Systems and methods for monitoring and controlling remote devices

Abstract
Systems and methods for monitoring and controlling remote devices are provided. In an embodiment, a system can comprise one or more remotely controlled sensors and actuators. The remote sensors/actuators can interface with uniquely identified remote transceivers that transmit and/or receive data. The embodiment can also comprise a plurality of transceivers each having a unique address, and a controller adapted to communicate with at least one of the transceivers in a preformatted message. A sensor can be associated with at least one transceiver to detect a condition and output a data signal to the transceiver, and an actuator can be associated with a transceiver to receive a control signal and activate a device. Other embodiments are also claimed and described.
Description
TECHNICAL FIELD

The present invention generally relates to remotely operated systems, and more particularly to a system for monitoring, controlling and, reporting on remote systems utilizing radio frequency (RF) transmissions.


BACKGROUND

There are a variety of systems for monitoring and controlling manufacturing processes, inventory systems, and emergency control systems. Most automatic systems use remote sensors and controllers to monitor and automatically respond to system parameters to reach desired results. A number of control systems utilize computers to process sensor outputs, model system responses, and control actuators that implement process corrections within the system. For example, the electric power generation and metallurgical processing industries successfully control production processes by utilizing computer control systems.


Many environmental and safety systems require real-time monitoring. Heating, ventilation, and air-conditioning systems (HVAC), fire reporting and suppression systems, alarm systems, and access control systems utilize real-time monitoring, and often require immediate feedback and control.


A problem with expanding the use of control system technology is the cost of the sensor/actuator infrastructure required to monitor and control such systems. The typical approach to implementing control system technology includes installing a local network of hard sensor(s)/actuator(s) and a local controller. There are expenses associated with developing and installing the appropriate sensor(s)/actuator(s) and connecting functional sensor(s)/actuator(s) with the local controller. Another prohibitive cost of control systems is the installation and operational expenses associated with the local controller.



FIG. 1 sets forth a block diagram illustrating certain fundamental components of a prior art control system 100. The prior art control system 100 includes a plurality of sensor/actuators 111, 112, 113, 114, 115, 116, and 117 electrically and physically coupled to a local controller 110. Local controller 110 provides power, formats and applies data signals from each of the sensors to predetermined process control functions, and returns control signals as appropriate to the actuators. Often, prior art control systems are further integrated via the public switched telephone network (PSTN) 120 to a central controller 130. Central controller 130 can also serve as a technician monitoring station and/or forward alarm conditions via PSTN 120 to appropriate officials.


Prior art control systems similar to that of FIG. 1 require the development and installation of an application-specific local system controller. In addition, each local system requires the direct coupling of electrical conductors to each sensor and actuator to the local system controller. Such prior art control systems are typically augmented with a central controller 130 that may be networked to the local controller 110 via PSTN 120. As a result, prior art control systems often are susceptible to a single point of failure if the local controller 110 goes out of service. Also, appropriately wiring an existing industrial plant can be dangerous and expensive.


BRIEF SUMMARY OF THE INVENTION

The embodiments of present invention are directed to a system and method of monitoring and controlling remote devices. More specifically, the present system is directed to a system for monitoring and controlling remote devices by transmitting data between the remote systems and a gateway interface via a packet message protocol system.


A preferred embodiment can comprise one or more remote sensors to be read and one or more actuators to be remotely controlled. The remote sensor(s)/actuator(s) can interface with unique remote transceivers that transmit and/or receive data. If necessary in individual applications, signal repeaters may relay information between the transceiver(s) and the gateway interface. Communication links between the remote transceivers and the gateway interface are preferably wireless, but may also be implemented with a mixture of wireless and wired communication links.


To successfully communicate between the transceiver(s) and the gateway interface, a preferred embodiment of the present invention can receive a plurality of RF signal transmissions containing a packet protocol via a preferred embodiment of data structures that include sender and receiver identifiers, a description of the packet itself, a message number, commands, data, and an error detector. The data structure can be integrated with alternate data communication protocols for use with many other communication systems and networks. Also, a preferred embodiment of the present invention can be integrated into an existing control system using networked wireless transceivers. Distinct control signals from the pre-existing system can be mapped into the packet protocol enabling integration into a pre-existing control system easily and inexpensively.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a block diagram of a prior art control system.



FIG. 2 is a block diagram illustrating a monitoring/control system in accordance with a preferred embodiment of the present invention.



FIG. 3 is a block diagram illustrating a transceiver in accordance with a preferred embodiment of the present invention.



FIG. 4 is a block diagram illustrating a transmitter in accordance with a preferred embodiment of the present invention.



FIG. 5 is a block diagram illustrating a transceiver in accordance with a preferred embodiment of the present invention integrated with a sensor and an actuator.



FIG. 6 is a block diagram illustrating a local gateway in accordance with a preferred embodiment the present invention.



FIG. 7 is a table illustrating the message protocol in accordance with a preferred embodiment of the present invention.



FIG. 8 is a table illustrating various “to” addresses in accordance with a preferred embodiment of the present invention.



FIG. 9 illustrates three sample messages using a message protocol system in accordance with an embodiment of the present invention.





DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS


FIG. 2 sets forth a block diagram illustrating a preferred embodiment of a control system 200 in accordance with the present invention. The control system 200 can consist of one or more transceivers. An exemplary transceiver 205 can be integrated with a sensor 224 to form a first combination. A second transceiver 207 can be integrated with an actuator 222 to form a second combination. The transceivers 205, 207 are preferably wireless RF transceivers that are small and transmit a low-power-RF signal. As a result, in some applications, the transmission range of a given transceiver 205, 207 may be limited. As will be appreciated from the description that follows, this limited transmission range of the transceivers 205, 207 can be a desirable characteristic of the control system 200. Although the transceivers 205, 207 are depicted without user interfaces such as a keypad (not shown), the transceivers 205, 207 may be configured with user selectable buttons or an alphanumeric keypad (not shown). Often, the transceivers 205, 207 can be electrically interfaced with a sensor/actuator 222 such as a smoke detector, a thermostat, or a security system, where external buttons are not needed.


One or more specific types of RF transceivers can be used with the various embodiments of the present invention. For example, one RF transceiver that may be used is the TR1000, manufactured by RF Monolithics, Inc. The TR1000 hybrid transceiver is well suited for short range, wireless data applications where robust operation, small size, low power consumption, and low-cost are desired. All critical RF functions may be performed within a single hybrid semi-conductor chip, simplifying circuit design and accelerating the design-in process. The receiver section of the TR1000 is sensitive and stable. A wide dynamic range log detector, in combination with digital automatic gain control (AGC) provides robust performance in the presence of channel noise or interference. Two stages of surface acoustic wave (SAW) filtering provide excellent receiver out-of-band rejection. The TR100 includes provisions for both on-off keyed (OOK) and amplitude-shift key (ASK) modulation. The TR100 employs SAW filtering to suppress output harmonies, for compliance with FCC and other regulations.


Additional details of the TR1000 transceiver need not be described herein, because the present invention is not limited by the particular choice of transceiver. Indeed, numerous RF transceivers may be implemented in accordance with the teachings of the present invention. Such other transceivers may include other 900 MHz transceivers, as well as transceivers at other frequencies. In addition, infrared, ultrasonic, and other types of wireless transceivers may be employed. Further details of the TR1000 transceiver may be obtained through data sheets, application notes, design guides (e.g., the “ASH Transceiver Designers Guide”), and other publications.


The control system 200 can also include a plurality of stand-alone transceivers 211, 213, 215, and 221. Each of the stand-alone transceivers 211, 213, 215, and 221, and each of the integrated transceivers 212, 214, 216, 222, and 224 can receive an incoming RF transmission and transmit an outgoing signal. This outgoing signal may be a low-power-RF transmission signal, a high-power-RF transmission signal, or may be electric signals transmitted over a conductive wire, a fiber optic cable, or other transmission media. It will be appreciated by those skilled in the art that the integrated transceivers 212, 214, 216, 222, and 224 can be replaced by RF transmitters for applications that require continuous data collection only.


The local gateways 210 and 220 can receive remote data transmissions from one or more of the stand-alone transceivers 211, 213, 215, and 221, or one or more of the integrated transceivers 212, 214, 216, 222, and 224. The local gateways 210 and 220 can analyze the transmissions received, convert the transmissions into TCP/IP format, and further communicate the remote data signal transmissions via the WAN 230. The local gateways 210 and 220 may communicate information, service requests, and/or control signals to the remote integrated transceivers 212, 214, 216, 222, and 224, from the server 260, the laptop computer 240, and/or the workstation 250 across the WAN 230. The server 260 can be further networked with the database server 270 to record client specific data. Further information regarding the integration of embodiments of the present invention into the WAN 230 can be found in U.S. Pat. No. 6,891,838 application entitled, “System and Method for Monitoring and Controlling Residential Devices.”


It will be appreciated by those skilled in the art that if an integrated transceiver (either of 212, 214, 216, 222, and 224) is located sufficiently close to one of the local gateways 210 or 220 such that the integrated transceiver's outgoing signal can be received by a gateway, the outgoing signal need not be processed and repeated through one of the stand-alone transceivers 211, 213, 215, or 221.


