (AMR) audio codec, Joint Photographic Experts Group (JPEG or JPG), or Portable Network Graphics (PNG)), graphics libraries (e.g., an OpenGL framework used to render in two dimensions (2D) and three dimensions (3D) in a graphic content on a display), database libraries (e.g., SQLite to provide various relational database functions), web libraries (e.g., WebKit to provide web browsing functionality), and the like. The libraries 310 can also include a wide variety of other libraries 328 to provide many other APIs to the SIPV applications 306.
The frameworks 308 provide a high-level common infrastructure that is used by the SIPV applications 306. For example, the frameworks 308 provide various graphical user interface (GUI) functions to the display, high-level resource management, and high-level location services. The frameworks 308 can provide a broad spectrum of other APIs that can be used by the SIPV applications 306, some of which may be specific to a particular operating system or platform.
In an example embodiment, the SIPV applications 306 used or integrated by the SIPV system 500 may include a rental application 336, a related services application 330 (accessing other services related to the SIPV 700 rental, a browser application 332, a user proximity application 334 an alerting function to suggest nearby points of interest, road hazards, or other alters proximate to the user's location, a GPS application 342, a media application 344, a SIPV messaging application 346, a camera application 348, and a broad assortment of other applications such as a third-party application 340 that would also service a related aspect of the present solution. The SIPV applications 306 are programs that execute functions defined in the programs and as listed throughout this description. Various programming languages can be employed to create one or more of the SIPV applications 306, structured in a variety of manners, such as object-oriented programming languages (e.g., Objective-C, Java, or C++) or procedural programming languages (e.g., C or assembly language). In a specific example, the third-party application 340 (e.g., an application developed using the ANDROID™ or IOS™ software development kit (SDK) by an entity other than the vendor of the particular platform) may be mobile software running on a mobile operating system such as IOS™, ANDROID™, WINDOWS® Phone, or another mobile operating system. In this example, the third-party application 340 can invoke the API calls 350 provided by the operating system 312 to facilitate functionality described herein.
The SIPV computing machine 400 may include Processor 408, memory 406, and SIPV I/O components 402, which may be configured to communicate with each other via a bus 440. In an example embodiment, the Processor 408 (e.g., a Central Processing Unit (CPU), a Reduced Instruction Set Computing (RISC) Processor, a Complex Instruction Set Computing (CISC) Processor, a Graphics Processing Unit (GPU), a Digital Signal Processor (DSP), an ASIC, a Radio-Frequency Integrated Circuit (RFIC), another Processor, or any suitable combination thereof) may include, for example, a Processor 412 and a Processor 408) that execute the instructions 410. The term “Processor” is intended to include multi-core processors that may comprise two or more independent processors (sometimes referred to as “cores”) that may execute instructions contemporaneously. Although
The memory 406 includes a main memory 414, a static memory 416, and a storage unit 418, all accessible to the Processor 408 via the bus 440. The main memory 414, the static memory 416, and storage unit 418 store the instructions 410 embodying any one or more of the methodologies or functions described herein. The instructions 410 may also reside, completely or partially, within the main memory 414, within the static memory 416, within machine-readable medium 420 within the storage unit 418, within at least one of the processors 404 (e.g., within the Processor's cache memory), or any suitable combination thereof, during execution thereof by the SIPV computing machine 400.
The SIPV I/O components 402 may include a wide variety of components to receive input, provide output, produce output, transmit information, exchange information, capture measurements, and so on. The specific SIPV I/O components 402 that are included in a particular machine will depend on the type of machine. For example, portable machines such as mobile phones may include a touch input device or other such input mechanisms, while a headless server machine will likely not include such a touch input device. It will be appreciated that the SIPV I/O components 402 may include many other components that are not shown in
In further example embodiments, the SIPV I/O components 402 may include user biometric components 430, 3D motion components 432, sensed environmental components 434, or navigation position components 436, among a wide array of other components. For example, the biometric components 430 include components to detect expressions (e.g., hand expressions, facial expressions, vocal expressions, body gestures, or eye-tracking), measure biosignals (e.g., blood pressure, heart rate, body temperature, perspiration, or brain waves), identify a person (e.g., voice identification, retinal identification, facial identification, fingerprint identification, or electroencephalogram-based identification), and the like. The 3D motion components 432 include acceleration sensor components (e.g., accelerometer), gravitation sensor components, rotation sensor components (e.g., gyroscope). The sensed environmental components 434 include, for example, one or cameras, illumination sensor components (e.g., photometer), temperature sensor components (e.g., one or more thermo-sensors that detect ambient temperature), humidity sensor components, pressure sensor components (e.g., barometer), acoustic sensor components (e.g., one or more microphones that detect background noise), proximity sensor components (e.g., infrared sensors that detect nearby objects), gas sensors (e.g., gas detection sensors to detection concentrations of hazardous gases for safety or to measure pollutants in the atmosphere), or other components that may provide indications, measurements, or signals corresponding to a surrounding physical environment. The navigation position components 436 include location sensor components (e.g., a GPS receiver Component), altitude sensor components (e.g., altimeters or barometers that detect air pressure from which altitude may be derived), orientation sensor components (e.g., magnetometers), and the like.
