The present invention relates generally to the field of retail and consumer merchandising, and more particularly to apparatus and methods for automated processing of retail and consumer merchandise in lockable containers.
The process of retail checkout is often a source of frustration for the consumer. Typically, retail checkout involves long wait times and interaction with inefficient or inexperienced retail clerks. In some instances, consumers must wait for several minutes to process a single item at checkout.
In addition, conventional checkout techniques are typically not integrated with inventory control or product activation. For example, security and audit tags, such as electronic article surveillance (“EAS”) tags, typically are manually removed or deactivated at checkout by the retail clerk using a separate process. This results in audit and security tags being unintentionally left behind on purchased merchandise. A security tag that is left on merchandise not only frustrates the consumer, who has to return to a retail clerk to have the tag removed or deactivated, but also decreases productivity and checkout efficiency.
There is a general trend toward self-checkout in retail stores, libraries, and rental locations, allowing consumers to buy or rent a product with nominal wait times. Self-checkout allows consumers to expedite their checkout process and partially or completely remove the interaction with the retail clerk. Some of the these self-checkout systems integrate payment with the self-checkout process, as with conventional grocery self-checkout terminals.
Such systems may also process merchandise protected with a benefit denial device. These systems provide a consumer with a physical asset at a point of sale (which, as used herein, will also include a “point of rental” or any other distribution or return point). The consumer then uses security information to obtain a benefit from the asset. A benefit denial device may deny a benefit to an unauthorized asset user and provide the benefit or permit access to the benefit to an authorized asset user.
The security information may be provided to the consumer at the point of sale. The security information may be stored with the asset in a form that is unusable by or inaccessible to the consumer until the consumer pays for the asset. The consumer is thus denied a benefit of the asset until the consumer has purchased or rented the asset. An entity that holds a right, such as an ownership right, in the asset is called a rights holder or content provider. The rights holder or content provider conveys a right to the consumer and is thus provided with protection against piracy and unauthorized reproduction of the benefit. This is because, in some instances, a pirate would be required to obtain the security information before acquiring the benefit. Furthermore, if a pirate were to sell unauthorized copies of the asset and provide buyers with security information, the rights holder or content provider could deny the benefit to buyers who use duplicated security information or security information corresponding to a stolen asset. This is often the case with software products that require product activation over the Internet or telephone with a unique product key.
An asset may include, for example, consumer electronics, cosmetics, an audio cassette, a CD, a CD-ROM, a video cassette, a DVD or a mini DVD, or any other asset capable of being stored in a storage case or container. The storage case may be displayed in an environment in which potential customers, renters, or users pick up and examine the storage case to determine whether they are interested in buying, renting, or otherwise acquiring the asset.
Known benefit denial systems for assets require security information to be stored on a card. The card must be “swiped” at the point of sale. Swiping a card is time-consuming and decreases the efficiency of point-of-sale processes such as check-out. The card is also exposed to viewing and tampering. Tampering may defeat the effectiveness of a benefit denial system.
In addition, the return of an asset in a container, particularly a rental asset in a container, poses several problems for the retailer. The retailer must manually process and restock the returned asset. Typically, this involves reactivating an EAS or other similar security device, locking the asset container, resetting the benefit denial device, and restocking the container on the sales or rental floor. This process can be time-consuming and tedious for the retailer.
In view of the foregoing, it would be desirable to provide improved apparatus and methods for processing and returning items at a point of sale quickly and efficiently.
It would be further desirable to provide apparatus and methods for preventing tampering with a device that retains security information.
It would be further desirable to provide apparatus and methods for verifying the security status of a container before the container leaves the retail or rental location.
It would be still further desirable to provide apparatus and methods for reducing risk of economic loss to an entity selling or renting an asset.
In accordance with principles of the invention, systems and methods for processing an asset in an asset container are provided. The asset container may be received by a decoupler assembly, which may move the asset through a processing path based on information received from at least one of the asset container and the asset within the container.
In some embodiments, the decoupler may lock and/or unlock the asset container while moving the asset through the processing path. The decoupler may separately process the asset for sale, rental, loan, or return. To lock and/or unlock the container, the decoupler may pass the asset container through one or more magnetic fields. After locking or unlocking the container, the security status of the container may be verified by detecting reflected electromagnetic radiation from a portion of the container. In some embodiments, the decoupler may optically scan the container to verify that the container was successfully processed.
In some embodiments of the invention, an apparatus for use with a benefit denial system is provided. The apparatus may include a containing element configured to receive an asset. The asset may include a benefit for a user of the asset. The apparatus may include an electrical or RFID circuit that includes an antenna and is operatively associated with the containing element and configured to communicate information corresponding to the asset to a receiver outside the containing element. The information may be configured to be used by the benefit denial system to provide the benefit to the user.
In some embodiments of the invention, a container for use with a system for executing a conveyance of an interest in an asset from a first party to a second party is provided. The container may include a containing element configured to receive the asset and an electrical or RFID circuit operatively associated with the containing element and configured to communicate information corresponding to the asset to a receiver outside the containing element. The information may be configured to be used by the system to execute the conveyance.
In some embodiments of the invention, a container for an asset is provided. The container may include a containing element configured to receive the asset and an electrical or RFID circuit attached to the containing element and/or the assert and configured to communicate information corresponding to the asset to a receiver outside the containing element. The invention may include a circuit deactivator configured to interrupt electrical communication within the circuit.
In some embodiments of the invention, a locking member for use with 1) a benefit denial system; and 2) a lockable container, including an integral, internal locking member, is provided. The locking member may include an electrical circuit configured to communicate information associated with the asset to a receiver outside the container. The locking member or the container may include a security status indicator configured to close an optical circuit between the indicator and an optical sensor used to verify the security status of the container.
In some embodiments of the invention, a method for providing a benefit of an asset to an asset user may be provided. The method may include receiving asset identification information transmitted by an antenna enclosed in a containing element and providing access information corresponding to the asset identification information to the user. The access information may be configured to provide the user with access to the benefit.
In some embodiments of the invention, a method for processing a container may be provided. The container is engaged with a container transport assembly. Status information is received from the container and/or the asset within the container. After receiving the information, the container may transported along a processing path in a sequence based on the received information. The processing path may alter the security information associated with the container.
In some embodiments of the invention an apparatus may be provided for processing an item in a lockable container. The apparatus may engage the lockable container with a container transport assembly and receive status information from the container and/or the asset within the container via a receiver. The apparatus may then transport the container along a processing path in a sequence based on the received status information. In some embodiments, the processing path may alter the status information associated with the container and/or the asset within the container. The processing path may expose at least a portion of the lockable container to a magnetic field. In some embodiments, this field may be used to lock or unlock the lockable container. In other embodiments, the field may also activate or deactivate a security tag associated with the container.
In some embodiments of the invention a lockable container for securing an asset may be provided. The container includes a first cover and a second cover. The first and second covers are configured to move between an open position which allows access to the asset, and a closed position which prevents access to the asset. The container also includes a locking member that is configured to move between an unlocked position in which the first and second covers can move to the open position and a locked position which locks the first and second covers in the closed position. The locking member may include a security status indicator that is indicative of the security status of the container. The security status indicator may exhibit two positions. In one position the indicator is configured to close an optical circuit between an optical sensor and the indicator and in another position the indicator is configured to open the optical circuit with the optical sensor.
In some embodiments of the invention a method for verifying the security status of a lockable container containing a security status indicator may be provided. The security status indicator may be aligned with an electromagnetic radiation source. The indicator may then be exposed to the electromagnetic radiation source and reflected electromagnetic radiation may be detected. The security status of the container may then determined from the detected reflected electromagnetic radiation.
The above and other objects and advantages of the invention will be apparent upon consideration of the following detailed description, taken in conjunction with the accompanying drawings, in which like reference characters refer to like parts throughout, and in which:
In some embodiments, the invention may provide an apparatus for use with a benefit denial system. The apparatus may include a containing element, such as a lockable container, that is configured to receive an asset. The asset may include a benefit for a user of the asset, such as electronic data encoded within or on the asset. For example, the asset may include encoded data, music, video, games, etc. In some embodiments, the assert may take the form of a CD, DVD, video or audio cassette, or any other asset capable of being contained within a containing element.
The containing element may include an electrical circuit for communicating information via an antenna to a receiver outside the containing element when the containing element is closed. The circuit may be disposed within or on the containing element, on the asset, or both. The circuit may communicate information to the receiver when the containing element is closed. The circuit may also communicate information to the receiver when the asset is enclosed inside the containing element or when the asset is locked inside the containing element. In some embodiments, the electrical circuit is also capable of receiving information from the receiver. In these embodiments, the receiver acts as both a receiver and a transmitter, and the electrical circuit may include receiver and transmitter circuitry.