A monitoring system constructed in accordance with the teachings of the present invention may be used in a variety of environments. In accordance with a preferred embodiment, a monitoring system 200 such as that illustrated in FIG. 2 may be employed to monitor and record utility usage by residential and industrial customers, to transfer vehicle diagnostics from an automobile via a RF transceiver integrated with the vehicle diagnostics bus to a local transceiver that further transmits the vehicle information through a local gateway onto a WAN, to monitor and control an irrigation system, or to automate a parking facility. Further information regarding these individual applications can be found in U.S. Pat. No. 6,891,838 entitled, “System and Method for Monitoring and Controlling Residential Devices.”


The integrated transceivers 212, 214, 215, 222, and 224 can have substantially identical construction (particularly with regard to their internal electronics), which provides a cost-effective implementation at the system level. Alternatively, the transceivers (integrated or stand-alone) can differ as known to one of ordinary skill in the art as necessitated by individual design constraints. Furthermore, a plurality of stand alone transceivers 211, 213, 215, and 221, which may be identical, can be disposed in such a way that adequate RF coverage is provided. Preferably, the stand-alone transceivers 211, 213, 215, and 221 may be dispersed sufficient that only one stand-alone transceiver will pick up a transmission from a given integrated transceiver 212, 214, 216, 222, and 224 (due in part to the low power transmission typically emitted by each transmitter).


In certain instances, however, two or more, stand-alone transceivers may pick up a single transmission. Thus, the local gateways 210 and 220 may receive multiple versions of the same data transmission from an integrated transceiver, but from different stand-alone transceivers. The local gateways 210 and 220 may utilize this information to triangulate or otherwise more particularly assess a location from which the common data transmission is originating. Due to the transmitting device identifier incorporated within the preferred protocol in the transmitted signal, duplicative transmissions (e.g., transmissions duplicated to more than one gateway or to the same gateway) may be ignored or otherwise appropriately handled.


The advantage of integrating a transceiver, as opposed to a one-way transmitter, with the sensor is the transceiver's ability to receive incoming control signals and to transmit data signals upon demand. The local gateways 210 and 220 may communicate with all system transceivers. Since the local gateways 210 and 220 can be permanently integrated with the WAN 230, the server 260 coupled to the WAN 230 can host application specific software. Further, the data monitoring and control devices of the present invention can be movable as necessary given that they remain within signal range of a stand-alone transceiver 211, 213, 215, or 221 that subsequently is within signal range of a local gateway 210, 220 interconnected through one or more networks to server 260. As such, small application specific transmitters compatible with control system 200 can be worn or carried. It will be appreciated that a person so equipped may be in communication with any device communicatively coupled with the WAN 230.


In one embodiment, the server 260 collects, formats, and stores client specific data from each of the integrated transceivers 212, 214, 216, 222, and 224 for later retrieval or access from the workstation 250 or the laptop 240. The workstation 250 or the laptop 240 can be used to access the stored information through a Web browser. In another embodiment, the server 260 may perform the additional functions of hosting application specific control system functions and replacing the local controller by generating required control signals for appropriate distribution via the WAN 230 and the local gateways 210, 220 to the system actuators. In another embodiment, clients may elect for proprietary reasons to host any control applications on their own WAN connected workstation. The database 270 and the server 260 may act solely as a data collection and reporting device with the client workstation 250 generating control signals for the system.


Reference is now made to FIG. 3, which is a block diagram illustrating certain functional blocks of a transceiver 340 that may be integrated with sensor 310 in accordance with a preferred embodiment of the present invention. For example, sensor 310 in its simplest form can be a two-state device, such as a smoke alarm. Alternatively, the sensor 310 may output a continuous range of values to the data interface 321 such as a thermometer. If the signal output from the sensor 310 is an analog signal, the data interface 321 may include an analog-to-digital converter (not shown) to convert signals output to the transceiver 340. Alternatively, a digital interface (communicating digital signals) may exist between the data interface 321 and each sensor 310.


The sensor 310 can be communicatively coupled with the RF transceiver 340. The RF transceiver 340 may comprise a RF transceiver controller 328, a data interface 321, a data controller 324, a transceiver identifier 326, and an antenna 328. As shown in FIG. 3, a data signal forwarded from the sensor 310 may be received at an input port of the data interface 321. The data interface 321 may be configured to receive the data signal. In those situations where the data interface has received an analog data signal, the data interface 321 may be configured to convert the analog signal into a digital signal before forwarding a digital representation of the data signal to the data controller 324.


In accordance with a preferred embodiment, each transceiver 340 may be configured with a unique transceiver identification 326 that uniquely identifies the RF transceiver 340. The transceiver identification 326 may be programmable, and implemented an EPROM. Alternatively, the transceiver identification 326 may be set and/or configured through a series of dual inline package (DIP) switches. Additional implementations of the transceiver identification 326, whereby the number may also be set and/or configured as desired, may be implemented.


The unique transceiver identification 326 coupled with a function code for a sensor “on” condition can be formatted by data controller 324 for transformation into the RF signal 330 by RF transmitter 328 and transmission via antenna 323.


While the unique transceiver address can be varied, it is preferably a six-byte address. The length of the address can be varied as necessary given individual design constraints. This data packet 330 communicated from transceiver 340 will readily distinguish from similar signals generated by other transceivers in the system.


Of course, additional and/or alternative configurations may also be provided by a similarly configured transceiver. For example, a similar configuration may be provided for a transceiver that is integrated into, for example, a carbon monoxide detector, or a door position sensor. Alternatively, system parameters that vary across a range of values may be transmitted by transceiver 340 as long as data interface 321 and data controller 324 are configured to apply a specific code that is consistent with the input from sensor 310. As long as the code was understood by the server 260 or workstation 250, the target parameter can be monitored by the embodiments of the present invention.


Reference is now made to FIG. 4. FIG. 4 is a block diagram illustrating a transmitter in accordance with a preferred embodiment of the present invention. The sensor 400 may be coupled to the RF transmitter 410. The RF transmitter 410 may comprise a transmitter controller 405, a data interface 420, a data controller 425, a transmitter identification 430, and an antenna 440. The data signal forwarded from the sensor 400 may be received at an input port of the data interface 420. The data interface 420 may be configured to receive the data signal. In those situations where the data interface 420 has received an analog data signal, the data interface 420 may be configured to convert the analog signal into a digital signal before forwarding a digital representation of the data signal to the data controller 425.


Each transmitter/transceiver 410 may be configured with a unique transmitter identification 430 that uniquely identifies the RF transmitter 410. The transmitter identification number 430 may be programmable, and implemented with an EPROM. Alternatively, the transmitter identification 430 may be set and/or configured through a series of dual inline package (DIP) switches. Additional implementations of the transmitter identification 430, whereby the identification may be set and/or configured as desired, may also be implemented.


The data controller 425 may be configured to receive both a data signal from the data interface 420 and the transmitter identification 430. The data controller 425 may be configured to format (e.g., concatenate) both data portions into a composite information signal. The composite information signal may be forwarded to the transmitter controller 415 which can then transmit the encoded RF signal from the sensor 400 via a packet message protocol system. The transmitter controller 415 may convert information from digital electronic form into a format, frequency, and voltage level suitable for transmission from antenna 440. The transmitter identification 430 can be set for a given transmitter 410. When received by the application server 260 (FIG. 2), the transmitter identification 430 may be used to access a look-up table that identifies, for example, the location, the system, and the particular parameter assigned to that particular transmitter. Additional information about the related system may also be provided within the lookup table, with particular functional codes associated with a corresponding condition or parameter, such as but not limited to, an appliance operating cycle, a power status, a temperature, a position, and other information.



FIG. 5 sets forth a block diagram of the transceiver 500 integrated with a sensor 510 and an actuator 520 in accordance with a preferred embodiment of the present invention. Here, the data interface 525 is shown with a single input from the sensor 510. It is easy to envision a system that may include multiple sensor inputs. The RF transceiver 500 may comprise a transceiver controller 530, a data interface 525, a data controller 535, a transceiver identification 540, and an antenna 550. The data signal forwarded from the sensor 510 may be received at an input/output port of the data interface 525. The data interface 525 may be configured to receive the data signal and transmit a command signal. In those situations where the data interface 525 has received an analog data signal, the data interface 525 may be configured to convert the analog signal into a digital signal before forwarding a digital representation of the data signal to the data controller 525. Similarly, when the data controller 535 forwards a digital representation of a command signal, the data interface 525 may be configured to translate the digital command signal into an analog voltage suitable to drive the actuator 520.


In accordance with a preferred embodiment, each RF transceiver 500 may be configured with a unique transceiver identification 540 that uniquely identifies the RF transceiver 500. The transceiver identification 540 may be set or configured as described above.


The data controller 535 may be configured to receive both a data signal from the data interface 525 and the transceiver identification number 540. The data controller 535 may also receive one or more data signals from other RF communication devices. As previously described, the data controller 535 may be configured to format (e.g., concatenate) both data signal portions originating at the RF transceiver 500 into a composite information signal which may also include data information from other closely located RF communication devices. The composite information signal may be forwarded to a transceiver controller 530, which may be configured to transmit the encoded RF data signals via the packet messaging system. It will be appreciated that the transceiver controller 530 may convert information from digital electronic form into a format, frequency, and voltage level suitable for transmission from the antenna 550.