Communication may be implemented using a wide variety of technologies. The SIPV I/O components 402 further include communication components 438 operable to couple the SIPV computing machine 400 to a network 422 or devices 424 via respective coupling or connections. For example, the communication components 438 may include a network interface Component or another suitable device to interface with the network 1422. In further examples, the communication components 438 may include wired communication components, wireless communication components, cellular communication components, Near Field Communication (NFC) components, Bluetooth® components (e.g., Bluetooth® Low Energy), WiFi® components, and other communication components to provide communication via other modalities. The devices 424 may be another machine or any of a wide variety of peripheral devices (e.g., a peripheral device coupled via a USB).
Moreover, the communication components 438 may detect identifiers or include components operable to detect identifiers. For example, the communication components 438 may include Radio Frequency Identification (RFID) tag reader components, NFC smart tag detection components, optical reader components (e.g., an optical sensor to detect one-dimensional bar codes such as Universal Product Code (UPC) bar code, multi-dimensional bar codes such as Quick Response (QR) code, Aztec code, Data Matrix, Dataglyph, MaxiCode, PDF417, Ultra Code, UCC RSS-2D bar code, and other optical codes), or acoustic detection components (e.g., microphones to identify tagged audio signals). In addition, a variety of information may be derived via the communication components 438, such as location via Internet Protocol (IP) geolocation, location via Wi-Fi® signal triangulation, location via detecting an NFC beacon signal that may indicate a particular location, and so forth.
The various memories (e.g., main memory 414, static memory 416, and/or memory of the Processor 408) and/or storage unit 418 may store one or more sets of instructions and data structures (e.g., software) embodying or used by any one or more of the methodologies or functions described herein. These instructions (e.g., the instructions 410, when executed by processors 404, cause various operations to implement the disclosed embodiments.
The instructions 410 may be transmitted or received over the network 422, using a transmission medium, via a network interface device (e.g., a network interface Component included in the communication components 438) and using any one of several well-known transfer protocols (e.g., hypertext transfer protocol (HTTP)). Similarly, the instructions 410 may be transmitted or received using a transmission medium via a coupling (e.g., a peer-to-peer coupling) to the devices 424.
SIPV system 500 as functionally presented can also be characterized as apart of a network of SIPVs 100s interconnected via several network types comprising cloud, cellular, wireless, mesh or CAN bus network either using Virtual Machines or other Processor hardware to create a system grouping. Several network types of controllers maybe used in this solution comprising individual or hybridized networks as described earlier One variant of the present solution further comprises a Meshed SIPV Network 600 bus as shown in
A mesh network (or simply mesh-net) as shown in
The safety enabled personal mobility vehicle or safety integrated electrically powered vehicle SIPV 700 shown in
The frame can vary depending on the implementation, and can be fabricated using a number of materials. In this variant of the solution in
The tire on wheel 704 can be made from a solid or puncture resistant material. The wheels are secured to the frame using standard components (e.g., nuts). In general, the SIPV 700 can be made from unique parts (e.g., nuts and screws) having sizes to help deter theft. For instance, the nuts and screws that are part of the SIPV 700 can be designed such that they can only be opened with proprietary interfaces further comprising electronic locks (e.g. BlueTooth® interfaces as described later in this description).
The wheel hub 716 house the brake 730 and/or drive apparatus 732. The internal wheel hub 716 can keep the wiring for brakes and gears enclosed and hidden. The brake 730 can include front and rear drum brakes operably connected to the set of handles 712 and the acceleration control operably attached for the drive apparatus 732 Other types of brakes such as disk, cantilever, and V-brakes may also be used.
The light 728 can further comprise at least a multiple LED lights powered by the power source mounted internally in the seat post 726. The power source 902 will be introduced later in
The seat post 726 can also be an adjustable height that allows the height of the seat 708 to be adjusted. The quick release feature of the seat post 726 is designed to allow easy height adjustments without making it possible to completely remove the post. A numbering system on the seat post 726 can help frequent users adjust the height of the seat 708 quickly to the pre-set height that the rider desires.