In some embodiments, the electrical circuit communicates via RF signals. The circuit may include an RFID tag, RF transponder, RF transceiver, electronic product code (EPC) tag, reader, or any other component of an automated data collection (ADC) system that enables wireless capture and transmission of data using radio waves. The electrical circuit may include one or more active or passive RFID tags. For example, if the circuit includes an active tag, the antenna associated with the tag may continuously emit data in the form of radio signals. Typically, the active tag may require a power source, such as a battery. If the circuit includes a passive tag, the tag may be interrogated by the receiver (or reader), which may also supply power to the electrical circuit.
The information read from or written to the electrical circuit may be configured to be used by the system to provide the benefit to the user. The information may be required by the system to provide the benefit to the user.
The apparatus may include a locking element configured to lock the containing element in a closed state. In some embodiments, the electrical circuit may be affixed to the locking element. In other embodiments, the electrical circuit may be affixed to the containing element, the asset, or both the containing element and the asset.
Examples of an asset containing element and apparatus for locking the containing element are shown and described in U.S. Patent Application Publication Nos. 2002/0023853, 2003/0000856, 2003/0111367, and 2004/0129587, all of which are hereby incorporated by reference herein in their entireties.
The examples include locking members that are operated by inserting the locking member into, and removing the locking member from, the containing element. The examples also include locking members that are internal to the containing element and are operated by moving the locking member from one position inside the containing member to another.
The circuit may include a data storage device. This device may be an integrated circuit chip and may be largely programmable. The digital storage device may be any suitable device and may include, for example without limitation, one or more of erasable programmable read-only memory, programmable read-only memory, read-only memory (ROM), electrically erasable read-only memory, random access memory (RAM), and hybrid types of memory. The circuit device itself may include an integrated circuit chip. The digital storage device may include asset identification information associated with the asset in the containing element, price information, security information, or any other related information.
In some embodiments of the invention, one circuit may be included in an EAS tag. The EAS tag may be configured to trigger an alarm if an article to which the tag is attached is moved into proximity with a detector that senses the presence of the tag.
In embodiments in which the electrical circuit is affixed to the locking element, the data storage device may be a reprogrammable, reburnable, or rewritable device. Reprogrammable or reburnable devices may be reprogrammed or reburned, respectively, to reconfigure the electrical circuit to communicate information associated with a different asset. For example, a first asset may be removed from the containing element and a second asset may be placed in the containing element. If so, the electrical circuit may be reconfigured to communicate information associated with the second asset.
The circuit may include an antenna, which may be any suitable antenna, including without limitation any suitable dielectric resonator of any suitable geometry. The circuit may include or be part of a contactless smart card such as that sold under the name GemEasy 8000 by Gemplus Corp. of Horsham, Pa. The circuit may include or be part of a contactless smart object such as that sold under the name MA8000 by Gemplus of Horsham, Pa.
The asset and/or the containing element may have a type. For example without limitation, the asset may be a compact disc, a digital video disc, a digital versatile disc, a memory card, a memory cartridge, a memory chip, or any other suitable data storage or recording medium. In some embodiments, the asset may be a consumer product. The apparatus may be configured to enclose no more than three assets of a type. The apparatus may be configured to enclose no more than two assets of a type. The apparatus may be configured to enclose no more than one asset of a type.
The asset and/or containing element may also be associated with a processing status. In some embodiments, the processing status may indicate whether the asset is available for processing (e.g., able to be purchased, rented, loaned, or returned). The processing status may also include asset identification information, such as the asset title, description, price, or any other suitable information. If the asset is a rental asset, the processing status may also include information relating to the last or current renter, rental return dates, location where the asset was rented, location where the asset is to be returned, or any other suitable information.
The benefit associated with asset may include any suitable product or service. For example, the benefit may include electronic or digital data, an executable computer program, an electronic game, audio, video, graphics, or any other benefit. In some embodiments, the benefit may include data that is inactive before the system receives a portion of the information. Inactive data may be unusable until it is activated. The system may be configured to activate the data.
The data may be configured to be accessed using an access device. The access device may be, for example without limitation, a personal computer, a work station, a mobile telephone, a personal data assistant, a game system (for example, without limitation, systems such as those sold under the trademarks GAMECUBE and GAMEBOY, by Nintendo of America, Inc. of Richmond, Wash.; PLAYSTATION, by Sony Corporation of America, Inc. of New York City, N.Y. and XBOX, by Microsoft Corporation of Redmond, Wash.) and any other suitable access device. In some embodiments, the access device may require at least a portion of the information to provide the benefit to the user.
In some embodiments of the invention, the apparatus may be configured to provide a data key to the device. In some embodiments of the invention, the user may request the data key from the apparatus via telephonic communication. The telephonic communication may include voice communication. The telephonic communication may include telephone keypad tones. In response to the request, the apparatus may provide the data key to the user. The user may communicate the data key to the access device.
The data key may be configured to activate the data and may include activation data. In some embodiments, the data key may be a file that is required before the user may obtain the benefit from the asset. The file may be an executable, non-executable, read-only, or read-write file. The file may also be encrypted. If the filed in encrypted, the file may include decryption information and/or one or more license numbers for one or more user licenses. Each license may entitle the user to obtain the benefit. In some embodiments, each license may entitle the user to obtain only a portion of the benefit. Multiple licenses may be aggregated to obtain a larger portion of the benefit. For example, one license may allow read-only access to the benefit, while another license may allow read-write access to the benefit. Multiple licenses may be combined to obtain the complete benefit. Alternatively or additionally, a license may require that the user obtain the benefit using a single access device. The access device may be identified to the system by the user, or the access device may identify itself to the benefit denial system.
In some embodiments, the apparatus may be configured to receive user information in the form of user input. The user information may include security data configured to be communicated by the user to the system. The security data may include an access code or a personal identification number (hereinafter, “PIN”). The information may include encoded letters, numbers, or any other suitable symbols. The system may also receive other user input, such as purchase or account information.
The information received or transmitted by the system may include transaction data configured to be communicated by the receiver to the apparatus. The transaction data may be communicated to the system to confirm that the asset was conveyed to the user via an authentic transaction. As used herein, an authentic transaction may be a transaction that is authorized by an entity that owns or possesses or is conveying a copyright, patent right, trademark right, trade secret, or other right or intellectual property right in the asset. The transaction data may include data related to the sale or rental of the asset, including price and availability information.
The containing element may include optically opaque material. The optically opaque material may make it impossible for a viewer to perceive the presence or location of the circuit inside the containing element. In some embodiments, the containing element may be entirely opaque.
In some embodiments, the invention may provide a container for use with a system for executing a conveyance of an interest in an asset from a first party to a second party. The container may include a containing element configured to receive and enclose the asset. The container may also include an electrical circuit configured to communicate information corresponding to the asset to a receiver located outside the containing element when the containing element is closed. The circuit may disposed within the containing element, on the asset, or both. The information may be configured to be used by the system to execute the conveyance.
The circuit may be configured to communicate the information when the asset is enclosed within the containing element. The circuit may also be configured to communicate the information when the asset is locked in the containing element. The information may include status information indicating the presence or absence of the asset in the containing element. For example, electrical circuits on both the container and the asset may both be configured to transmit information to the receiver. The receiver may then determine, from the received information, if the containing elements includes the asset.
The information may be required by the system to execute the conveyance, which may be a consignment sale. The interest may include an ownership interest in the asset. The interest may include a right to use the asset. The circuit may be configured to communicate the information before a third party places the asset in the possession of the second party. The third party may be a vendor, for example without limitation, a retailer, a wholesaler, a rental agent, or any other suitable entity. The third party may be an entity that does not hold an ownership interest in the asset during the conveyance.
In some embodiments, the invention may provide an asset container that may include a containing element configured to receive and enclose the asset. The containing element and/or the asset may include an electrical circuit configured to communicate information corresponding to the asset to a receiver outside the containing element when the containing element is closed. A circuit deactivator may be configured to interrupt electrical communication within the circuit.
The deactivator may be configured to interrupt electrical communication between a first portion of the circuit and a second portion of the circuit. The first portion may include a digital data storage device. The second portion may include an antenna. The deactivator may be configured to interrupt the electrical communication by physically separating the first and second portions of the circuit. The deactivator may be configured to be operated manually by a user of the asset.
The information may be configured to be used by a benefit denial system to provide to a user access to a benefit. The information may be required by the benefit denial system to provide the access. The information may be configured to be used by an asset transaction system to convey an interest in the asset from an interest conveyor to an interest receiver. The information may be required by the asset transaction system.
In some embodiments, the invention may provide a method for providing a benefit of an asset to an asset user. The method may include receiving asset identification information transmitted by an antenna enclosed in a containing element and providing access information corresponding to the asset identification information to the user. The access information may be configured to provide the user with access to the benefit.
The method may include providing the access information to the user via a point-of-sale entity. The method may include notifying a content provider regarding that the user has initiated a purchase of the asset. The content provider may be an entity that owns or possesses or is conveying a copyright, patent right, trademark right, trade secret, or other right or intellectual property right in the asset.
The method may include providing a label to the user. The label may bear at least a portion of the access information (such as a PIN). The label may be configured to adhere to the container. The portion may be human-readable or machine readable and may include a barcode, hologram, watermark, or other indicia.