For example, a common home heating and cooling system might be integrated with an embodiment of the present invention. The home heating system may include multiple data interface inputs from multiple sensors. A home thermostat control connected with the home heating system could be integrated with a sensor that reports the position of a manually adjusted temperature control (i.e., temperature set value) and a sensor integrated with a thermister to report an ambient temperature. The condition of related parameters can be sent to the data interface 525 as well as including the condition of the system on/off switch, the climate control mode selected (i.e., heat, fan, or AC). In addition, depending upon the specific implementation, other system parameters may be provided to data interface 525 as well.


The addition of the actuator 520 to the integrated transceiver 500 permits the data interface 525 to apply signals to the manual temperature control for the temperature set point, the climate control mode switch, and the system on/off switch. This, a remote workstation 250 or a laptop 240 with WAN access (see FIG. 2) could control a home heating system from a remote location.


Again, each of these various input sources can be routed to the data interface 525, which provides the information to the data controller 535. The data controller 535 may utilize a look up table to access unique function codes that are communicated in the data packet 560, along with a transceiver identification code 540, to the local gateway and further onto the WAN. In general, the operation of RF transceiver 500 will be similar to that described above.


The various RF communication devices illustrated and described may be configured with a number of optional power supply configurations. For example, a personal mobile transceiver may be powered by a replaceable battery. Similarly, a stand-alone RF transceiver repeater may be powered by a replaceable battery that may be supplemented and/or periodically charged via a solar panel. These power supply circuits, therefore, may differ from RF communication device to RF communication device depending upon the remote system monitored, the related actuators to be controlled, the environment, and the quality of service level required. Those skilled in the art will appreciate and understand how to meet the power requirements of the various RF communication devices. As a result, it is not necessary to further describe a power supply suitable for each RF communication device and each application in order to appreciate the concepts and teachings of the present invention.


Having illustrated and described the operation of the various combinations of RF communication devices with the various sensors 114 and sensor actuators 112 consistent with the present invention, reference is now made to FIG. 6. FIG. 6 is a block diagram further illustrating a local gateway 600 in accordance with a preferred embodiment of the present invention. A local gateway 600 may comprise an antenna 610, an RF transceiver 615, a central processing unit (CPU) 620, a memory 625, a network card 630, a digital subscriber line (DSL) modem 635, and an integrated services digital network (ISDN) interface card 640. The local gateway 600 can also include many other components not illustrated in FIG. 6, capable of enabling a terminal control protocol Internet protocol (TCP/IP) connection to the WAN 130.


The RF transceiver 615 may be configured to receive incoming RF signal transmissions via an antenna 610. Each of the incoming RF signal transmissions can be consistently formatted in the convention previously described. The local gateway 600 may also be configured such that the memory 625 includes a look-up table 650 that may assist in identifying the various remote and intermediate RF communication devices used in generating and transmitting the received data transmission as illustrated in memory sectors 650 and 660 herein labeled, “Identify Remote Transceiver” and “Identify Intermediate Transceiver,” respectively. Programmed or recognized codes within the memory 625 may also be provided and configured for controlling the operation of a CPU 620 to carry out the various functions that are orchestrated and/or controlled by the local gateway 600. For example, the memory 625 may include program code for controlling the operation of the CPU 625 to evaluate an incoming data packet to determine what action needs to be taken. One or more look-up tables 650 may also be stored within the memory 625 to assist in this process. Furthermore, the memory 625 may be configured with program code to identify a remote RF transceiver 655 or identify an intermediate RF transceiver 660. Function codes, RF transmitter and/or RF transceiver identification numbers may all be stored with associated information in the look-up tables 650.


Thus, one look-up table 650 may be provided to associate transceiver identifications with a particular user. Another look-up table 650 may be used to associate function codes with the interpretation thereof. For example, a unique code may be associated by a look-up table 650 to identify functions such as test, temperature, smoke alarm active, or security system breach. In connection with the lookup table(s) 650, the memory 625 may also include a plurality of code segments that are executed by the CPU 620, which may control operation of the gateway 600. For example, a first data packet segment 665 may be provided to access a first lookup table to determine the identity of the RF transceiver 625, which transmitted the received message. A second code segment may be provided to access a second lookup table to determine the proximate location of the message generating RF transceiver 600, by identifying the RF transceiver 600 that relayed the message. A third code segment may be provided to identify the content of the message transmitted. Namely, is it a fire alarm, a security alarm, an emergency request by a person, or a temperature control setting. Additional, fewer, or different code segments may be provided to carry out different functional operations and data signal transfers.


The local gateway 600 may also include one or more mechanisms to facilitate network based communication with remote computing devices. For example, the gateway 600 may include a network card 630, which may allow the gateway 600 to communicate across a local area network to a network server, which in turn may contain a backup gateway 110 to the WAN 645. Alternatively, the local gateway 600 may contain a DSL modem 635, which may be configured to provide a link to a remote computing system, by way of the PSTN. In yet another alternative, the local gateway 600 may include an ISDN card 640 configured to communicate via an ISDN connection with a remote system. Other communication interfaces may be provided as well to serve as primary and or backup links to the WAN 645 or to local area networks that might serve to permit local monitoring of local gateway 600 health and data packet control.


For each of the remote devices to communicate, there needs to be a standard enabling each device to understand a message. FIG. 7 sets forth a format of a data packet protocol in accordance with a preferred embodiment of the present invention. All messages transmitted within the system consist of a “to” address 700, a “from” address 710, a packet number 720, a number of packets in a transmission 730, a packet length 740, a message number 750, a command number 760, any data 770, and a check sum error detector (CKH 780 and CKL 790).


The “to” address 700 can indicate the intended recipient of the packet. This address can be scalable from one to six bytes based upon the size and complexity of the system. By way of example, the “to” address 700 can indicate a general message to all transceivers, to only the stand-alone transceivers, or to an individual integrated transceiver. In a six byte “to” address, the first byte indicates the transceiver type to all transceivers, to some transceivers, or a specific transceiver. The second byte can be the identification base, and bytes three through six can be used for the unique transceiver address (either stand-alone or integrated). The “to” address 700 can be scalable from one byte to six bytes depending upon the intended recipient(s).


The “from” address 710 can be a the six-byte unique transceiver address of the transceiver originating the transmission. The “from” address 710 can be the address of the controller when the controller requests data, or this can be the address of the integrated transceiver when the integrated transceiver sends a response to a request for information to the controller.


The packet number 720, the packet maximum 730, and the packet length 740 can be used to concatenate messages that are greater than 128 bytes. The packet maximum 730 can indicate the number of packets in the message. The packet number 720 may be used to indicate a packet sequence number for a multiple-packet message.


The message number 750 can be originally assigned by the controller. Messages originating from the controller can be assigned an even number. Responses to the controller can be the original message number plus one, rendering the responding message number odd. The controller can then increment the message number 750 by two for each new originating message. This enables the controller to coordinate the incoming responses to the appropriate command message.


The next section is the command byte 760 that requests data from the receiving device as necessary. There can be two types of commands: device specific and not device specific. Device specific commands can control a specific device such as a data request or a change in current actuator settings. A number of commands are not device specific. Such commands are for example, but not limited to, a ping, an acknowledge, a non-acknowledgement, downstream repeat, upstream repeat, read status, emergency message, and a request for general data, among others. General data may include a software version number, the number of power failures, and/or the number of resets.


The data 770 section may contain data as requested by a specific command. The requested data can be many values. By way of example, test data can be encoded in ASCII (American Standard Code for Information Interchange) or many other encoding systems. The data section of a single packet can be scalable up to 109 bytes. When the requested data exceeds 109 bytes, the integrated transceiver can divide the data into appropriate number of sections and concatenates the series of packets for one message using the packet identifiers as discussed above.


The checksum sections 780, 790 can be used to detect errors in the transmissions. In one embodiment, any error can be detected via cyclic redundancy check sum methodology. This methodology divides the message as a large binary number by the generating polynomial (in this case, CRC-16). The remainder of this division is then sent with the message as the checksum. The receiver then calculates a checksum using the same methodology and compares the two checksums. If the checksums do not match, the packet or message will be ignored. While this error detection methodology is preferred, many other error detection systems can be used.


In one embodiment of this invention, this system can be implemented via an RF link at a basic rate of 4,800 bits per second (bps) with a data rate of 2,400 bps. All the data can be encoded in the Manchester format such that a high to low transition at the bit center point represents a logic zero and a low to high transition represents a logic one. Other RF formats can be used depending upon individual design constraints. For example, a quadrature phase shift encoding method could be used, enabling the control system to communicate via hexadecimal instead of binary.


While the message indicates specific byte length for each section, only the order of the specific information within the message is constant. The byte position number in individual transmissions can vary because of the scalability of the “to” address, the command byte, and the scalability of the data.


The message can further include a preface and a postscript (not shown). The preface and postscripts are not part of the message body, but rather serve to synchronize the control system and to frame each packet of the message. The packet begins with the preface and ends with a postscript. The preface can be a series of twenty-four logic ones followed by two bit times of high voltage with no transition. The first byte of the packet can then follow immediately. The postscript will be a transition of the transmit data line from a high voltage to a low voltage, if necessary. It is less desirable to not leave the transmit data line high after the message is sent.



