throbber
(12)
`
`United States Patent
`Austerman, III et al.
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 6,650,622 B1
`Nov. 18,2003
`
`US006650622B1
`
`(54)
`
`(75)
`
`SYSTEM FOR COMMUNICATING WITH
`ELECTRONIC EQUIPMENT
`
`Inventors: John F. Austerman, III, Huntington
`Woods, MI (US); Marshall B.
`Cummings, Troy, MI (US)
`
`(73)
`
`Assignee: ChriMar Systems, Inc., Farmington
`Hills, MI (US)
`
`(*)
`
`Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(21)
`(22)
`
`Appl. No.: 09/370,430
`Filed:
`Aug. 9, 1999
`
`(63)
`(60)
`
`(51)
`(52)
`(58)
`
`(56)
`
`Related US. Application Data
`
`Continuation-in-part of application No. PCT/US99/07846,
`?led on Apr. 8, 1999.
`Provisional application No. 60/081,279, ?led on Apr. 10,
`1998.
`
`Int. Cl.7 ........................ .. H04L 12/12; G08B 13/14
`US. Cl. ................................... .. 370/241; 340/568.1
`Field of Search ............................... .. 370/527, 252,
`370/241, 242, 445, 446, 419, 420, 421,
`463, 426; 340/5682, 568.4, 568.1, 571,
`572.1, 687, 573.4, 573.1, 505, 506; 375/222
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`3,359,379 A 12/1967 Pullum et al.
`3,407,400 A 10/1968 Lurie ....................... .. 340/517
`3,408,643 A 10/1968 Sliman
`. 340/568.1
`3,537,095 A 10/1970 Cones
`..... .. 340/517
`3,696,378 A 10/1972 Daniel ................... .. 340/568.2
`3,794,989 A
`2/1974 Manley et al. ............ .. 340/517
`3,863,036 A
`1/ 1975 McCrudden
`3,932,857 A
`1/1976 Way et al. ............. .. 340/568.2
`4,121,201 A 10/1978 Weathers
`4,156,799 A
`5/1979 Cave
`4,230,912 A 10/1980 Lee et al.
`4,273,955 A
`6/1981 Armstrong .............. .. 178/69 G
`
`7/1982 SbuelZ ..................... .. 370/250
`4,340,788 A
`1/1985 McCune
`4,495,494 A
`(List continued on neXt page.)
`FOREIGN PATENT DOCUMENTS
`
`9/1996
`WO 96/29638
`SE
`3/1997
`WO 97/09667
`SE
`1/ 1996
`WO PCT/IB96/00223
`OTHER PUBLICATIONS
`“Integrated Services Digital Network (ISDN)”, International
`Telecommunication Union, vol. III, Fascicle 1118, pp.
`175—176 and 204—209 (Nov. 14—25, 1988).
`Track—It for Windows, 3 pages.
`Visual Audit Pro, 2 pages.
`(List continued on neXt page.)
`Primary Examiner—Chau Nguyen
`Assistant Examiner—Soon-Dong Hyun
`(74) Attorney, Agent, or Firm—Harness, Dickey & Pierce,
`P.L.C.
`(57)
`
`ABSTRACT
`
`In accordance with the teachings of the present invention, a
`communication system (17) is provided for generating and
`monitoring data over pre-eXisting conductors (2A—2D)
`between associated pieces of networked computer equip
`ment (3A—3D). The system includes a communication
`device (12) attached to the electronic equipment that trans
`mits information to a central module (15) by impressing a
`low frequency signal on the pre-eXisting data lines of the
`remotely located equipment. A receiver (6) in the central
`module (15) monitors the low frequency data on the data
`lines to determine the transmitted information of the elec
`tronic equipment. The communication device may also be
`powered by a low current power signal from the central
`module (15). The power signal to the communication device
`may also be ?uctuated to provide useful information, such as
`status information, to the communication device. Relocation
`of the electronic equipment with attached communication
`device to another location on the network is detected imme
`diately and may be used to update a database. This invention
`is particularly adapted to be used with an existing Ethernet
`communications link or equivalents thereof.
`
`20 Claims, 13 Drawing Sheets
`
`HUB
`
`m1? |__A
`BLOCKING
`CIRCUIT
`
`N
`
`EXTERNAL
`DE,‘ VICE
`
`I 4
`
`STA TIIS DATA
`READER
`
`I1
`
`MANCHESTER
`ENEODER
`
`FIRMWARE
`KERNEL
`
`EXTERNAL
`DEVICE
`
`Chrimar Systems, Inc.
`Exhibit 2026-1
`IPR2016-00573 USPN 9,019,838
`
`