The asset identification information may include an electronic product code. The asset identification information may include a universal product code.
The method may include activating the benefit. The activating may include identifying the access information as active access information. The access information may be stored in a storage device and electronically identified as “active.”
The method may include receiving the access information from the user. The method may include providing to the user a key to the benefit if the access information received from the user corresponds to access information identified in the storage device as activated access information. The key may serve to activate the asset. The key may serve to activate the benefit.
It will be appreciated that, according to the principles of the invention, the terms “active”, “activating” and “activated”, as applied to access information, refer to the process by which a system (such as a benefit denial system) designates that a benefit corresponding to the access information will be conferred to a user if the user presents the access information (or a facsimile thereof) to the system. The system may then activate the benefit by providing information required to provide the benefit to the user. If the user presents access information (or a facsimile thereof) that does not correspond to activated access information, system will not activate the benefit and the user will be denied the benefit.
A number of features of illustrative embodiments of the invention are shown in
Container 30 may include a locking mechanism. The locking mechanism of the invention may be integral with the container, and therefore may remain with the container, regardless of whether the container is locked or unlocked. Thus, the container may be both locked and unlocked without removing any portion of the locking mechanism (e.g., a locking member) from the container. Accordingly, there is no need to reuse, restock, recycle or discard any portion of the locking mechanism.
Container 30 may be locked to secure an asset within the container. In particular, container 30 may include internal locking member 100 and a locking mate arrangement situated within container 30. Locking member 100 and locking mate arrangement are configured for engagement such that first cover 32 is secured to second cover 34, thereby securing an asset within container 30.
In some embodiments, locking member 100 may include at least one spring-arm arranged on an end of the locking member that is configured to magnetically couple with an external manual magnetic key arrangement. The spring arm causes locking member 100 to alternately move into the locked and unlocked positions. In the embodiment shown in
In some embodiments of the present invention in which spring arms 102 and 104 are integrally formed (e.g., molded) with locking member 100, the spring arms may need to be rotated out of alignment with the longitudinal axis of locking member 100 so that magnetic inserts 174 and 172 are properly positioned within the spring arms. The process of rotating each of spring arms 102 and 104 out of alignment with locking member 100, however, may cause an unwanted bias on the spring arms, thereby causing locking heads 170 and 168 to be displaced outward in a direction perpendicular to the longitudinal axis of locking member 100. Accordingly, each spring arm 102 and 104 may be provided with hooks 184 and 180, and hook catches 186 and 182, respectively. In this manner, spring arms 102 and 104 may be properly positioned after inserting magnetic inserts 174 and 172, respectively, so that the spring arms do not protrude perpendicularly to the longitudinal axis of locking member 100.
As shown in
The double engagement portions of locking member 100 (i.e., portions 112-126) are configured to engage associated tabs of first cover 32 and second cover 34 of container 30. Each engagement portion (i.e., engagement portions 106-126) includes a locking trench and a release trench. The various locking trenches are designed so that when container 30 is closed and the tab portions on first cover 32 are aligned with the corresponding tab portions on second cover 34, locking member 100 slides into the locked position so that each locking trench catches and traps the corresponding tab portions therebetween, preventing the corresponding tab portions from being separated. This alignment prevents container 30 from being opened.
In particular, engagement portions 106, 108, and 110 each have locking and release trenches 128 and 130, 132 and 134, and 136 and 138, respectively. Engagement portions 112 and 114 include locking trenches 140 and 142, respectively. With regard to release trenches for engagement portions 112 and 114, the engagement portions share a “release trench” 93 in container 30. In actuality, release trench 93 is a space within container 30. Engagement portions 116 and 118 each include locking and release trenches 144 and 146, and 148 and 150, respectively. Engagement portions 120 and 122 each include locking and release trenches 152 and 154, and 156 and 158, respectively. Engagement portions 124 and 126 each include locking and release trenches 160 and 162, and 164 and 166, respectively.
To lock container 30, locking member 100 is made to slide in a direction that engages the corresponding tabs with the appropriate locking trenches. This traps the corresponding tabs within the locking trenches and prevents the tabs from separating and, consequently, the container from opening. In other words, the container may not be opened, since the associated tabs of first cover 32 are prevented from freely traversing the various release trenches when the first cover is pulled away from second cover 34.
Locking member 100 may include status indicator 190 on the face of locking member 100 which may include locking and unlocking status information. The status information may be placed thereon by known method. When the locking member 100 is slid between the locked and unlocked positions, the appropriate status information corresponding to the position of the locking member, for example, may appear through a status window of container 30 for a user to read.
In some embodiments, information 260 may be required to initiate a process that provides user 290 with access information 270 that may enable user 290 to access asset 264 or obtain a benefit present on or in asset 264. In some embodiments, information 260 may be required to initiate a process that provides user 290 with activation information 272 that may activate a benefit present on or in asset 264. For the purpose of illustration, the benefit will be described as the use of an electronic game.
User 290 may purchase asset 264 and execute the purchase by interacting with system 268. System 268 may receive information 260 using transceiver 261. Information 260 may be transmitted by antenna 262 on a radio frequency carrier signal. In some embodiments, system 268 may transmit sale information 274, which may be derived from or included in information 260, to content provider 282. It will be understood that the functions described herein as being performed by content provider 282 may be performed by any suitable party using one or more of a system for processing data, a system for communicating data, a system for storing data and any other suitable system. The system or systems may be centralized. The system or systems may be distributed over one or more physical deices. The physical devices may be located in different geographic locations.
System 268 may communicate with content provider 282 via a computer network such as the Internet, a virtual private network or other suitable secure data circuit, or an intranet, via a telephone network, via a wireless communication channel, or via any other suitable communication channel. Sale information 274 may inform content provider 282 that asset 264 has been or is to be sold to user 290 and that the sale occurred through system 268. Content provider 282 may therefore recognize the sale of asset 264 as an authorized or authentic sale. Content provider 282 may provide access information 270 to user 290. In some embodiments, content provider 282 may provide access information 270 to user 290 via system 268. In some embodiments, content provider 282 may provide access information 270 to user 290 via a route (not shown) that is independent of system 268. Access information 270 may be communicated to user 290 via a computer network such as the Internet or an intranet, via a telephone network, via a wireless communication channel, or via any other suitable communication channel.
System 268 may provide access information 270, which may be derived from or be included in information 260, to user 290. User 290 may use access information 270 in conjunction with access device 265 to access or play a computer game stored on asset 264. Access device 265 may be an access device such as any of those described above. It will be assumed for the sake of illustration that the access device is an electronic game system.
In some embodiments, user 290 may “keyboard” access information 270 into access device 265. Access device 265 may communicate access information 270 to content provider 282. Content provider 282 may identify access information 270 as being authorized access information and may provide activation information 272 to user 290, for example via access device 265. Communication between content provider 282 and access device 265 may be via a computer network such as the Internet or an intranet, via a telephone network, via a wireless communication channel, or via any other suitable communication channel.
In some embodiments of the invention, asset 264 may instruct access device 265 to communicate with content provider 282. Asset 264 may include a log-in procedure that prevents access device 265 from launching the computer game until access device receives activation information 272. Access device 265 may display a screen that prompts user 290 to enter some or all of access information 270 into access device 265. After access device 265 receives activation information 272, access device 265 may launch the electronic game. User 290 may then obtain the benefit of playing the electronic game.
In some embodiments, information 260 may include activation information 272 that is provided to user 290 by system 268. In those embodiments, it may not be necessary for system 268 to provide sale information 274 to content provider 282, for content provider 282 to provide access information 270 to user 290, or for access device 265 to communicate with content provider 282. In some of those embodiments, user 290 may keyboard access information into access device 265. Asset 264 may instruct access device 265 to launch the electronic game upon receipt by access device 265 of the activation information.
In some embodiments of the invention, access device 265 may be provided with a transceiver that is configured to communicate directly with antenna 262. In those embodiments, user 290 may place container 263 in communication with access device 265 to transfer any portion of information 260 required for access to asset 264, or a benefit present in or on asset 264, to access device 265.
In some embodiments of the invention, access device 265 may not be in communication with content provider 282. For example, access device 265 may not have an Internet interface. User 290 may communicate with content provider 282 by telephone. User 290 may provide access information 270 to content provider 282 via telephone. Content provider 282 may provide activation information 272 to user 290. User 290 may enter activation information 272 into access device 265 to gain access to the electronic game.
In some embodiments of the invention, information 260 may be used to execute a consignment sale of asset 264. The consignment sale may be a transaction between content provider 282 and user 290. The sale may be facilitated by system 268. The retail sales facility may not own asset 264. The retail sales facility may own asset 264, but may not own the computer game stored on asset 264. Therefore, if asset 264 is lost or stolen, the retail sales facility may lose the value of asset 264 in its inactive state, but may be spared the loss of the electronic game value.