A significant aspect of this solution is that many of the safety features are built in and integrated at the SIPV 700 level, the SIPV system 500 level and extended to the user of the SIPV before, during and after the ride.
In
In
In
For the sake of clarity, the SIPV 700 comprises electric bicycles, electric mopeds, electric scooters and can further comprise any/all electric mobility vehicles having up to three wheels that are powered by an electric motor and primarily get their energy from the power grid—in other words: an EV that can be recharged or powered externally. This includes purely electric vehicles, vehicles that assist human power with electrical power assistance (e.g. pedaled), vehicles with a combination of electric motor and a small combustion engine (range extended electric vehicles—REEV), and hybrid vehicles that can be recharge via the power grid (plug-in hybrid electric vehicles—PHEV).
In
As shown in
As shown in
The present solution power source 902 provides for mass servicing, where the maintenance mobile device can simultaneously unlock multiple solenoid latch 1104 on multiple SIPV 700 via BLE. In the event of a power source 902 being drained and the solenoid latch 1104 is in an unpowered state, the power source 902 further comprises a power access port that enables a technician to power the solenoid latch 1104 and allow the removal of the power source 902. Additional safety considerations in the present invention's power configurations further comprise keeping the SIPV drive apparatus unpowered until a power-up procedure dictated by the onboard computer 808 is followed including use of the Safety device 738. The power source 902 further comprises a digital displayed of remaining capacity that is displayed either at the power indicator 734 or on the display. The power source 902 can be populated with a variable number of power cells/fuel cells to save weight and cost, or to comply with local regulations.
A typical SIPV rental process is outlined in
The Safe Ride Flowchart 1400 is shown in
The present solution uses Bluetooth to interact and pair a user to a particular shared ride rental and the user's mobile device. Bluetooth is a popular standard for close-range wireless communication. It provides the ability to pair two devices together and thereby exchange information with each other. An example of the authentication mechanism utilized by Bluetooth devices is described below. The pairing process, also known as the standard pairing, requires the two devices (user mobile device and the SIPV 700) establish an initial symmetric key in order to communicate securely. In this case there are two devices, a user mobile device and SIPV 700 being rented. The two devices at first handle two keys, share a PIN and know each other's 48-bit Bluetooth device address (BD_Addr). The first key is the symmetric initialization key (Kinit) to mutually authenticate each other and the second is a link key. The link key is generated during the pairing session with the help of the initialization key. The ‘Unit key’ is generated when the device is first operated with the help of the key generation algorithm. The ‘Initialization key’ is needed when two devices need to communicate with each other. It is used for exchanging link keys and for encryption as well as decryption of information during the link key generation protocol. The ‘Link key’ can be used in two different methods. The devices' unit key can be sent with encryption of the initialization key and this would constitute a link key or the device can generate a random number and then send it under the encryption of the initialization key and thereby generate a link key. The ‘Combination key’ is generated during the Initialization process at the same time and is only valid for the session only. This key is exchanged when the two devices compute their link keys. It comprises of a 128 bit random number and the Bluetooth device address. The ‘Encryption key’ is generated from the current link key during the authentication process. It is based on the COF (96 bit Ciphering Offset Number). The ‘Master key’ is generally used as the link key if the master needs to transmit to multiple slaves. It is generated using the key generation algorithm by virtue of the 128 bit random number. The resultant link key is then sent to the slave, bitwise xored with overlay. With this, slave can compute master key.
At the onset, both the devices share a low-entropy human-readable secret PIN. Typically the PIN comprises of a 4-digit code, which can be up to 128 bits When device 1 initiates the connection it is referred to as the initiating device and it does so by generating a random nonce (number used once) n1, and then sending it to device 2. Both devices then compute a shared initialization key Kinit using the E22 algorithm. The key Kinit is a function of n1, BD_Addr1, and PIN.
After the shared key generation, the two devices authenticate each other before generating the encryption key. It is based on the challenge response scheme. The verifier (device 2) sends a plain-text random value AV_RAND2, the receiver (device 1) then computes a response SRES=E1 (Kinit, BD_Addr1, AV_RAND2) where E1 is the algorithm. The verifier performs the same calculation and compares the response to the verifier. After the verification, a match is required for the mutual authentication process to be successful.
The Bluetooth mechanism involves the use of block cipher algorithm for encryption and Link Key generation. Further, the encryption of packets is performed using a stream cipher and 4 linear feedback shift registers. After authentication, a cipher key K3 is generated. The key length is 128 bits to ensure high level of security. After the key is generated, the data payload is encrypted using the cipher stream engine E0 and takes as inputs the encryption key, BD_Addr, 128 bit random number and the 26 LSB of the master's clock. The input values are shifted into four linear feedback shift registers and then combined in the summation combiner FSM to produce the cipher. This generates a new cipher every time.