FIG. 8 sets forth a preferred embodiment of the “to” address byte assignment in accordance with an embodiment of the present invention. As shown in FIG. 8, the “to” address consists of six bytes. The first byte (Byte 1) can indicate the device type. The second byte (Byte 2) can indicate the manufacturer or the owner. The third byte (Byte 3) can be a further indication of the manufacturer or owner. The fourth byte (Byte 4) can either indicate that the message is for all devices, or that the message is for a particular device. If the message is for all devices, the fourth byte can be a particular code. If the message is for a particular device, the fourth, fifth, and sixth bytes (Byte 5 and Byte 6) can be a unique identifier for the particular devices.


Having described a general message structure in accordance with an embodiment of the present invention, reference is made to FIG. 9. FIG. 9 illustrates three sample messages. The first message 910 illustrates the broadcast of an emergency message “FF” from a central server with an address “0012345678” to a integrated transceiver with an address of “FF.”


The second message 920 illustrates how the first message might be sent to a stand-alone transceiver. Emergency message “FF” from a central server with address “00123456578” can be first sent to stand-alone transceiver “FO.” The second message contains additional command data “A000123456” that may be used by the system to identify further transceivers to send the signal through on the way to the destination device.


The third message 930 illustrated in FIG. 9 illustrates how the message protocol of the present invention may be used to “ping” a remote transceiver to determine transceiver health. For example, source unit “E112345678” may originate a ping request by sending command “08” to a transceiver identified as “A012345678.” The response to the ping request can be as simple as reversing the “to address” and the “from address” of the command such that a healthy receiver will send a ping message back to the originating device. A system in accordance with a preferred embodiment of the present invention may be configured to expect a return ping within a specific time period. Operators of the present invention could use the delay between the ping request and the ping response to model system loads and to determine if specific system parameters might be adequately monitored and controlled with the expected feedback transmission delay of the system.


Returning to FIG. 2, the local gateway 210 can act as a local communications master in a system, such as system 200. With the exception of emergency messages, the local gateway 210 usually initiates communications with any remote transceivers (either stand-alone 211, 213, 215, 221 or integrated 212, 214, 216, 224). The remote transceivers then respond based upon the command received in the message. In general, the local gateway 210 expects a response to all messages sent to any of the remote transceivers 211, 212, 213, 214, 215, 216, 221, and 225.


To acknowledge a message, any of the remote transceivers 211, 212, 213, 214, 215, 216, 221, 224 can send one of two messages: a positive acknowledgement or a negative acknowledgement. The positive acknowledgement may have two forms. When the message is between the local gateway 210 or a stand-alone transceiver 211, 213, 215, 221 and another stand-alone transceiver 211, 213, 215, 221, the acknowledgement can be a re-send the original message with no changes. The second form is for a message sent from the local gateway 210 stand-alone transceiver 211, 213, 215, 221 to a integrated transceiver 212, 214, 216, 224. In this case, the positive acknowledgement can be a message containing the requested data.


Emergency messages are preferably the only messages initiated by the integrated transceivers 212, 214, 216, 224. To accommodate receiving any emergency messages, the local gateway 210 may dedicate one-half of every ten-second period to receive emergency messages. During these time periods, the local gateway 210 may not transmit messages other than acknowledgements to any emergency messages. The integrated transceivers 212, 214, 216, 224 may detect the period of silence, and in response, may then transmit the emergency message.


There are typically two forms of emergency messages: from personal safety/security transceiver(s) and from permanently installed safety/security transceiver(s). In the first case of the personal transceiver, the emergency message can consist of a predetermined “to” address and an odd, random number. In response to this emergency message, the local gateway 210 can acknowledge during a silent period. The personal transceiver can then repeat the same emergency message. The local gateway 210 can then forward the emergency message on to the WAN 230 in the normal manner.


Upon receipt of the local gateway 210 acknowledgement, the personal transceiver can reset itself. If no acknowledgement is received within a predetermined time period, the personal transceiver may continue to re-transmit the original emergency message until acknowledged by the local gateway 210 for a predetermined number of re-transmissions.


In the second case, the permanently installed safety/security transceiver (212) may send one message to the local gateway 210 during a time out period. The emergency message can be transmitted to a predetermined address other than the emergency address for personal transceivers.


The foregoing description has illustrated certain fundamental concepts of the invention, and other additions and/or modifications may be made consistent with the inventive concepts. For example, the one-way transmitters may be adapted to continuously monitor the current status of water, gas, and other utility meters. One-way transmitters might further be used to monitor and report actual operational hours on rental equipment or any other apparatus that must be serviced or monitored on an actual run-time schedule.


The transceivers of the current invention may be adapted to monitor and apply control signals in an unlimited number of applications. For example, two-way transceivers of the current invention can be adapted for use with pay-type-publicly-located telephones, cable television set converter boxes, and a host of residential appliances and devices enabling a remote controllable home automation and security system. For example, building automation systems, fire control systems, alarm systems, industrial trash compactors, and building elevators can be monitored and controlled with devices consistent with the present invention. In addition, courier drop boxes, time clock systems, automated teller machines, self-service copy machines, and other self-service devices can be monitored and controlled as appropriate. By way of further example, a number of environment variables that require monitoring can be integrated with the system of the present invention to permit remote monitoring and control. For instance, light levels in the area adjacent to automated teller machines must meet minimum federal standards. Also, the water volume transferred by water treatment plant pumps, smokestack emissions from a coal burning power plant or a coke fueled steel plant oven can be remotely monitored.


In a geographic area appropriately networked with permanently located stand-alone transceivers consistent with the embodiments of the invention, personal transceivers can be used to monitor and control personnel access and egress from specific rooms or portions within a controlled facility. Personal transceivers can also be configured to transfer personal information to public emergency response personnel, to transfer personal billing information to vending machines, or to monitor individuals within an assisted living community.


The transceivers using the packet message protocol of the present invention may be further integrated with a voice-band transceiver. As a result, when a person presses, for example, the emergency button on a transmitter, medical personnel, staff members, or others may respond by communicating via two-way radio with the person. Each transceiver may be equipped with a microphone and a speaker enabling a person to communication information such as their present emergency situation or their specific location.


The foregoing description has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the inventions to the precise embodiments disclosed. Obvious modifications or variations are possible in light of the above teachings. For example, the transceiver can be permanently integrated into an alarm sensor or other stationary device within a system, and the control system server and/or local gateway could be configured to identify the transceiver location by the transceiver identification number alone. It will be appreciated that, in embodiments that do not utilize stand-alone transceivers, the transceivers will be configured to transmit at a high RF power level to effectively communicate with the control system local gateway.


It will be appreciated by those skilled in the art that the information transmitted and received by the wireless transceivers of the present invention may be further integrated with other data transmission protocols for transmission across telecommunications and computer networks. In addition, it should be further appreciated that telecommunications and computer networks can function as a transmission path between the networked wireless transceivers, the local gateways, and the central server.


While the various embodiments of this invention have been described in detail with particular reference to exemplary embodiments, those skilled in the art will understand that variations and modifications can be effected within the scope of the invention as defined in the appended claims. Accordingly, the scope of the various embodiments of the present invention should not be limited to the above discussed embodiments, and should only be defined by the following claims and all applicable equivalents.