System 268 may provide consignment sale information 276 to content provider 282. Consignment sale information 276 may inform content provider 282 that user 290 has purchased or has agreed to purchase asset 264 and the computer game present on asset 264. Content provider may provide access information to user 290 to enable user 290 to play the electronic game, as described above. User 290 may provide funds 280 to the retail sales facility associated with system 268. User 290 may provide funds 280 to content provider 282 via financial institution 284. System 268 may facility the transfer of funds 280 by providing transaction information 278, which may be credit card information, to financial institution 284. Any of the aforementioned communications in connection with the. consignment sale may be performed via a computer network such as the Internet or an intranet, via a telephone network, via a wireless communication channel, or via any other suitable communication channel.
It will be understood that in some embodiments of the invention, information 260 may include security information that is required for user 290 to access asset 264 or a portion of asset 264. In some embodiments, information 260 may include information that may be used to execute a consignment sale of asset 264. In some embodiments, information 260 may include both security information that is required for user 290 to access asset 264, or a portion of asset 264, and information that may be used to execute a consignment sale of asset 264.
RFID tag 206 maybe passive or active. In some embodiments, if RFID tag 206 is an active tag, then a battery may power the tag. RFID tag 206 may also be read-only or read-writable. RFID tag 206 may transmit item identification data (or any other suitable information) to decoupler 210 continuously or after being interrogated by a component of decoupler 210. Similarly, decoupler 210 may transmit data to RFID tag 206. Although for the sake of clarity only one instance of RFID tag 206 is shown in
Lockable container 202 may also include at least one reflective tag 205. Reflective tag 205 may be configured to move between a first position and a second position. In the first position, reflective tag 205 may close an optical circuit between the tag and an optical sensor. In the second position, reflective tag 205 may open an optical circuit between the tag and the optical sensor, such as optical sensor 214. The tag may include at least two portions of different reflectivity. In some embodiments, reflective tag 205 comprises reflective foil or tape and indicates whether lockable container 202 is locked or unlocked. In other embodiments, reflective tag 205 includes indicia printed or treated with reflective ink or other reflective material.
Reflective tag 205 may be configured to move or change orientations within lockable container 202 based on the security status of lockable container 202. In at least one embodiment, reflective tag 205 is attached to a locking member of lockable container 202. The locking member may be internal to lockable container 202 and may have a locked position and an unlocked position. The locking member may be moved between the locked and unlocked positions by a magnetic force. As described in more detail in
Lockable container 202 may be received by decoupler 210. The term “decoupler” or “automatic container processing assembly” is meant to refer to any device or apparatus capable of accepting, engaging, and/or processing asset containers. In some embodiments, these asset containers may be lockable containers as described above. The decoupler or automatic processing assembly may mechanically perform at least one processing task typically performed by a retail clerk. These tasks may include, for example, locking or unlocking the container, scanning an optical tag associated with the container, or any other suitable task. Before or after being received by decoupler 210, RFID tag 206 may transmit to, or receive data from, RFID transceiver 212 of decoupler 210. In some embodiments, lockable container 202 may be inserted into processing path 216. In some embodiments, processing path 216 may engage lockable container 202.
At least a portion of processing path 216 may be exposed to or overlay a magnetic field. The magnetic field may be created by a magnetic field source, such as one or more electromagnets. The magnetic field source may be switched on and off while lockable container 202 is in processing path 216. The magnetic field may selectively lock or unlock lockable container 202 as container 202 is moved through processing path 216. Container 202 may also pass optical sensor 214. Optical sensor 214 may determine the position or orientation of reflective tag 205 by detecting electromagnetic radiation reflected from reflective tag 205. In some embodiments, optical sensor 214 may detect reflected visible light intensity. In some embodiments, optical sensor 214 may detect the color of the reflected visible light. Optical sensor 214 may include a light source, such as a light emitting diode (“LED”) or laser. Lockable container 202 may be aligned with the light source via a motorized conveyor or transport assembly, as described in
In addition to receiving lockable container 202, decoupler 210 may, in some embodiments, also eject the container along the same processing path that the container was received. For example, a consumer who wishes to rent a DVD movie may insert the DVD container into decoupler 210. The DVD container may be processed by decoupler 210 moving the container along processing path 216. The container may be ejected from decoupler 210 after processing is complete and returned to the consumer. In some embodiments, the container is not returned to the consumer, but rather moved straight through the decoupler to the back side of decoupler 210. This embodiment may be useful in rental return situations where the asset is being returned to inventory. This embodiment may also reduce theft of assets dropped in an overnight drop box. Decoupler 210 may be connected to another processing device, such as a mechanical conveyor, robotics, or belt system for further processing, or an inventory bin may be positioned at the back side of decoupler 210.
Decoupler 210 may perform one or more of several actions after lockable container 202 is received by decoupler 210. The sequence of actions taken by decoupler 210 may depend on one or more of several criteria, including, but not limited to, the security status of lockable container 202 (e.g., locked or unlocked), the processing status of the asset in the lockable container 202 (e.g., rented and/or purchased), information received from RFID tag 206 (either on the container, on the asset, or both), and information received from optical tag 208.
Decoupler 210 may be multi-functional. Decoupler 210 may scan optical tag 206 while processing the asset. Decoupler 210 may also interpret an information signal emitted from the asset or the container via RFID tag 206. If the signal validates the asset, decoupler 210 may act in response to the signal. To validate the asset, decoupler 210 may communicate with transaction management facility 220. Transaction management facility 220 may include any host, server, data source, or database containing asset or container information. Transaction management facility 220 may also coordinate communication between one or more of decoupler 210 and content provider 230, asset management module 240, financial instructions 250, and any other suitable device or entity.
To validate an asset, asset identity information may be received from lockable container 202 and/or asset 204 via one or more of RFID tag 206, optical tag 208, and reflective tag 205. This received information may be compared against information accessible by transaction management facility 220. Transaction management facility 220 may also communicate with content provider 230, asset management module 240, and/or financial institutions 250 to complete the validation process. For example, transaction management facility 220 may notify asset management module 240 to deactivate a security tag associated with the item so that an alarm will not sound when the item is passed through sensors located at the exit of the store, library, or other location. As another example, transaction management facility 220 may automatically debit the purchase or rental price of the asset from the consumers account by contacting financial institution 250. Transaction management facility 220 may also access information relating to the processing status or availability of the asset in lockable container 202. For example, the item may be sold out or not available for rental. As another example, the processing status may indicate that the asset in the lockable container is for sale only and not for rental. Transaction management facility 220 may access content provider 230 for network access, security information, or media content. In some embodiments, decoupler 210 may write, burn, or record media content or other data from content provider 230 directly to asset 204 or RFID tag 206 while processing the asset.
If the transaction is validated, decoupler 210 may act on lockable container 210 in accordance with a processing sequence based on the received information. The acting may include, among other actions, transporting the asset along processing path 216, locking or unlocking the container, scanning optical tag 208, writing security information or other data to RFID tag 206, verifying the status of the container after processing, and releasing the container.
In some embodiments, decoupler 210 may process lockable container 202 in stages. The first stage of processing may include an interpretation stage, in which information emitted from the asset or the container is received and analyzed. The second stage of processing may include a transport stage, in which the container is moved within decoupler 210 along processing path 216. The third stage of processing may include an acting stage, in which the decoupler acts (e.g., engages the container and/or moves the container along processing path 216) on information received from the container or the asset. The final stage of processing may include an ejection stage, in which the decoupler releases the container or positions the container such that it may be removed from the decoupler by a user or another device.
The decoupler may be configured to receive and release the container to an individual or to another device. In some embodiments, the container is released to the consumer along the same processing path as the container was received. In other embodiments, the container is released along a different processing path than the processing path that container was received.
During the decoupler transport stage, the container may be conveyed to a “read” position. In the “read” position, the decoupler may receive information from, or transmit information to, the asset or the container. The apparatus may include one or more motorized belts. The apparatus may move the container into or through a magnetic field generated by one or more magnets. One or more of the magnets may be permanent magnets or electromagnets. One or more of the magnets may be in a fixed location within decoupler 210. Passing the container into or through the magnetic field may lock and/or unlock the container. In some embodiments, the container may be first locked during the transport stage and then locked or unlocked during the acting stage.
During the decoupler acting stage, the decoupler may take one or more actions in response to the information received from the interpretation stage. The actions may include one or more of reading RFID tag 206, writing to RFID tag 206, killing (deactivating) RFID tag 206, activating an EAS tag, deactivating an EAS tag, unlocking the container, locking the container, or any other suitable action. Table 1 summarizes some of the exemplary actions the decoupler may take based on the security status of the container and the processing status of the asset in the container.
Table 1 is merely illustrative. The decoupler may be configured to perform any other suitable actions to automate the checkout or return process. In addition, the order of the operations listed above are exemplary. The above actions may be performed, or combined, in any suitable manner. For example, when returning an unsecured asset in a lockable container, the decoupler may first lock the container and then receive status information from the container and/or the asset. In addition, in some embodiments information may be received from both the container and the asset in the container. This information may be used to verify the presence of the asset in the container. For example, if a rental consumer tries to return a lockable DVD container without the correct DVD asset inside the container, the decoupler may reject the container. In other embodiment, the decoupler may process the container, but not alter the processing status information associated with the item.