The above description includes references to the accompanying drawings, which form a part of the detailed description. The drawings show, by way of illustration, specific embodiments in which the invention can be practiced. These embodiments are also referred to herein as “examples.” Such examples can include elements in addition to those shown or described. However, the present inventors also contemplate examples in which only those elements shown or described are provided. Moreover, the present inventors also contemplate examples using any combination or permutation of those elements shown or described (or one or more aspects thereof), either with respect to a particular example (or one or more aspects thereof), or with respect to other examples (or one or more aspects thereof) shown or described herein.
In the event of inconsistent usages between this document and any documents so incorporated by reference, the usage in this document controls.
In this document, the terms “a” or “an” are used, as is common in patent documents, to include one or more than one, independent of any other instances or usages of “at least one” or “one or more.” In this document, the term “or” is used to refer to a nonexclusive or, such that “A or B” includes “A but not B,” “B but not A,” and “A and B,” unless otherwise indicated. In this document, the terms “including” and “in which” are used as the plain-English equivalents of the respective terms “comprising” and “wherein.” Also, in the following claims, the terms “including” and “comprising” are open-ended, that is, a system, device, article, composition, formulation, or process that includes elements in addition to those listed after such a term in a claim are still deemed to fall within the scope of that claim. Moreover, in the following claims, the terms “first,” “second,” and “third,” etc. are used merely as labels, and are not intended to impose numerical requirements on their objects.
Geometric terms, such as “parallel”, “perpendicular”, “round”, or “square”, are not intended to require absolute mathematical precision, unless the context indicates otherwise. Instead, such geometric terms allow for variations due to manufacturing or equivalent functions. For example, if an element is described as “round” or “generally round,” a component that is not precisely circular (e.g., one that is slightly oblong or is a many-sided polygon) is still encompassed by this description.
Method examples described herein can be machine or computer-implemented at least in part. Some examples can include a Computer-Readable Medium or machine-readable medium encoded with instructions operable to configure an electronic device to perform methods as described in the above examples. An implementation of such methods can include code, such as microcode, assembly language code, a higher-level language code, or the like. Such code can include computer readable instructions for performing various methods. The code may form portions of computer program products. Further, in an example, the code can be tangibly stored on one or more volatile, non-transitory, or non-volatile tangible computer-readable media, such as during execution or at other times. Examples of these tangible computer-readable media can include, but are not limited to, hard disks, removable magnetic disks, removable optical disks (e.g., compact disks and digital video disks), magnetic cassettes, memory cards or sticks, random access memories (RAMs), read only memories (ROMs), and the like.
The above description is intended to be illustrative, and not restrictive. For example, the above-described examples (or one or more aspects thereof) may be used in combination with each other. Other embodiments can be used, such as by one of ordinary skill in the art upon reviewing the above description. The Abstract is provided to allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. Also, in the above Detailed Description, various features may be grouped together to streamline the disclosure. This should not be interpreted as intending that an unclaimed disclosed feature is essential to any claim. Rather, inventive subject matter may lie in less than all features of a particular disclosed embodiment. Thus, the following claims are hereby incorporated into the Detailed Description as examples or embodiments, with each claim standing on its own as a separate embodiment, and it is contemplated that such embodiments can be combined with each other in various combinations or permutations. The scope of the invention should be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.
This patent application claims the benefit of priority of Viner, et.al, U.S. Provisional Patent Application Ser. No. 62/820,005 filed on Mar. 18, 2019 (Attorney Docket No. 5148.001PRV), the benefit of priority of Viner, et.al, U.S. Provisional Patent Application Ser. No. 62/820,013 filed on Mar. 18, 2019 (Attorney Docket No. 5148.002PRV), the benefit of priority of Viner, et.al, U.S. Provisional Patent Application Ser. No. 62/820,039 filed on Mar. 18, 2019 (Attorney Docket No. 5148.003PRV), the benefit of priority of Viner, et.al, U.S. Provisional Patent Application Ser. No. 62/875,187 filed on Jul. 17, 2019 (Attorney Docket No. 5148.004PRV), and the benefit of priority of Viner, et.al, U.S. Provisional Patent Application Ser. No. 62/909,653 filed on Oct. 2, 2019 (Attorney Docket No. 5148.013PRV), all of which are hereby incorporated by reference herein in their entireties.
Number | Date | Country | |
---|---|---|---|
62820005 | Mar 2019 | US | |
62820013 | Mar 2019 | US | |
62820039 | Mar 2019 | US | |
62875187 | Jul 2019 | US | |
62909653 | Oct 2019 | US |