Claims
  • 1. In a communication system to communicate command and sensed data between remote devices, the system comprising: a receiver address comprising a scalable address of at least one remote device;a command indicator comprising a command code;a data value comprising a scalable message; anda controller associated with a remote wireless device comprising a transceiver configured to send and receive wireless signals, the remote device configured to send a preformatted message comprising the receiver address, a command indicator, and the data value via the transceiver to at least one other remote device.
  • 2. The system of claim 1, further comprising: a plurality of transceivers each having a unique address, the transceiver being one of the plurality of transceivers;a plurality of controllers associated with each the controller associated with at least one of the transceivers, the controller being in communication with at least one other transceiver with a preformatted message, the preformatted message having at least one scalable field;at least one sensor associated with at least one of the transceivers to detect a condition and output a data signal to the transceiver; andat least one actuator associated with at least one of the transceivers to activate a device.
  • 3. The system of claim 1, wherein the controller sends the preformatted message via an associated transceiver, and at least one transceiver sends the preformatted response message.
  • 4. The system of claim 1, wherein at least one transceiver receives the preformatted message requesting sensed data, confirms the receiver address as its own unique address, receives a sensed data signal, formats the sensed data signal into scalable byte segments, determines the number of segments required to contain the sensed data signal, and generates and transmits the preformatted response message comprising at least one packet.
  • 5. The system of claim 4, wherein the packet further comprises: a preface having a predetermined sequence including a first logic level and a subsequent sequence comprising at least two bytes of a second logic level; anda postscript having a low voltage output.
  • 6. The system of claim 1, wherein each remote device is adapted to transmit and receive radio frequency transmissions to and from at least one other transceiver.
  • 7. The system of claim 1, wherein the preformatted message comprises Manchester encoding.
  • 8. A method of communicating command and sensed data between remote wireless devices, the method comprising: providing a receiver to receive at least one message;wherein the message has a packet that comprises a command indicator comprising a command code, a scalable data value comprising a scalable message, and an error detector that is a redundancy check error detector; andproviding a controller to determine if at least one received message is a duplicate message and determining a location from which the duplicate message originated.
  • 9. The method of claim 8, further comprising providing at least one remote wireless communication device, wherein at least one of the devices comprise geographically remote transceivers adapted to transmit and receive the at least one message using radio frequency transmissions.
  • 10. The method of claim 8, further comprising providing at least one remote wireless communication device, wherein at least one of the devices has a unique address and the packet further comprises at least one scalable address field to contain the unique address for at least one device.
  • 11. The method of claim 8, further comprising providing an actuator associated with at least one of the remote devices, the actuator configured to actuate in response to the command code.
  • 12. The method of claim 8, further comprising sending at least one message via Manchester type encoding.
  • 13. The method of claim 8, further comprising determining if an error exists in a packet of the at least one message.
  • 14. A wireless communication device for use in a communication system to communicate command and sensed data between remote wireless communication devices, the wireless communication device comprising: a transceiver configured to send and receive wireless communications; anda controller configured to communicate with at least one other remote wireless device via the transceiver with a preformatted message, the controller further configured to format a message comprising a receiver address comprising a scalable address of at least one remote wireless device; a command indicator comprising a command code; a data value comprising a scalable message.
  • 15. The wireless communication device of claim 14, further comprising at least one sensor configured to detect a condition and output a signal to the controller.
  • 16. The wireless communication device of claim 14, wherein the controller is further configured to determine if at least one received message is a duplicate message and determine a location from which the duplicate message originated.
  • 17. The wireless communication device of claim 14, further comprising at least one actuator configured to implement an action corresponding to the command code.
  • 18. The device of claim 14, wherein the transceiver comprises a unique transceiver address to distinguish the transceiver from other transceivers.
  • 19. In a system for communicating commands and sensed data between remote devices comprising a communications device for communicating commands and sensed data, the communications device comprising: a transceiver operatively configured to be in communication with at least one other of a plurality of transceivers, wherein the transceiver has a unique address, wherein the unique address identities the individual transceiver, wherein the transceiver is geographically remote from the other of the plurality of transceivers, wherein each transceiver communicates with each of the other transceivers via preformatted messages;a controller configured to be in communication with the transceiver, the controller configured to provide preformatted messages for communication; wherein the preformatted messages comprises at least one packet, wherein the packet comprises: a receiver address comprising a scalable address of the at least one of the intended receiving transceivers; sender address comprising the unique address of the sending transceiver; a command indicator comprising a command code; at least one data value comprising a scalable message; and an error detector comprising a redundancy check error detector; and wherein the controller is configured to interact with the transceiver to send preformatted command messages.
  • 20. The communications device of claim 19, further comprising a sensor operatively configured to detect a condition and output a sensed data signal that corresponds to the condition to the transceiver.
  • 21. The communications device of claim 20, wherein the transceiver is configured to receive a preformatted command message requesting sensed data, confirms the receiver address as its own unique address, receives the sensed data signal, formats the sensed data signal into scalable byte segments, determines a number of segments required to contain the sensed data signal, and generates and transmits the preformatted response message comprising at least one packet.
  • 22. In a system for controlling geographically diverse devices from a central location, a communications device comprising: means for dynamically sending and receiving messages, wherein the sent messages comprise commands and the received messages comprise responses to the commands, wherein the message comprises at least one means for packeting a message;a means for communicating information, the communicating means comprising: means for receiving messages; means for preparing responses to the received message; and means for sending the response message; wherein each communicating means has a unique identifying address;and wherein the packeting means comprises: means for identifying intended recipients; means for identifying a sender; means for indicating a command; means for data transfer; means for indicating potential error; means for indicating a byte length of a packet; means for indicating a total number of packets in a message; means for identifying a message; means for alerting a recipient to an incoming packet; and means for indicating an end of a packet.
  • 23. The communications device of claim 21, wherein the means for communicating information is further configured to encode messages via Manchester encoding.
  • 24. The communication device of claim 23, wherein the means for indicating potential error is configured to detect if an error exists in a packet or a number of packets of at least one message.
  • 25. A wireless communication device for use in a communication system to communicate a number of commands and sensed data between remote wireless communication devices, the wireless communication device comprising: a transceiver configured to send and receive wireless communications; anda controller configured to communicate with at least one other remote wireless device via the transceiver with a preformatted message, the controller further configured to reformat a message comprising a receiver address comprising a scalable address of at least one remote wireless device; a command indicator comprising a command code; a data value comprising a scalable message.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 09/812,044, filed Mar. 19, 2001, and entitled “System and Method for Monitoring and Controlling Remote Devices”, now U.S. Pat. No. 6,914,893. U.S. patent application Ser. No. 09/812,044 is a continuation-in-part of: U.S. patent application Ser. No. 09/704,150, filed Nov. 1, 2000, and entitled “System and Method for Monitoring and Controlling Residential Devices”, now U.S. Pat. No. 6,891,838; U.S. patent application Ser. No. 09/271,517, filed Mar. 18, 1999, and entitled, “System For Monitoring Conditions in a Residential Living Community”, now abandoned; U.S. patent application Ser. No. 09/439,059, filed Nov. 12, 1999, and entitled, “System and Method for Monitoring and Controlling Remote Devices”, now U.S. Pat. No. 6,437,692; U.S. patent application Ser. No. 09/102,178, filed Jun. 22, 1998, and entitled, “Multi-Function General Purpose Transceiver”, now U.S. Pat. No. 6,430,268; U.S. patent application Ser. No. 09/172,554, filed Oct. 14, 1998, and entitled, “System for Monitoring the Light Level Around an ATM”, now U.S. Pat. No. 6,028,522; and U.S. patent application Ser. No. 09/412,895, filed Oct. 5, 1999, and entitled, “System and Method for Monitoring the Light Level Around an ATM”, now 6,218,953. U.S. patent application Ser. No. 09/812,044 also claims the benefit of U.S. Provisional Application Ser. No. 60/224,043, filed Aug. 9, 2000, and entitled “SOS OEA Packet Message Protocol (RF)”. Each of the above-identified applications are hereby incorporated by reference in their entireties as if fully set forth below.