In order to determine that the container was unlocked properly or in an authorized manner, optical sensor 214 may verify the security status of the container while the container is still in the decoupler. The sensor may read reflected electromagnetic radiation, which may include in some embodiments visible light, from reflective tag 205. Reflective tag 205 may be indicative of the security status of the lockable container. In some embodiments, reflective tag 205 may have a color or be configured to reflect light of a certain color or wavelength. The tag may be positioned on a locking portion (such as a locking bar) of the lockable container so that when the container is locked and unlocked, the orientation of reflective tag 205 may change. In some embodiments, reflective tag 205 includes a colored “unlocked” icon treated with a reflective ink (the color of the ink may be green). In these embodiments, optical sensor 214 may detect both intensity and color of the electromagnetic radiation. In other embodiments, optical sensor 214 may detect only electromagnetic radiation intensity and not color. Reflective tag 205 may be disposed at at least two positions, a reflective position, in which tag 205 closes an optical or opto-electrical circuit between tag 205 and the optical sensor, and a non-reflective position, in which tag 205 opens the optical circuit between the tag and the optical sensor. Optical sensor 214 may optically sense or confirm the position or orientation of reflective tag 205 to confirm the security status of the container.
In some embodiments of the invention, decoupler 210 may be configured to activate the asset in lockable container 202 (as in a checkout activation system). In some of these embodiments, decoupler 210 may enable authorized access to digital media. The decoupler may provide an activating ingredient or excitation to the asset that changes the potency of the substance—for example, a pharmaceutical product—in order to activate a property, which may be a therapeutic property, of the substance. In other embodiments, decoupler 210 includes a transmitter, which may be an RF transmitter, for sending security information to RFID tag 206 or some other storage or memory mechanism associated with the lockable container or the asset within the lockable container.
Decoupler 210 may be configured to automatically process purchases, rentals, returns, and any other consumer transaction. For example, a user may selects an asset displayed “live” on a shelf in a lockable container. The lockable container may show a red “locked” icon indicating that a locking bar in the container is in the locked position. The user may insert the container into decoupler 210 in a specific orientation. In one embodiment, the user inserts the container oriented with the locked icon on right side, hinge on left side. The decoupler may then engage the lockable container with a container transport assembly and move the container along a processing path. The processing path may expose at least a portion of the container to a magnetic field. The magnetic field may be used to lock or unlock a magnetically actuated locking member of the container. The decoupler may also perform any of the processing actions described above while moving the container along the processing path. At the conclusion of the processing stage, the decoupler may alter the processing and/or security status of the container, as appropriate. For example, after a rental CD has been rented, the decoupler may alter the CD's processing status to “unlocked-rented” or some other similar status.
Once a container is positioned within the RFID or optical field of the decoupler, the decoupler may read from, write to, or kill one or more RFID tags associated with container 310 and/or an asset within container 310. If the decoupler determines that the information received from the one or more RFID tags constitutes a valid transaction, the decoupler may activate conveyor assembly 308. Alternatively or additionally, when optical sensor 304 scans, detects, or recognizes a valid optical tag on container 310, the decoupler may activate conveyor assembly 308. Optical sensor 304 may include any switch, sensor, or scanner, including a position sensor, that detects or reads machine-readable information from container 310. After container 310 is detected in transport chassis 312, the container may be transported to the back of transport chassis 312. Conveyor assembly 308 may be a powered or unpowered assembly. In one embodiment, a user may manually pushes container 310 into transport chassis 312. The user's force may move conveyor assembly 308, resulting in the mechanical energy needed to power the remainder of the decoupler. In other embodiments, the decoupler may be powered via an external power source. The external power source may be used to create an electromagnetic drive system with reversible polarity. The electromagnetic drive system may be used to effect movement of metal reaction portions of the lockable container causing the container to lock or unlock. Optical sensor 304 may cause an electrical signal to be transmitted to a motor attached to conveyor assembly 308. This electrical signal may cause conveyor assembly 308 to transport container 310 further into transport chassis 312.
In some embodiments, transport chassis 312 may accept variable-sized containers. For example, conveyor assembly 308 may be supported by springs (not shown), which dynamically adjust to fit the size of the container to be processed. Conveyor assembly 308 may also include any number of sprockets, wheels, and/or conveyor belts. In the depicted embodiment, one endless belt is shown; however, any number of belts and any number of conveyor assemblies may be used in other embodiments.
Optical sensor 304 may also scan container 310 as it moves into transport chassis 312. For example, optical sensor 304 may scan a portion of the container containing a barcode, watermark, hologram, or any other machine-readable indicia. In some embodiments, conveyor assembly 308 may stop the transport of container 310 so that optical sensor 304 may scan a tag associated with container 310. In other embodiments, the container is scanned while being transported to the back of transport chassis 312.
At some point, container 310 may make contact with rear contact switch 314, which may be located at the back of the processing path of the decoupler. Rear contact switch 314 may include any switch or sensor, including a position sensor. Once contact switch 314 is actuated, conveyor assembly 308 may reverse the container's direction of motion. Although in the example of
Transport chassis 312 may expose container 310 to one or more magnetic forces. These magnetic forces may result from a magnetic source within the decoupler or one or-more external magnetic sources. For example, in one embodiment the decoupler contains magnets 604 (
Optical sensor 304 may verify or confirm the processing or security status of container 310 at any convenient time. For example, in one embodiment before the decoupler ejects container 310, optical sensor 304 attempts to verify the container's security status. In some embodiments, optical sensor 304 may detect electromagnetic radiation reflected off reflective tag 205 (
During movement of container 310, an EAS tag may be deactivated, a barcode or other optical tag may be optically scanned, and/or one or more RFID tags may be read, written to, or killed. When container 310 enters the RFID or optical field of the decoupler, the decoupler may interrogate the container and/or the asset in the container to authenticate a valid transaction. For example, in one embodiment, passive RFID tags associated with the asset and the container are interrogated. The decoupler may verify whether the correct asset is in the correct container and validate the transaction using any other available information from transaction management facility 220 (
Once in the assembly, a magnetic field may lock a locking bar internal to container 310. The container may then be moved to rear contact switch 314, which signals a motor to reverse direction of conveyor assembly 308. At this point, container 310 may begin to exit the transport chassis. The container's locking bar is again affected by a magnetic field, which may unlock container 310. Container 310 may then show a green “unlocked” icon in a lock indicator window on the container. When the lock indicator window passes optical sensor 304, electromagnetic radiation may be reflected from a portion of container 310 and detected by optical sensor 304. LED signals 306 may then flash to indicate successful unlocking of container 310. In some embodiments, other suitable output devices or mechanisms are used to indicate the successful unlocking of container 310. For example, a display screen or speaker may be integrated into the decoupler to allow multimedia output as well as user input.
Finally, when container 310 passes contact switch 302, conveyor assembly 308 may discontinue moving the container. Contact switch 304, like rear contact switch 314, may include any switch, sensor, or scanner, including a position sensor, that detects or reads the position of container 310. Once the processing of the container is complete and the container is ejected from the processing path, the user may remove the processed container from the decoupler.
In rental store and library environments, products rented or borrowed must be returned. In order to help speed the process of returning these items, a coupling embodiment of the invention may be used. In these embodiments, a container may pass all the way through the decoupler, locking the case and the media inside while receiving asset return information, which may include inventory information. This embodiment may be used in any type of stocking situation where individual assets are scanned for inventory, such as in the video rental industry, the library system and the pharmaceutical industry (for example, a retail pharmacy may stock a drug or other item by scanning a container, writing information to an RFID tag on the container, and locking the container, thus securing the drug or other item inside). The coupling embodiment may transport a container with an asset, receive information from the asset or from the container, and act upon the information. The decoupler may process the asset in a number of ways, including, for example, reading from, writing to, or killing one or more RFID tags associated with the asset and/or the lockable container, activating or deactivating an EAS tag associated with the asset and/or the lockable container, and locking or unlocking the container. In addition, the decoupler may connect to network resources, such as inventory information, asset management information, or stored data to further process or validate the asset.
A user may return a rental or retail item in a lockable container showing a green “unlocked” icon. This icon may indicate that the locking bar in the container is in the unlocked position. The user may insert the container into the decoupler in the appropriate orientation. In one embodiment, the user inserts the container with the indicator on the right side of the container with the container spine on left.