`
`US 6,650,622 B1
`Page 2
`
`US. PATENT DOCUMENTS
`
`4,617,656 A * 10/1986 Kobayashi et al. ....... .. 370/445
`4,631,367 A 12/1986 Coviello et al.
`4,636,771 A
`1/1987 OCllS
`4,654,640 A * 3/1987 Carll et al. ............ .. 340/5682
`4,670,902 A
`6/1987 Naiwirt
`4,674,084 A
`6/1987 SuZuki et al. ............. .. 370/509
`4,719,616 A
`1/1988 Akano ...................... .. 370/527
`4,731,829 A
`3/1988 Bonnet et al.
`4,733,223 A
`3/1988 Gilbert ..................... .. 340/505
`4,733,389 A
`3/1988 Puvogel
`4,736,195 A
`4/ 1988 McMurtry et al.
`4,760,382 A
`7/1988 Faulkner ................ .. 340/5682
`4,782,322 A 11/1988 Lechner et al. ...... .. 340/310.02
`4,813,066 A
`3/1989 HoltZ et al.
`4,896,315 A
`1/1990 Felker et al. ............. .. 370/252
`4,935,959 A
`6/1990 Markovic et al.
`5,034,723 A
`7/1991 Maman ................. .. 340/5682
`5,034,978 A
`7/1991 Nguyen et al.
`5,136,580 A
`8/1992 Videlock et al.
`5,142,269 A
`8/1992 Mueller
`5,144,544 A
`9/1992 Jenneve et al.
`5,231,375 A
`7/1993 Sanders et al. ........ .. 340/568.2
`5,243,328 A
`9/1993 Lee et al.
`5,301,246 A * 4/1994 Archibald et al. ........ .. 375/222
`5,365,515 A 11/1994 Graham
`5,406,260 A
`4/1995 Cummings et al. .... .. 340/568.2
`5,578,991 A 11/1996 Scholder
`5,675,321 A 10/1997 McBride ................ .. 340/5682
`5,692,917 A 12/1997 Rieb et al. ................ .. 439/225
`5,715,174 A
`2/1998 Cotichini et al.
`5,821,868 A 10/1998 Kuhling
`5,929,778 A * 7/1999 Asama et al. .......... .. 340/10.51
`5,963,557 A * 10/1999 Eng ........... ..
`370/432
`6,021,493 A * 2/2000 Cromer et al. ............ .. 713/200
`6,064,305 A
`5/2000 Lockyer
`6,130,894 A * 10/2000 Ojard et al. .............. .. 370/421
`6,147,603 A 11/2000 Rand .......... ..
`340/5682
`6,172,606 B1
`1/2001 Lockyer ..... ..
`340/5682
`6,344,794 B * 2/2002 Ulrich et al. .......... .. 340/573.1
`
`OTHER PUBLICATIONS
`
`a1, Les Installations Terminales
`et
`Lavoisard, J .L.
`D’Abonnes, Commutation & Transmission No. 3, 1987, pp.
`35—50.
`An Interoperable Solution for FDDI Signaling Over
`Shielded Twisted Pair, Advanced Micro Devices, Inc., May
`21, 1991, 9 pgs.
`FDDI on Copper with AMD PHY, Advanced Micro Devices,
`1991, 8 pgs.
`Information Processing Systems—Fibre Distributed Data
`Interface (FDDI) Part 1: Token Ring Physical Layer Proto
`col (PHY), Global Engineering Documents, 1989, 38 pgs.