US Referenced Citations (593)
Number Name Date Kind
3665475 Gram May 1972 A
3705385 Batz Dec 1972 A
3723876 Seaborn, Jr. Mar 1973 A
3742142 Martin Jun 1973 A
3848231 Wooten Nov 1974 A
3892948 Constable Jul 1975 A
3906460 Halpern Sep 1975 A
3914692 Seaborn, Jr. Oct 1975 A
3922492 Lumsden Nov 1975 A
3925763 Wadwhani et al. Dec 1975 A
4025315 Mazelli May 1977 A
4056684 Lindstrom Nov 1977 A
4058672 Crager et al. Nov 1977 A
4083003 Haemmig Apr 1978 A
4120452 Kimura et al. Oct 1978 A
4124839 Cohen Nov 1978 A
4135181 Bogacki et al. Jan 1979 A
4204195 Bogacki May 1980 A
4213119 Ward et al. Jul 1980 A
4277837 Stuckert Jul 1981 A
4278975 Kimura et al. Jul 1981 A
4322842 Martinez Mar 1982 A
4354181 Spletzer Oct 1982 A
4396910 Enemark et al. Aug 1983 A
4396915 Farnsworth et al. Aug 1983 A
4417450 Morgan, Jr. et al. Nov 1983 A
4436957 Mazza Mar 1984 A
4446454 Pyle May 1984 A
4446458 Cook May 1984 A
4454414 Benton Jun 1984 A
4468656 Clifford et al. Aug 1984 A
4488152 Arnason et al. Dec 1984 A
4495496 Miller, III Jan 1985 A
4551719 Carlin et al. Nov 1985 A
4611198 Levinson et al. Sep 1986 A
4621263 Takenaka et al. Nov 1986 A
4630035 Stahl et al. Dec 1986 A
4631357 Grunig Dec 1986 A
4670739 Kelly, Jr. Jun 1987 A
4692761 Robinton Sep 1987 A
4707852 Jahr et al. Nov 1987 A
4731810 Watkins Mar 1988 A
4742296 Petr et al. May 1988 A
4757185 Onishi Jul 1988 A
4788721 Krishnan et al. Nov 1988 A
4800543 Lyndon-James et al. Jan 1989 A
4825457 Lebowitz Apr 1989 A
4829561 Matheny May 1989 A
4849815 Streck Jul 1989 A
4851654 Nitta Jul 1989 A
4856046 Steck et al. Aug 1989 A
4857912 Everett, Jr. et al. Aug 1989 A
4875231 Hara et al. Oct 1989 A
4884123 Morris et al. Nov 1989 A
4897644 Hirano Jan 1990 A
4906828 Halpern Mar 1990 A
4908769 Vaughan et al. Mar 1990 A
4918690 Markkula, Jr. et al. Apr 1990 A
4918995 Pearman et al. Apr 1990 A
4928299 Tansky et al. May 1990 A
4939726 Flammer et al. Jul 1990 A
4940976 Gastouniotis et al. Jul 1990 A
4949077 Mbuthia Aug 1990 A
4952928 Carroll et al. Aug 1990 A
4962496 Vercellotti et al. Oct 1990 A
4967366 Kaehler Oct 1990 A
4968970 LaPorte Nov 1990 A
4968978 Stolarczyk Nov 1990 A
4972504 Daniel, Jr. et al. Nov 1990 A
4973957 Shimizu et al. Nov 1990 A
4973970 Reeser Nov 1990 A
4977612 Wilson Dec 1990 A
4980907 Raith et al. Dec 1990 A
4989230 Gillig et al. Jan 1991 A
4991008 Nama Feb 1991 A
4993059 Smith et al. Feb 1991 A
4998095 Shields Mar 1991 A
4999607 Evans Mar 1991 A
5007052 Flammer Apr 1991 A
5032833 Laporte Jul 1991 A
5038372 Elms et al. Aug 1991 A
5055851 Sheffer Oct 1991 A
5057814 Onan et al. Oct 1991 A
5061997 Rea et al. Oct 1991 A
5079768 Flammer Jan 1992 A
5086391 Chambers Feb 1992 A
5091713 Horne et al. Feb 1992 A
5111199 Tomoda et al. May 1992 A
5113183 Mizuno et al. May 1992 A
5113184 Katayama May 1992 A
5115224 Kostusiak et al. May 1992 A
5115433 Baran et al. May 1992 A
5124624 de Vries et al. Jun 1992 A
5128855 Hilber et al. Jul 1992 A
5130519 Bush et al. Jul 1992 A
5130987 Flammer Jul 1992 A
5131038 Puhl et al. Jul 1992 A
5134650 Blackmon Jul 1992 A
5136285 Okuyama Aug 1992 A
5155481 Brennan, Jr. et al. Oct 1992 A
5159317 Brav Oct 1992 A
5162776 Bushnell et al. Nov 1992 A
5177342 Adams Jan 1993 A
5189287 Parienti Feb 1993 A
5191192 Takahira et al. Mar 1993 A
5191326 Montgomery Mar 1993 A
5193111 Matty et al. Mar 1993 A
5195018 Kwon et al. Mar 1993 A
5197095 Bonnet et al. Mar 1993 A
5200735 Hines Apr 1993 A
5204670 Stinton Apr 1993 A
5212645 Wildes et al. May 1993 A
5216502 Katz Jun 1993 A
5221838 Gutman et al. Jun 1993 A
5223844 Mansell et al. Jun 1993 A
5231658 Eftechiou Jul 1993 A
5235630 Moody et al. Aug 1993 A
5239294 Flanders et al. Aug 1993 A
5239575 White et al. Aug 1993 A
5241410 Streck et al. Aug 1993 A
5243338 Brennan, Jr. et al. Sep 1993 A
5245633 Schwartz et al. Sep 1993 A
5251205 Callon et al. Oct 1993 A
5252967 Brennan et al. Oct 1993 A
5253167 Yoshida et al. Oct 1993 A
5265150 Helmkamp et al. Nov 1993 A
5265162 Bush et al. Nov 1993 A
5266782 Alanara et al. Nov 1993 A
5272747 Meads Dec 1993 A
5282204 Shpancer et al. Jan 1994 A
5282250 Dent et al. Jan 1994 A
5289165 Belin Feb 1994 A
5291516 Dixon et al. Mar 1994 A
5295154 Meier et al. Mar 1994 A
5305370 Kearns et al. Apr 1994 A
5309501 Kozik et al. May 1994 A
5315645 Matheny May 1994 A
5317309 Vercellotti et al. May 1994 A
5319364 Waraksa et al. Jun 1994 A
5319698 Glidwell et al. Jun 1994 A
5319711 Servi Jun 1994 A
5323384 Norwood et al. Jun 1994 A
5325429 Kurgan Jun 1994 A
5329394 Calvani et al. Jul 1994 A
5331318 Montgomery Jul 1994 A
5334974 Simms et al. Aug 1994 A
5335265 Cooper et al. Aug 1994 A
5343493 Karimullah Aug 1994 A
5345231 Koo et al. Sep 1994 A
5345595 Johnson et al. Sep 1994 A
5347263 Carroll et al. Sep 1994 A
5354974 Eisenberg Oct 1994 A
5355278 Hosoi et al. Oct 1994 A
5355513 Clarke et al. Oct 1994 A
5365217 Toner Nov 1994 A
5371736 Evan Dec 1994 A
5382778 Takahira et al. Jan 1995 A
5383134 Wrzesinski Jan 1995 A
5390206 Rein Feb 1995 A
5406619 Akhteruzzman et al. Apr 1995 A
5412192 Hoss May 1995 A
5412760 Peitz May 1995 A
5416475 Tolbert et al. May 1995 A
5416725 Pacheco et al. May 1995 A
5418812 Reyes et al. May 1995 A
5420910 Rudokas et al. May 1995 A
5424708 Ballestry et al. Jun 1995 A
5432507 Mussino et al. Jul 1995 A
5438329 Gastouniotis et al. Aug 1995 A
5439414 Jacob Aug 1995 A
5440545 Buchholz et al. Aug 1995 A
5442553 Parrillo Aug 1995 A
5445287 Center et al. Aug 1995 A
5445347 Ng Aug 1995 A
5451929 Adelman et al. Sep 1995 A
5451938 Brennan, Jr. Sep 1995 A
5452344 Larson Sep 1995 A
5454024 Lebowitz Sep 1995 A
5465401 Thompson Nov 1995 A
5467074 Pedtke Nov 1995 A
5467082 Sanderson Nov 1995 A
5467345 Cutler, Jr. et al. Nov 1995 A
5468948 Koenck et al. Nov 1995 A
5471201 Cerami et al. Nov 1995 A
5473322 Carney Dec 1995 A
5475689 Kay et al. Dec 1995 A
5481259 Bane Jan 1996 A
5481532 Hassan et al. Jan 1996 A
5484997 Haynes Jan 1996 A
5488608 Flammer, III Jan 1996 A
5493273 Smurlo et al. Feb 1996 A
5493287 Bane Feb 1996 A
5502726 Fischer Mar 1996 A
5506837 Sollner et al. Apr 1996 A
5509073 Monnin Apr 1996 A
5513244 Joao et al. Apr 1996 A
5515419 Sheffer May 1996 A
5517188 Caroll et al. May 1996 A
5522089 Kikinis et al. May 1996 A
5528215 Siu et al. Jun 1996 A
5539825 Akiyama et al. Jul 1996 A
5541938 Di Zenzo et al. Jul 1996 A
5542100 Hatakeyama Jul 1996 A
5544036 Brown, Jr. et al. Aug 1996 A
5544784 Malaspina Aug 1996 A
5548632 Walsh et al. Aug 1996 A
5550358 Tait et al. Aug 1996 A
5550359 Bennett Aug 1996 A
5550535 Park Aug 1996 A
5553094 Johnson et al. Sep 1996 A
5555258 Snelling et al. Sep 1996 A
5555286 Tendler Sep 1996 A
5562537 Zver et al. Oct 1996 A
5565857 Lee Oct 1996 A
5568535 Sheffer et al. Oct 1996 A
5570084 Ritter et al. Oct 1996 A
5572438 Ehlers et al. Nov 1996 A
5573181 Ahmed Nov 1996 A
5574111 Brichta et al. Nov 1996 A