Information reception and/or transmission may begin when, for example, the container enters the RFID reader or optical field of the decoupler. This may cause conveyor assembly 308 to begin transporting the container. While in transport, an EAS tag may be activated, a barcode may be optically scanned, and/or an RFID tag may be read, written to, or killed. At some point, container 310 may trigger a contact switch, which recognizes the position of the container and interrogates a passive RFID tag associated with the container and/or the asset in the container to authenticate the transaction and to credit its return to the user. Authenticating the transaction may include matching the asset with container 310 and/or connecting to stored data or transaction management facility 220 (
If the transaction is authenticated, the decoupler may energize conveyor assembly 308 and release a solenoid arm, which blocks the processing path, to allow the container to advance straight through the clear processing path. The container may be exposed to one or more magnetic forces, causing the locking bar within the container to be affected, which may lock the container. The container then is transported out the rear of the decoupler. Optionally, a storage bin may hold processed containers at the rear of the decoupler.
Magnet cover 408 may protect or shield other circuitry in the decoupler from being exposed to the magnetic field created by magnets 406. Antenna 402 may be any suitable device which receives or radiates radio waves, including RF waves. Antenna 402 may be combined or connected to RFID transceiver 506 (
Locking member 804 may include molded spring arms 806 and 808 which are, as is more fully described in U.S. Patent Application Publication No. 2004/0129587, used to prevent locking member 804 from sliding into the unlocked position when locked and into the locked position when unlocked. It should be noted that spring arms 806 and 808 may take on any other suitable arrangements so long as they meet the objectives of the present invention. For example, for locking member 804, molded spring arms 806 and 808 may be metal leaf springs (not shown) that are included as part of the second cover of container 800, rather than as part of locking member 804.
Locking member 804 includes locking tabs 810, 812, 814, and 816 that interlock with adjacent corresponding loops formed on the other cover of container 800 to lock the container in the closed position. Various loops may be disposed on the first cover and the second of container 800.
Locking member 804 is designed to be used with the decoupler of the present invention or an external manual magnetic key decoupler. Either of these devices may selectively lock and/or unlock container 800. In particular, a manual magnetic key decoupler or the decoupler assembly of
The locking member of container 800 may be used with a container for securing assets. Such assets may include, for example, storage media (e.g., DVDs, CDs, video games, memory cards or any other suitable storage media), jewelry, pharmaceutical products, razor blades, printer cartridges, or any other item of value. The lockable container of the present invention may also be used to secure items such that others are prevented from accessing the item, whether or not the item is of particular value. For example, the lockable container of the present invention may be used to secure violent or adult movies or video games in the home, such that children are unable to access the items.
Container 800 may also include RFID 802 on one or both of the first cover and the second cover. RFID tag 802 may be an active or passive tag. RFID tag 802 may also be disposed at various other locations on container 800, including, for example, on locking member 804, the container spine, or on the disc hub of container 800. In addition, in some embodiments, RFID tag 802 may be also located on the asset held with the container. For example, a DVD movie may have an RFID tag on the labeled surface of the DVD. This may be useful for verifying the presence of the asset in the container before processing the container. The decoupler of the present invention may read from, write to, or kill any of the aforementioned tags.
Container 800 may also induce optical tag 801, which in the illustrated embodiments is a barcode, but could include any machine-readable tag or indicia. For example, optical tag 801 may be a hologram, watermark, two-dimensional barcode, or any other printed, etched, or applied tag.
Container 900 may include one or more of RFID tag 902 and optical tag 901. RFID tag 902 may also be disposed at various other locations on container 900, including, for example, on locking member 904, the container spine, or in disc area 904. Container 900 may be configured to hold an asset, such as a CD, DVD, or other like media.
As shown in
In practice, one or more steps shown in process 1200 may be combined with other steps, performed in any suitable order, performed in parallel —e.g., simultaneously or substantially simultaneously —or deleted. For example, step 1204 of receiving status information may be performed before engaging the container at step 1202. For example, when the container enters optical or RFID range of the decoupler, the decoupler may receive information from the container and/or the asset within the container.
In practice, one or more steps shown in process 1300 may be combined with other steps, performed in any suitable order, performed in parallel —e.g., simultaneously or substantially simultaneously —or deleted.
It will be noted that all of the features described above in connection with the decoupler of the invention may be applied to various types of containers and various types of assets in addition to the containers and assets described. The above described embodiments of the present invention are presented for the purposes of illustration and not of limitation, and the present invention is limited only by the claims which follow.
This application is a continuation-in-part of U.S. patent application Ser. No. 10/776,583, filed Feb. 10, 2004, which claims the benefit of U.S. Provisional Application Nos. 60/446,386, filed Feb. 10, 2003 and 60/487,467, filed Jul. 14, 2003. This application also claims the benefit of U.S. Provisional Application Nos. 60/630,452, filed Nov. 23, 2004, 60/644,197, filed Jan. 13, 2005, and 60/730,585, filed Oct. 26, 2005. The aforementioned earlier filed applications are all hereby incorporated by reference herein in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
517729 | Cable | Apr 1894 | A |
1626898 | Welk | May 1927 | A |
1707225 | Jackson | Apr 1929 | A |
2393034 | Ellis et al. | Jan 1946 | A |
2730392 | Thiebaud et al. | Jan 1956 | A |
2809062 | Mainhardt et al. | Oct 1957 | A |
2825483 | Maron, Jr. | Mar 1958 | A |
2916901 | Claud-Mantle | Dec 1959 | A |
3095723 | McKnight et al. | Jul 1963 | A |
3230749 | Manthorne | Jan 1966 | A |
3232421 | Young | Feb 1966 | A |
3495716 | Gregory | Feb 1970 | A |
3497908 | Zamarra | Mar 1970 | A |
3515423 | De Smidt | Jun 1970 | A |
3685684 | Schindler et al. | Aug 1972 | A |