`
`Information Processing Systems—Fibre Distributed Data
`Interface (FDDI) Part 3: Physical Layer Medium Depen
`dent, Global Engineering Documents, 1989, 55 pgs.
`Information Processing Systems—Fibre Distributed Data
`Interface (FDDI) Part 2: Token Ring Media Access Control
`(MAC), Global Engineering Documents, 1989, 75 pgs.
`“Attachment Module Guide for the IBM Token—Ring Net
`wor ”, IBM, Apr. 1992.
`“Token Ring Access Method”, The Institute of Electrical and
`Electronics Engineers, Inc., 1985, 80 pages.
`LattisNet System 3000 Ethernet Connectivity Guide, Syn
`Optics Communications, Inc., Sep. 1991, 19 pages.
`Stallings, William, Local Networks (Second Edition), 435
`pages.
`FDDI Metallic Media—Shielded Twisted Pair Physical
`Layer Medium Dependent, British Telecom, Oct. 15, 1991.
`Letter of Assurance Process Flowchart, IEEE, 2 pages.
`IEEE—SA Standards Board Bylaws, 3 pages.
`Keller, R. et a1, “Performance Bottlenecks in Digital Movie
`Systems”, Proceedings of the 4’I1 International Workshop on
`Network and Operating System Support for Digital Audio
`and Video, Lancaster, U.K., Nov. 1993, 13 pages.
`LattisNet System 3000 Ethernet Connectivity Guide, Syn
`Optics Communications, Inc., Sep. 1991, 12 pages.
`Chapter I LattisNet Operation, Ethernet Connectivity Guide,
`145 pages.
`LattisNet System 3000 Ethernet Connectivity Guide, Sep.
`1991, 19 pages.
`Technical Response Center, Technical Tip, Bay Networks, 2
`pages.
`LattisNet System 3000 Ethernet Connectivity Guide, Sep.
`1991, 7 pages.
`Local Area Networks, Managing the Physical Layer, Inter
`national Data Corporation, Mar. 1990, 36 pages.
`Levine, Judity, FDDI Spec Consortium, 21 pages.
`Stallings, William, Local Networks, An Introduction.
`An Interoperable Solution for FDDI Signaling Over
`Shielded Twisted Pair, Advanced Micro Devices, May 21,
`1991, 25 pages.
`Token Ring Network Architecture Reference, IBM, 15
`pages.
`Reference Data for Engineers: Radio, Electronics, Computer
`and Communications, 1989, 17 pages.
`IEEE Network Magazine, vol. 1, No. 1, Jan. 1987, 30 pages.
`System Consideration for Multisegment 10 Mb/s Baseband
`Networks, (Section 13) and Twisted Pair Medium Attach
`ment Unit (MAU) and Baseband Medium, Type 10BASE—T
`(Section 14), 33 pages.
`
`* cited by examiner
`
`Chrimar Systems, Inc.
`Exhibit 2026-2
`IPR2016-00573 USPN 9,019,838
`
`