5583850 Snodgrass et al. Dec 1996 A
5587705 Morris Dec 1996 A
5589878 Cortjens et al. Dec 1996 A
5590038 Pitroda Dec 1996 A
5590179 Shincovich et al. Dec 1996 A
5592491 Dinkins Jan 1997 A
5594431 Sheppard et al. Jan 1997 A
5596719 Ramakrishnan et al. Jan 1997 A
5602843 Gray Feb 1997 A
5604414 Milligan et al. Feb 1997 A
5604869 Mincher et al. Feb 1997 A
5606361 Davidsohn et al. Feb 1997 A
5608786 Gordon Mar 1997 A
5613620 Center et al. Mar 1997 A
5615277 Hoffman Mar 1997 A
5619192 Ayala Apr 1997 A
5625410 Washino et al. Apr 1997 A
5628050 McGraw et al. May 1997 A
5629687 Sutton et al. May 1997 A
5629875 Adair, Jr. May 1997 A
5630209 Wizgall et al. May 1997 A
5631554 Briese et al. May 1997 A
5636216 Fox et al. Jun 1997 A
5640002 Ruppert et al. Jun 1997 A
5644294 Ness Jul 1997 A
5655219 Jusa et al. Aug 1997 A
5657389 Houvener Aug 1997 A
5659300 Dresselhuys et al. Aug 1997 A
5659303 Adair, Jr. Aug 1997 A
5668876 Falk et al. Sep 1997 A
5673252 Johnson et al. Sep 1997 A
5673304 Connor et al. Sep 1997 A
5673305 Ross Sep 1997 A
5682139 Pradeep et al. Oct 1997 A
5682476 Tapperson et al. Oct 1997 A
5689229 Chaco et al. Nov 1997 A
5699328 Ishizaki et al. Dec 1997 A
5701002 Oishi et al. Dec 1997 A
5702059 Chu et al. Dec 1997 A
5704046 Hogan Dec 1997 A
5704517 Lancaster, Jr. Jan 1998 A
5706191 Bassett et al. Jan 1998 A
5706976 Purkey Jan 1998 A
5708223 Wyss Jan 1998 A
5708655 Toth et al. Jan 1998 A
5712619 Simkin Jan 1998 A
5712980 Beeler et al. Jan 1998 A
5714931 Petite et al. Feb 1998 A
5717718 Roswell et al. Feb 1998 A
5719564 Sears Feb 1998 A
5726634 Hess et al. Mar 1998 A
5726984 Kubler et al. Mar 1998 A
5732074 Spaur et al. Mar 1998 A
5732078 Arango Mar 1998 A
5736965 Mosebrook et al. Apr 1998 A
5740232 Pailles et al. Apr 1998 A
5742509 Goldberg et al. Apr 1998 A
5745849 Britton Apr 1998 A
5748104 Argyroudis et al. May 1998 A
5748619 Meier May 1998 A
5754111 Garcia May 1998 A
5754227 Fukuoka May 1998 A
5757783 Eng et al. May 1998 A
5757788 Tatsumi et al. May 1998 A
5761083 Brown, Jr. et al. Jun 1998 A
5764742 Howard et al. Jun 1998 A
5767791 Stoop et al. Jun 1998 A
5771274 Harris Jun 1998 A
5774052 Hamm et al. Jun 1998 A
5781143 Rossin Jul 1998 A
5790644 Kikinis Aug 1998 A
5790662 Valerij et al. Aug 1998 A
5790938 Talarmo Aug 1998 A
5796727 Harrison et al. Aug 1998 A
5798964 Shimizu et al. Aug 1998 A
5801643 Williams et al. Sep 1998 A
5815505 Mills Sep 1998 A
5818822 Thomas et al. Oct 1998 A
5822273 Bary et al. Oct 1998 A
5822544 Chaco et al. Oct 1998 A
5825772 Dobbins et al. Oct 1998 A
5826195 Westerlage et al. Oct 1998 A
5828044 Jun et al. Oct 1998 A
5832057 Furman Nov 1998 A
5838223 Gallant et al. Nov 1998 A
5838237 Revell et al. Nov 1998 A
5838812 Pare, Jr. et al. Nov 1998 A
5841118 East et al. Nov 1998 A
5841764 Roderique et al. Nov 1998 A
5842976 Williamson Dec 1998 A
5844808 Konsmo et al. Dec 1998 A
5845230 Lamberson Dec 1998 A
5852658 Knight et al. Dec 1998 A
5854994 Canada et al. Dec 1998 A
5862201 Sands Jan 1999 A
5864772 Alvarado et al. Jan 1999 A
5873043 Comer Feb 1999 A
5874903 Shuey et al. Feb 1999 A
5880677 Lestician Mar 1999 A
5883886 Eaton et al. Mar 1999 A
5884184 Sheffer Mar 1999 A
5884271 Pitroda Mar 1999 A
5886333 Miyake Mar 1999 A
5889468 Banga Mar 1999 A
5892690 Boatman et al. Apr 1999 A
5892758 Argyroudis Apr 1999 A
5892924 Lyon et al. Apr 1999 A
5896097 Cardozo Apr 1999 A
5897607 Jenney et al. Apr 1999 A
5898369 Godwin Apr 1999 A
5905438 Weiss et al. May 1999 A
5907291 Chen et al. May 1999 A
5907491 Canada et al. May 1999 A
5907540 Hayashi May 1999 A
5907807 Chavez, Jr. et al. May 1999 A
5914672 Glorioso et al. Jun 1999 A
5914673 Jennings et al. Jun 1999 A
5917405 Joao Jun 1999 A
5917629 Hortensius et al. Jun 1999 A
5923269 Shuey et al. Jul 1999 A
5926103 Petite Jul 1999 A
5926529 Hache et al. Jul 1999 A
5926531 Petite Jul 1999 A
5933073 Shuey Aug 1999 A
5941363 Partyka et al. Aug 1999 A
5941955 Wilby et al. Aug 1999 A
5948040 DeLorme et al. Sep 1999 A
5949779 Mostafa et al. Sep 1999 A
5949799 Grivna et al. Sep 1999 A
5953319 Dutta et al. Sep 1999 A
5953371 Roswell et al. Sep 1999 A
5955718 Levasseur et al. Sep 1999 A
5960074 Clark Sep 1999 A
5963146 Johnson et al. Oct 1999 A
5963452 Etoh et al. Oct 1999 A
5963650 Simionescu et al. Oct 1999 A
5966658 Kennedy, III et al. Oct 1999 A
5969608 Sojdehei et al. Oct 1999 A
5973756 Erlin Oct 1999 A
5974236 Sherman Oct 1999 A
5978364 Melnik Nov 1999 A
5978371 Mason, Jr. et al. Nov 1999 A
5986574 Colton Nov 1999 A
5987421 Chuang Nov 1999 A
5991625 Vanderpool Nov 1999 A
5991639 Rautiola et al. Nov 1999 A
5994892 Turino et al. Nov 1999 A
5995592 Shirai et al. Nov 1999 A
5995593 Cho Nov 1999 A
5997170 Brodbeck Dec 1999 A
5999094 Nilssen Dec 1999 A
6005759 Hart et al. Dec 1999 A
6005963 Bolle et al. Dec 1999 A
6021664 Granato et al. Feb 2000 A
6023223 Baxter, Jr. Feb 2000 A
6026095 Sherer et al. Feb 2000 A
6028522 Petite Feb 2000 A
6028857 Poor Feb 2000 A
6031455 Grube et al. Feb 2000 A
6032197 Birdwell et al. Feb 2000 A
6035213 Tokuda et al. Mar 2000 A
6035266 Williams et al. Mar 2000 A
6036086 Sizer, II et al. Mar 2000 A
6038491 McGarry et al. Mar 2000 A
6044062 Brownrigg et al. Mar 2000 A
6054920 Smith et al. Apr 2000 A
6060994 Chen May 2000 A
6061604 Russ et al. May 2000 A
6064318 Kirchner, III et al. May 2000 A
6067017 Stewart et al. May 2000 A
6067030 Burnett et al. May 2000 A
6069886 Ayerst et al. May 2000 A
6073169 Shuey et al. Jun 2000 A
6073266 Ahmed et al. Jun 2000 A
6073840 Marion Jun 2000 A
6075451 Lebowitz et al. Jun 2000 A
6078251 Landt et al. Jun 2000 A
6087957 Gray Jul 2000 A
6088659 Kelley et al. Jul 2000 A
6094622 Hubbard et al. Jul 2000 A
6100817 Mason, Jr. et al. Aug 2000 A
6101427 Yang Aug 2000 A
6101445 Alvarado et al. Aug 2000 A
6108614 Lincoln et al. Aug 2000 A
6112983 D'Anniballe et al. Sep 2000 A
6115580 Chuprun et al. Sep 2000 A
6119076 Williams et al. Sep 2000 A
6121593 Mansbery et al. Sep 2000 A
6121885 Masone et al. Sep 2000 A
6124806 Cunningham et al. Sep 2000 A
6127917 Tuttle Oct 2000 A
6128551 Davis et al. Oct 2000 A
6130622 Hussey et al. Oct 2000 A
6133850 Moore Oct 2000 A
6137423 Glorioso et al. Oct 2000 A
6140975 Cohen Oct 2000 A
6141347 Shaughnessy et al. Oct 2000 A
6150936 Addy Nov 2000 A
6150955 Tracy et al. Nov 2000 A
6157464 Bloomfield et al. Dec 2000 A
6157824 Bailey Dec 2000 A
6163276 Irving et al. Dec 2000 A
6172616 Johnson et al. Jan 2001 B1
6174205 Madsen et al. Jan 2001 B1
6175922 Wang Jan 2001 B1
6177883 Jennetti et al. Jan 2001 B1
6181255 Crimmins et al. Jan 2001 B1
6181284 Madsen et al. Jan 2001 B1
6181981 Varga et al. Jan 2001 B1
6188354 Soliman et al. Feb 2001 B1
6192390 Berger et al. Feb 2001 B1
6198390 Schlager et al. Mar 2001 B1
6199068 Carpenter Mar 2001 B1
6208266 Lyons et al. Mar 2001 B1
6215404 Morales Apr 2001 B1
6218953 Petite Apr 2001 B1