3763994 | Somers | Oct 1973 | A |
3828922 | Holkestad | Aug 1974 | A |
3837525 | Kobayashi | Sep 1974 | A |
3837692 | Ayers et al. | Sep 1974 | A |
3855827 | Hallman et al. | Dec 1974 | A |
3885670 | Cousino | May 1975 | A |
3904259 | Hoffmann et al. | Sep 1975 | A |
3933240 | Humble | Jan 1976 | A |
3933381 | Schurman | Jan 1976 | A |
3949928 | Perkins | Apr 1976 | A |
3951264 | Heidecker et al. | Apr 1976 | A |
3969007 | Lowry | Jul 1976 | A |
3994416 | Mulligan | Nov 1976 | A |
3994551 | Ackeret | Nov 1976 | A |
4046255 | Ackeret | Sep 1977 | A |
4084690 | Pulse | Apr 1978 | A |
4084694 | Lainez et al. | Apr 1978 | A |
4109821 | Lutz | Aug 1978 | A |
4153178 | Weavers et al. | May 1979 | A |
4176744 | Borzak | Dec 1979 | A |
RE30184 | Ackeret | Jan 1980 | E |
4184594 | Hehn | Jan 1980 | A |
4191292 | Schweizer | Mar 1980 | A |
4204724 | Bauer et al. | May 1980 | A |
4211337 | Weavers et al. | Jul 1980 | A |
4235334 | Ahn | Nov 1980 | A |
4239108 | Coleman et al. | Dec 1980 | A |
4266784 | Torrington | May 1981 | A |
4279373 | Montealegre | Jul 1981 | A |
4285429 | MacTavish | Aug 1981 | A |
4291801 | Basili et al. | Sep 1981 | A |
4293266 | St. Lawrence et al. | Oct 1981 | A |
4303159 | Stone et al. | Dec 1981 | A |
4314637 | Posso | Feb 1982 | A |
4314643 | Forbes, Jr. | Feb 1982 | A |
4341307 | Shyers | Jul 1982 | A |
4363403 | Raucci, Jr. | Dec 1982 | A |
4365711 | Long et al. | Dec 1982 | A |
4365712 | Oishi et al. | Dec 1982 | A |
4379507 | Llabres | Apr 1983 | A |
4387807 | De la Rosa | Jun 1983 | A |
4399913 | Gelardi et al. | Aug 1983 | A |
4406369 | Wallace et al. | Sep 1983 | A |
4407410 | Graetz et al. | Oct 1983 | A |
4425999 | MacDonald et al. | Jan 1984 | A |
4445634 | Sato | May 1984 | A |
4453390 | Moritz | Jun 1984 | A |
4453743 | Sanders et al. | Jun 1984 | A |
4463849 | Prusak et al. | Aug 1984 | A |
4463850 | Gorog | Aug 1984 | A |
4469225 | Takahashi | Sep 1984 | A |
4476978 | Saito | Oct 1984 | A |
4488644 | Wynalda | Dec 1984 | A |
4501359 | Yoshizawa | Feb 1985 | A |
4508217 | Long et al. | Apr 1985 | A |
4522312 | Rathgeber et al. | Jun 1985 | A |
4538730 | Wu | Sep 1985 | A |
4558782 | Iverson et al. | Dec 1985 | A |
4561544 | Reeve | Dec 1985 | A |
4572369 | Morris | Feb 1986 | A |
4589549 | Hehn | May 1986 | A |
4609105 | Manes et al. | Sep 1986 | A |
4613044 | Saito et al. | Sep 1986 | A |
4617655 | Aldenhoven | Oct 1986 | A |
4627534 | Komiyama et al. | Dec 1986 | A |
4635797 | Bankier | Jan 1987 | A |
4643301 | Hehn et al. | Feb 1987 | A |
4658955 | Eichner | Apr 1987 | A |
4674303 | Salcone, II | Jun 1987 | A |
4676370 | Rudick | Jun 1987 | A |
4678080 | Nelson | Jul 1987 | A |
4685558 | Filiz et al. | Aug 1987 | A |
4702369 | Philosophe | Oct 1987 | A |
4703853 | Byrns | Nov 1987 | A |
4705166 | Ackeret | Nov 1987 | A |
4709813 | Wildt | Dec 1987 | A |
4717021 | Ditzig | Jan 1988 | A |
4718547 | MacTavish | Jan 1988 | A |
4722439 | Grobecker et al. | Feb 1988 | A |
4724957 | Burgschweiger | Feb 1988 | A |
4733916 | Seufert | Mar 1988 | A |
4747484 | Ackeret | May 1988 | A |
4750618 | Schubert | Jun 1988 | A |
4753347 | Bellante et al. | Jun 1988 | A |
4759442 | Gregerson et al. | Jul 1988 | A |
4772877 | Rice | Sep 1988 | A |
4784264 | Sykes | Nov 1988 | A |
4793479 | Otsuka et al. | Dec 1988 | A |
4802601 | Pijanowski et al. | Feb 1989 | A |
4805769 | Soltis et al. | Feb 1989 | A |
4805770 | Grobecker et al. | Feb 1989 | A |
4807749 | Ackeret | Feb 1989 | A |
4811000 | Humphrey et al. | Mar 1989 | A |
4819797 | Holmgren | Apr 1989 | A |
4834238 | Hehn et al. | May 1989 | A |
4838420 | Collett et al. | Jun 1989 | A |
4860897 | Fowler et al. | Aug 1989 | A |
4871064 | Hehn et al. | Oct 1989 | A |
4921097 | Finke et al. | May 1990 | A |
4928825 | Hehn | May 1990 | A |
4941588 | Flider | Jul 1990 | A |
4947989 | Horton | Aug 1990 | A |
4962854 | Ricci | Oct 1990 | A |
4966020 | Fotheringham et al. | Oct 1990 | A |
4972690 | O'Sullivan | Nov 1990 | A |
4974740 | Niles et al. | Dec 1990 | A |
4987639 | Baiuley et al. | Jan 1991 | A |
4987999 | Hehn | Jan 1991 | A |
4988000 | Weisburn et al. | Jan 1991 | A |
5007256 | Lowe | Apr 1991 | A |
5011010 | Francis et al. | Apr 1991 | A |
5016752 | Haugen | May 1991 | A |
5039982 | Bruhwiler | Aug 1991 | A |
5076460 | Hussell | Dec 1991 | A |
5081446 | Gill et al. | Jan 1992 | A |
5085322 | Lax | Feb 1992 | A |
D324337 | Brady | Mar 1992 | S |
5103978 | Secor | Apr 1992 | A |
5145068 | Schmitz et al. | Sep 1992 | A |
5147034 | Broadhead et al. | Sep 1992 | A |
5161907 | Byrne | Nov 1992 | A |
5191983 | Hardy | Mar 1993 | A |
5193371 | Yamane | Mar 1993 | A |
5195595 | Nakagawa | Mar 1993 | A |
5205401 | Weisburn et al. | Apr 1993 | A |
5205405 | O'Brien et al. | Apr 1993 | A |
5209086 | Bruhwiler | May 1993 | A |
5211283 | Weisburn et al. | May 1993 | A |
5213209 | Song | May 1993 | A |
5215188 | Wittman | Jun 1993 | A |
5219417 | O'Brien et al. | Jun 1993 | A |
5236081 | Fitzsimmons et al. | Aug 1993 | A |
5244085 | Lammerant et al. | Sep 1993 | A |
5249677 | Lim | Oct 1993 | A |
5250801 | Grozinger | Oct 1993 | A |
5251750 | Gelardi et al. | Oct 1993 | A |
5253751 | Wipper | Oct 1993 | A |
5259498 | Weisburn et al. | Nov 1993 | A |
5285918 | Weisburn et al. | Feb 1994 | A |
D347320 | Du Corday | May 1994 | S |
5359809 | Johnson | Nov 1994 | A |
5360107 | Chasin et al. | Nov 1994 | A |
5366074 | O'Brien et al. | Nov 1994 | A |
5368162 | Holmgren | Nov 1994 | A |
5375712 | Weisburn | Dec 1994 | A |
5377825 | Sykes et al. | Jan 1995 | A |
5377827 | Roth et al. | Jan 1995 | A |
5384103 | Miller | Jan 1995 | A |
5390515 | Essick | Feb 1995 | A |
5400902 | Kaminski | Mar 1995 | A |
5417324 | Joyce et al. | May 1995 | A |
D358961 | Lax | Jun 1995 | S |
5460266 | Mundorf et al. | Oct 1995 | A |
5462159 | Roth et al. | Oct 1995 | A |
5494156 | Nies | Feb 1996 | A |
5499714 | Konno | Mar 1996 | A |
5505299 | Ditzig et al. | Apr 1996 | A |
5515968 | Taniyama | May 1996 | A |
5524752 | Mazzucchelli | Jun 1996 | A |
5526926 | Deja | Jun 1996 | A |
5528914 | Nguyen et al. | Jun 1996 | A |
5529182 | Anderson et al. | Jun 1996 | A |
5533619 | Ziegler | Jul 1996 | A |
5551559 | Roth et al. | Sep 1996 | A |
5551560 | Weisburn et al. | Sep 1996 | A |
5586651 | Krummenacher | Dec 1996 | A |
5588315 | Holmgren | Dec 1996 | A |
5593030 | Tell | Jan 1997 | A |
5593031 | Uchida | Jan 1997 | A |
5597068 | Weisburn et al. | Jan 1997 | A |
5598728 | Lax | Feb 1997 | A |
5601188 | Dressen et al. | Feb 1997 | A |
5609249 | Cheng | Mar 1997 | A |
5626225 | Joyce, Jr. | May 1997 | A |
5636535 | Shimada | Jun 1997 | A |
5636737 | Marsilio | Jun 1997 | A |
5653335 | Bauer et al. | Aug 1997 | A |
5660274 | Chien | Aug 1997 | A |
5662218 | Ladwig | Sep 1997 | A |
5680782 | Komatsu et al. | Oct 1997 | A |
5685425 | Choi | Nov 1997 | A |
5685427 | Kuitems et al. | Nov 1997 | A |
5690224 | Koizumi | Nov 1997 | A |
5697496 | Bauer | Dec 1997 | A |
5717533 | Poplawski et al. | Feb 1998 | A |
5727680 | Liu | Mar 1998 | A |
5730283 | Lax | Mar 1998 | A |
5760689 | Holmgren | Jun 1998 | A |
5762187 | Belden, Jr. et al. | Jun 1998 | A |
5768922 | Lax | Jun 1998 | A |
5769217 | Derraugh et al. | Jun 1998 | A |