`
`U.S. Patent
`
`Nov. 18,2003
`
`Sheet 1 0f 13
`
`US 6,650,622 B1
`
`17
`
`g SKA-D)
`'0 16
`
`HUB
`
`000000
`
`£1814.
`
`3%
`j.
`
`.
`PC
`
`I
`Z
`3
`6
`
`1
`Z
`3
`6
`
`HUB
`
`1
`2
`3
`6
`
`CENTRAL
`1
`2
`3 MODULE
`6
`
`1
`2
`3
`5
`
`I
`
`I
`I
`19
`EXTERNAL
`DEVICE I
`
`REMOTE
`MODULE
`
`Chrimar Systems, Inc.
`Exhibit 2026-3
`IPR2016-00573 USPN 9,019,838
`
`

`
`Chrimar Systems, Inc.
`Exhibit 2026-4
`IPR2016-00573 USPN 9,019,838
`
`

`
`Chrimar Systems, Inc.
`Exhibit 2026-5
`IPR2016-00573 USPN 9,019,838
`
`

`
`Chrimar Systems, Inc.
`Exhibit 2026-6
`IPR2016-00573 USPN 9,019,838
`
`

`
`US Patent
`
`N0v.18,2003
`
`Sheet 5 0f 13
`
`US 6,650,622 B1
`
`RECEIVE
`FROM 12121111201.
`(
`MODULE
`
`g +
`_
`
`100
`16a
`N [\J
`+
`HIGH
`PASS —> _ €1gggr5£§
`FILTER —+
`12a
`\
`
`10
`
`s
`FIRMWARE
`EXTERNAL C3 KERNEL
`slams
`
`‘
`
`H\/\
`
`1 I
`MANCHESTER
`211000212
`
`K
`
`\
`
`SIGNAL
`TRANSMITTER
`j
`13
`
`1301111011.;
`
`7 POWER —» VCC
`SUPPLY
`
`TRANSMIT
`
`FROM
`1111:;
`
`T
`
`g_
`
`£1212
`
`RECEIVE
`
`TRANSMIT
`(FROM CENTRAL
`MODULE
`
`;
`
`2
`1
`2
`
`‘101
`
`16a
`
`N
`
`112
`
`: + TRANSM”
`
`t _; (To PC)
`
`RECEIVE
`4.1- a
`(‘1'0 PC)
`{'1
`6
`TRANSMIT
`1
`2 (T0 PC)
`
`i
`
`E
`
`EXTERNAL
`SIGNALS
`
`I ~
`
`102
`
`PIC126508 /
`MCLRI vccdwv
`25;’
`104
`555
`1101
`
`R84
`R85
`R36
`
`R111
`
`10k
`
`R42
`
`RB? W 105
`g l; 4 I
`
`>
`
`x
`
`.
`
`a I
`
`1‘
`
`761811112
`
`1‘
`
`j
`
`'
`
`(
`
`113
`
`114
`
`Chrimar Systems, Inc.
`Exhibit 2026-7
`IPR2016-00573 USPN 9,019,838
`
`

`
`U.S. Patent
`
`Nov. 18,2003
`
`Sheet 6 6f 13
`
`US 6,650,622 B1
`
`23
`
`21
`
`32
`
`38
`
`28
`
`ETHERLOCK ID
`PACK
`
`£18112
`
`28
`
`ETHERLOCK ID
`PACK
`
`Chrimar Systems, Inc.
`Exhibit 2026-8
`IPR2016-00573 USPN 9,019,838
`
`

`
`U.S. Patent
`
`Nov. 18,2003
`
`Sheet 7 0f 13
`
`US 6,650,622 B1
`
`E23:
`$52 M w
`
`a; 0:
`
`am Qt
`
`umTJ / A3“ \
`
`mm~ mm“
`
`Q.~...|...mm.
`
`A
`
`52%
`
`m: 3 r§ .
`
`
`
`
`
`A@ i.‘ >2
`
`m." m m 0+!
`
`/ r \ m m j
`
`
`
`2/7; E L .5 r)‘ ,m (w
`
`a 5 2
`
`__ 1r _ "Ti
`
`1? E88 S. W
`
`
`
`as WW2“
`
`
`
`
`@352 I §§=§§ mwwamq lbw .
`55 58% NEE .»
`
`m m
`
`N w
`
`5E?
`@E :25
`
`@555
`
`ab: 5%
`
`Chrimar Systems, Inc.
`Exhibit 2026-9
`IPR2016-00573 USPN 9,019,838
`
`

`
`U.S. Patent
`
`Nov. 18,2003
`
`Sheet 8 0f 13
`
`US 6,650,622 B1
`
`32
`
`jig-i
`
`J23
`
`40
`
`42
`
`T0 15 28L]
`
`38
`
`I
`
`COMPUTER
`
`_E1g—1 4
`
`44
`
`Q Q
`[I5
`48‘
`6
`E
`
`38
`
`42'
`
`46
`
`ETHERLOCK ID
`CARD\
`
`STANDARD MC
`1
`
`Chrimar Systems, Inc.
`Exhibit 2026-10
`IPR2016-00573 USPN 9,019,838
`
`

`
`U.S. Patent
`
`Nov. 18,2003
`
`Sheet 9 0f 13
`
`US 6,650,622 B1
`
`NETWORK WIRE
`38
`llg—_15_ 42’
`
`.
`
`D
`”?.>
`K/
`
`/
`
`Fig__16
`
`ETHERLOCK 11)
`
`we
`~ ‘f
`
`16
`
`\
`
`150
`
`.EI'giZ
`
`P1
`
`)
`
`P2
`
`<
`
`[-150
`
`Chrimar Systems, Inc.
`Exhibit 2026-11
`IPR2016-00573 USPN 9,019,838
`
`