6218958 Eichstaedt Apr 2001 B1
6218983 Kerry et al. Apr 2001 B1
6219409 Smith et al. Apr 2001 B1
6229439 Tice May 2001 B1
6233327 Petite May 2001 B1
6234111 Ulman et al. May 2001 B1
6236332 Conkright et al. May 2001 B1
6243010 Addy et al. Jun 2001 B1
6246677 Nap et al. Jun 2001 B1
6246886 Olivia Jun 2001 B1
6249516 Brownrigg et al. Jun 2001 B1
6259369 Monico Jul 2001 B1
6275707 Reed et al. Aug 2001 B1
6286756 Stinson et al. Sep 2001 B1
6288634 Weiss et al. Sep 2001 B1
6288641 Carsais Sep 2001 B1
6295291 Larkins Sep 2001 B1
6301514 Canada et al. Oct 2001 B1
6304556 Haas Oct 2001 B1
6305602 Grabowski et al. Oct 2001 B1
6308111 Koga Oct 2001 B1
6311167 Davis et al. Oct 2001 B1
6314169 Schelberg, Jr. et al. Nov 2001 B1
6317029 Fleeter Nov 2001 B1
6334117 Covert et al. Dec 2001 B1
6351223 DeWeerd et al. Feb 2002 B1
6356205 Salvo et al. Mar 2002 B1
6357034 Muller et al. Mar 2002 B1
6362745 Davis Mar 2002 B1
6363057 Ardalan et al. Mar 2002 B1
6366217 Cunningham et al. Apr 2002 B1
6366622 Brown et al. Apr 2002 B1
6369769 Nap et al. Apr 2002 B1
6370489 Williams et al. Apr 2002 B1
6373399 Johnson et al. Apr 2002 B1
6380851 Gilbert et al. Apr 2002 B1
6384722 Williams May 2002 B1
6393341 Lawrence et al. May 2002 B1
6393381 Williams et al. May 2002 B1
6393382 Williams et al. May 2002 B1
6396839 Ardalan et al. May 2002 B1
6400819 Nakano et al. Jun 2002 B1
6401081 Montgomery et al. Jun 2002 B1
6405018 Reudink et al. Jun 2002 B1
6411889 Mizunuma et al. Jun 2002 B1
6415245 Williams et al. Jul 2002 B2
6421354 Godlewski Jul 2002 B1
6421731 Ciotti, Jr. et al. Jul 2002 B1
6422464 Terranova Jul 2002 B1
6424270 Ali Jul 2002 B1
6424931 Sigmar et al. Jul 2002 B1
6430268 Petite Aug 2002 B1
6431439 Suer et al. Aug 2002 B1
6437692 Petite et al. Aug 2002 B1
6438575 Khan et al. Aug 2002 B1
6445291 Addy et al. Sep 2002 B2
6456960 Williams et al. Sep 2002 B1
6457038 Defosse Sep 2002 B1
6462644 Howell et al. Oct 2002 B1
6462672 Besson Oct 2002 B1
6477558 Irving et al. Nov 2002 B1
6483290 Hemminger et al. Nov 2002 B1
6484939 Blaeuer Nov 2002 B1
6489884 Lamberson et al. Dec 2002 B1
6491828 Sivavec et al. Dec 2002 B1
6492910 Ragle et al. Dec 2002 B1
6504357 Hemminger et al. Jan 2003 B1
6507794 Hubbard et al. Jan 2003 B1
6509722 Lopata Jan 2003 B2
6519568 Harvey et al. Feb 2003 B1
6538577 Ehrke et al. Mar 2003 B1
6542076 Joao Apr 2003 B1
6542077 Joao Apr 2003 B2
6543690 Leydier et al. Apr 2003 B2
6560223 Egan et al. May 2003 B1
6574603 Dickson et al. Jun 2003 B1
6584080 Ganz et al. Jun 2003 B1
6600726 Nevo et al. Jul 2003 B1
6608551 Anderson et al. Aug 2003 B1
6618578 Petite Sep 2003 B1
6618709 Sneeringer Sep 2003 B1
6628764 Petite Sep 2003 B1
6628965 LaRosa et al. Sep 2003 B1
6653945 Johnson et al. Nov 2003 B2
6654357 Wiedeman Nov 2003 B1
6671586 Davis et al. Dec 2003 B2
6674403 Gray et al. Jan 2004 B2
6678255 Kuriyan Jan 2004 B1
6678285 Garg Jan 2004 B1
6731201 Bailey et al. May 2004 B1
6735630 Gelvin et al. May 2004 B1
6747557 Petite et al. Jun 2004 B1
6771981 Zalewski et al. Aug 2004 B1
6804532 Moon et al. Oct 2004 B1
6816088 Knoska et al. Nov 2004 B1
6888876 Mason, Jr. et al. May 2005 B1
6891838 Petite May 2005 B1
6914533 Petite Jul 2005 B2
6914893 Petite Jul 2005 B2
6959550 Freeman et al. Nov 2005 B2
7027416 Kriz Apr 2006 B1
7054271 Brownrigg et al. May 2006 B2
7227927 Benedyk et al. Jun 2007 B1
20010002210 Petite May 2001 A1
20010003479 Fujiwara Jun 2001 A1
20010021646 Antonucci et al. Sep 2001 A1
20010024163 Petite Sep 2001 A1
20010034223 Rieser et al. Oct 2001 A1
20010038343 Meyer et al. Nov 2001 A1
20020002444 Williams et al. Jan 2002 A1
20020013679 Petite Jan 2002 A1
20021112323 Petite Jan 2002
20020019725 Petite Feb 2002 A1
20020027504 Petite et al. Mar 2002 A1
20020031101 Petite Mar 2002 A1
20020032746 Lazaridis Mar 2002 A1
20020061031 Sugar et al. May 2002 A1
20020072348 Wheeler et al. Jun 2002 A1
20020089428 Walden et al. Jul 2002 A1
20020095399 Devine et al. Jul 2002 A1
20020098858 Struhsaker Jul 2002 A1
20020109607 Cumeralto et al. Aug 2002 A1
20020136233 Chen et al. Sep 2002 A1
20020158774 Johnson et al. Oct 2002 A1
20020163442 Fischer Nov 2002 A1
20020169643 Petite Nov 2002 A1
20020193144 Belski et al. Dec 2002 A1
20030001754 Johnson et al. Jan 2003 A1
20030023146 Shusterman Jan 2003 A1
20030028632 Davis Feb 2003 A1
20030030926 Aguren et al. Feb 2003 A1
20030034900 Han Feb 2003 A1
20030035438 Larsson Feb 2003 A1
20030036822 Davis et al. Feb 2003 A1
20030046377 Daum et al. Mar 2003 A1
20030058818 Wilkes et al. Mar 2003 A1
20030069002 Hunter et al. Apr 2003 A1
20030073406 Benjamin et al. Apr 2003 A1
20030078029 Petite Apr 2003 A1
20030093484 Petite May 2003 A1
20030133473 Manis et al. Jul 2003 A1
20030169710 Fan et al. Sep 2003 A1
20030185204 Murdock Oct 2003 A1
20030210638 Yoo Nov 2003 A1
20040047324 Diener Mar 2004 A1
20040053639 Petite Mar 2004 A1
20040131125 Sanderford, Jr. et al. Jul 2004 A1
20040133917 Schilling Jul 2004 A1
20040183687 Petite Sep 2004 A1
20040228330 Kubler et al. Nov 2004 A1
20050190055 Petite Sep 2005 A1
20050195768 Petite Sep 2005 A1
20050195775 Petite Sep 2005 A1
20050201397 Petite Sep 2005 A1
20060098576 Brownrigg et al. May 2006 A1
20080186898 Petite Jul 2008 A1
20090006617 Petite Jan 2009 A1
20090068947 Petite Dec 2009 A1
Foreign Referenced Citations (43)
Number Date Country
0718954 Jun 1996 EP
07144 Feb 1998 EP
1096454 May 2001 EP
2817110 May 2002 FR
2229302 Sep 1990 GB
2247761 Mar 1992 GB
2262683 Jun 1993 GB
2297663 Aug 1996 GB
2310779 Sep 1997 GB
2326002 Dec 1998 GB
2336272 Oct 1999 GB
2352004 Jan 2001 GB
2352590 Jan 2001 GB
60261288 Dec 1985 JP
01255100 Oct 1989 JP
11353573 Dec 1999 JP
200113590 Apr 2000 JP
2001063425 Mar 2001 JP
2001088401 Apr 2001 JP
2001309069 Nov 2001 JP
2001319284 Nov 2001 JP
2001357483 Dec 2001 JP
2002007672 Jan 2002 JP
2002007826 Jan 2002 JP
2002085354 Mar 2002 JP
2002171354 Jun 2002 JP
2001025431 Apr 2001 KR
WO 9013197 Nov 1990 WO
9524177 Sep 1995 WO
WO 9800056 Jan 1998 WO
WO9810393 Mar 1998 WO
WO 9837528 Aug 1998 WO
WO 9913426 Mar 1999 WO
0023956 Apr 2000 WO
WO0036812 Jun 2000 WO
WO 0115114 Mar 2001 WO
WO 0124109 Apr 2001 WO
WO 0208725 Jan 2002 WO
WO 0208866 Jan 2002 WO
WO 02052521 Jul 2002 WO
WO 03007264 Jan 2003 WO
WO 03021877 Mar 2003 WO
04002014 Dec 2003 WO
Related Publications (1)
Number Date Country
20050243867 A1 Nov 2005 US
Provisional Applications (1)
Number Date Country
60224043 Aug 2000 US
Continuations (1)
Number Date Country
Parent 09812044 Mar 2001 US
Child 11159768 US
Continuation in Parts (6)
Number Date Country
Parent 09704150 Nov 2000 US
Child 09812044 US
Parent 09439059 Nov 1999 US
Child 09704150 US
Parent 09412895 Oct 1999 US
Child 09439059 US
Parent 09271517 Mar 1999 US
Child 09412895 US
Parent 09172554 Oct 1998 US
Child 09271517 US
Parent 09102178 Jun 1998 US
Child 09172554 US