5769218 | Yabe | Jun 1998 | A |
5772028 | Marsilio et al. | Jun 1998 | A |
5775491 | Taniyama | Jul 1998 | A |
5775500 | Williams | Jul 1998 | A |
5777884 | Belka et al. | Jul 1998 | A |
5782348 | Burdett | Jul 1998 | A |
5782350 | Weisburn et al. | Jul 1998 | A |
5788068 | Fraser et al. | Aug 1998 | A |
5799784 | Bosworth | Sep 1998 | A |
5823341 | Nakasuji | Oct 1998 | A |
5829582 | Ippolito et al. | Nov 1998 | A |
5829584 | Raucci, Jr. | Nov 1998 | A |
5839576 | Kim | Nov 1998 | A |
5850752 | Lax | Dec 1998 | A |
5887713 | Smith et al. | Mar 1999 | A |
5890590 | Doodson | Apr 1999 | A |
5896985 | Nakasuji | Apr 1999 | A |
5896986 | Bolognia et al. | Apr 1999 | A |
5899327 | Sykes | May 1999 | A |
5901840 | Nakasuji | May 1999 | A |
5904246 | Weisburn et al. | May 1999 | A |
5906275 | Jokic | May 1999 | A |
D411071 | Cerda-Vicedo | Jun 1999 | S |
5910770 | Ohara | Jun 1999 | A |
5918909 | Fiala et al. | Jul 1999 | A |
5931291 | Sedon et al. | Aug 1999 | A |
5931294 | Weingarden et al. | Aug 1999 | A |
5934114 | Weisburn et al. | Aug 1999 | A |
5941382 | Fantone et al. | Aug 1999 | A |
5944181 | Lau | Aug 1999 | A |
5944185 | Burdett et al. | Aug 1999 | A |
5950822 | Cloran et al. | Sep 1999 | A |
5960949 | Wynalda, Jr. | Oct 1999 | A |
5975298 | Sankey et al. | Nov 1999 | A |
5984388 | Bacon | Nov 1999 | A |
5988375 | Chang | Nov 1999 | A |
5988376 | Lax | Nov 1999 | A |
5996788 | Belden, Jr. et al. | Dec 1999 | A |
5996815 | Walters et al. | Dec 1999 | A |
6000541 | Yu | Dec 1999 | A |
6016909 | Chang | Jan 2000 | A |
D420240 | Sorenson et al. | Feb 2000 | S |
6021894 | Lakoski et al. | Feb 2000 | A |
D422445 | Markowitz | Apr 2000 | S |
6047821 | Hashimoto et al. | Apr 2000 | A |
6056117 | Courchesne | May 2000 | A |
6059102 | Gelardi et al. | May 2000 | A |
6065593 | Howerton et al. | May 2000 | A |
6065594 | Sankey et al. | May 2000 | A |
D426978 | Belden, Jr. et al. | Jun 2000 | S |
6085900 | Wong | Jul 2000 | A |
6092650 | Budnik | Jul 2000 | A |
6102200 | Dressen et al. | Aug 2000 | A |
D430424 | Belden, Jr. et al. | Sep 2000 | S |
6119857 | Stumpff | Sep 2000 | A |
6123192 | Rufo, Jr. | Sep 2000 | A |
6125668 | Belden, Jr. | Oct 2000 | A |
6135280 | Burdett | Oct 2000 | A |
6164445 | Cooper | Dec 2000 | A |
6170656 | Cerda-Vilaplana et al. | Jan 2001 | B1 |
D437520 | Choi | Feb 2001 | S |
6182480 | Kim | Feb 2001 | B1 |
6196384 | Belden, Jr. | Mar 2001 | B1 |
6222453 | Joyce | Apr 2001 | B1 |
6283280 | Wong et al. | Sep 2001 | B1 |
6354435 | Belden, Jr. et al. | Mar 2002 | B1 |
6374648 | Mitsuyama | Apr 2002 | B1 |
6398022 | Mou et al. | Jun 2002 | B1 |
6401920 | Gelardi | Jun 2002 | B2 |
6411215 | Shiner | Jun 2002 | B1 |
6412631 | Belden, Jr. | Jul 2002 | B2 |
6422387 | Sedon et al. | Jul 2002 | B1 |
6430976 | Mitsuyama | Aug 2002 | B1 |
6443300 | Gelardi et al. | Sep 2002 | B1 |
6474470 | Byrne et al. | Nov 2002 | B2 |
6474478 | Huehner et al. | Nov 2002 | B1 |
6516639 | Margetts et al. | Feb 2003 | B1 |
6516945 | Myszka et al. | Feb 2003 | B2 |
6523683 | Fraser et al. | Feb 2003 | B1 |
6561347 | Lax | May 2003 | B1 |
6581766 | Hui | Jun 2003 | B2 |
6598742 | Belden | Jul 2003 | B1 |
6601414 | Chang | Aug 2003 | B1 |
6601415 | Takinami | Aug 2003 | B2 |
6619079 | Cheung | Sep 2003 | B2 |
6651811 | Hai | Nov 2003 | B2 |
6669018 | Lau | Dec 2003 | B2 |
6675961 | Myszka et al. | Jan 2004 | B2 |
6675962 | Myszka et al. | Jan 2004 | B2 |
6675963 | Myszka | Jan 2004 | B2 |
7320235 | Belden | Jan 2008 | B2 |
7581419 | Belden | Sep 2009 | B2 |
7614265 | Belden | Nov 2009 | B2 |
20010000599 | Belden, Jr. | May 2001 | A1 |
20010035359 | Sedon et al. | Nov 2001 | A1 |
20020000111 | Belden, Jr. et al. | Jan 2002 | A1 |
20020003095 | Jaeb et al. | Jan 2002 | A1 |
20020011426 | Byrne et al. | Jan 2002 | A1 |
20020023853 | Lax et al. | Feb 2002 | A1 |
20020046963 | Belden, Jr. et al. | Apr 2002 | A1 |
20020050033 | Belden, Jr. et al. | May 2002 | A1 |
20020088851 | Hodes | Jul 2002 | A1 |
20020088855 | Hodes | Jul 2002 | A1 |
20020091573 | Hodes | Jul 2002 | A1 |
20020100702 | Belden, Jr. et al. | Aug 2002 | A1 |
20020129472 | Copen et al. | Sep 2002 | A1 |
20020139701 | Luckow | Oct 2002 | A1 |
20020170837 | Belden, Jr. et al. | Nov 2002 | A1 |
20030000856 | Lax | Jan 2003 | A1 |
20030000860 | Byrne | Jan 2003 | A1 |
20030004889 | Fiala et al. | Jan 2003 | A1 |
20030019770 | Hodes | Jan 2003 | A1 |
20030029816 | Huehner | Feb 2003 | A1 |
20030034259 | Lopez mas | Feb 2003 | A1 |
20030052023 | Gelardi | Mar 2003 | A1 |
20030080007 | Lau | May 2003 | A1 |
20030111367 | Lax et al. | Jun 2003 | A1 |
20030116455 | Marsilio et al. | Jun 2003 | A1 |
20030193883 | Parks | Oct 2003 | A1 |
20030234190 | Kuo | Dec 2003 | A1 |
20040031708 | Spagna | Feb 2004 | A1 |
20040040349 | Guttadauro et al. | Mar 2004 | A1 |
20040060834 | Farrar et al. | Apr 2004 | A1 |
20040129587 | Lax | Jul 2004 | A1 |
20060238280 | Libohova | Oct 2006 | A1 |
20060254326 | Lax | Nov 2006 | A1 |
20070245779 | Lax | Oct 2007 | A1 |
20080223177 | van Koot | Sep 2008 | A1 |
Number | Date | Country |
---|---|---|
1093055 | Oct 1994 | CN |
1143593 | Feb 1997 | CN |
2298586 | Nov 1998 | CN |
1215885 | May 1999 | CN |
3316802 | Nov 1984 | DE |
3923107 | Jan 1991 | DE |
297 22 209 | Feb 1998 | DE |
0142748 | May 1985 | EP |
0211088 | Feb 1987 | EP |
0308810 | Mar 1989 | EP |
0312172 | Apr 1989 | EP |
0 545 494 | Jun 1993 | EP |
0566403 | Oct 1993 | EP |
0616103 | Sep 1994 | EP |
0729897 | Sep 1996 | EP |
1 264 953 | Dec 2002 | EP |
2543421 | Oct 1984 | FR |
2608564 | Jun 1988 | FR |
2628250 | Sep 1989 | FR |
2628717 | Sep 1989 | FR |
2711311 | Apr 1995 | FR |
2715817 | Aug 1995 | FR |
2036697 | Jul 1980 | GB |
2079726 | Jan 1982 | GB |
2129779 | May 1984 | GB |
2351277 | Dec 2000 | GB |
2369348 | May 2002 | GB |
2371039 | Jul 2002 | GB |
62-241187 | Oct 1987 | JP |
07-291336 | Nov 1995 | JP |
9-132287 | May 1997 | JP |
10-116394 | May 1998 | JP |
10-194371 | Jul 1998 | JP |
11-035084 | Feb 1999 | JP |
11-147584 | Jun 1999 | JP |
11-301766 | Nov 1999 | JP |
2000-191076 | Jul 2000 | JP |
2000-191078 | Jul 2000 | JP |
2000-219288 | Aug 2000 | JP |
2000-237008 | Sep 2000 | JP |
2001-002101 | Jan 2001 | JP |
2001-019077 | Jan 2001 | JP |
2001-082013 | Mar 2001 | JP |
2001-163391 | Jun 2001 | JP |
2001-171776 | Jun 2001 | JP |
2001-213492 | Aug 2001 | JP |
2001-253487 | Sep 2001 | JP |
2001-301871 | Oct 2001 | JP |
2001-354286 | Dec 2001 | JP |
2002-046789 | Feb 2002 | JP |
2002-249190 | Sep 2002 | JP |
2003-118789 | Apr 2003 | JP |
1 003 965 | Mar 1998 | NL |
9015001 | Dec 1990 | WO |
9315294 | Aug 1993 | WO |
9939068 | Aug 1999 | WO |
0017877 | Mar 2000 | WO |
0017877 | Mar 2000 | WO |
0034954 | Jun 2000 | WO |
0034954 | Jun 2000 | WO |
WO 0131152 | May 2001 | WO |
0242587 | May 2002 | WO |
WO 2006063265 | Jun 2006 | WO |
Number | Date | Country | |
---|---|---|---|
20060116899 A1 | Jun 2006 | US |
Number | Date | Country | |
---|---|---|---|
60446386 | Feb 2003 | US | |
60487467 | Jul 2003 | US | |
60630452 | Nov 2004 | US | |
60644197 | Jan 2005 | US | |
60730585 | Oct 2005 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10776583 | Feb 2004 | US |
Child | 11285860 | US |