`
`Chrimar Systems, Inc.
`Exhibit 2026-12
`IPR2016-00573 USPN 9,019,838
`
`

`
`Chrimar Systems, Inc.
`Exhibit 2026-13
`IPR2016-00573 USPN 9,019,838
`
`

`
`U.S. Patent
`
`Nov. 18,2003
`
`Sheet 12 0f 13
`
`US 6,650,622 B1
`
`wQmONPOE
`
`00>
`
`010
`
`E0
`
`0mm
`
`M25
`C 2.
`W E06 $855 W
`
`1 “as: motjnwmm
`$015 50 wo<5o>
`in; i 1 00> EN
`
`
`
`0 ........................................................................................................... ..
`
`
`
`:51 ..A
`
`mom
`
`
`
`||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| :
`
`Chrimar Systems, Inc.
`Exhibit 2026-14
`IPR2016-00573 USPN 9,019,838
`
`

`
`U.S. Patent
`
`Nov. 18,2003
`
`Sheet 13 0f 13
`
`US 6,650,622 B1
`
`Fig. 21
`
`200
`
`L7
`
`202
`
`204a
`
`202
`
`202
`
`¥ \ |\ a?
`
`204d
`
`Fig. 22
`
`OOEIIII
`
`210
`
`206
`
`Chrimar Systems, Inc.
`Exhibit 2026-15
`IPR2016-00573 USPN 9,019,838
`
`

`
`US 6,650,622 B1
`
`1
`SYSTEM FOR COMMUNICATING WITH
`ELECTRONIC EQUIPMENT
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`
`This application is a continuation-in-part under
`35U.S.C.§111 and §120 of international application PCT/
`US99/07846, ?led Apr. 8, 1999, designating, inter alia, the
`United States, and Which claims the bene?t of US. provi
`sional application No. 60/081,279 ?led Apr. 10, 1998.
`
`BACKGROUND OF THE INVENTION
`
`1.Technical Field
`This invention relates generally to computer netWorks
`and, more particularly, to a netWork management and secu
`rity system for managing, tracking, and identifying remotely
`located electronic equipment on a netWork.
`2. Discussion
`Over the last several years, one of the largest problems in
`managing the computeriZed office environment has been
`identi?ed as controlling the Total Cost of OWnership, or
`TCO, of the office computer. Controlling TCO includes not
`only the cost of the asset but also all costs associated With
`that asset, such as support costs, softWare costs, and costs
`due to loss or theft, including hardWare, softWare, and most
`importantly, information.
`An aspect of the support costs of TCO is asset movement.
`Today, many employees have more than one computer.
`When that employee is moved to another location, the assets
`must be moved as Well. A typical organiZation can have as
`much as 40% of its employees move from one location to
`another over the course of a year. When these movements
`occur daily, tracking each asset over time is nearly impos
`sible. There is also the unauthoriZed movement of assets,
`such as moving an asset from an employee’s of?ce to his or
`her associated lab area. In addition to these physical
`movements, the asset may also be changed over time
`through hardWare and softWare modi?cations. Even if an
`asset is successfully tracked over a period of time, the asset
`may not be the same at the end of the period. Due to this
`constant asset relocation and reorganiZation, an organiZation
`may not alWays knoW Where all of its assets are located. In
`fact, it is very likely that a company may not even knoW hoW
`many assets they oWn or if those assets are still in their
`possession. Additionally, an organiZation that desires to send
`a message to all of the assets Within a particular physical
`area is limited to relying on databases that correlate the
`netWork identi?cation of an asset to Where that asset should
`be located, not Where the asset actually is located. Previous
`attempts to provide asset tracking and management have
`relied on softWare solutions that have proven to be funda
`mentally ?aWed. Asset tracking and management softWare is
`limited in a number of important areas. It is generally
`incapable of detecting the electrical connection status of
`equipment, it cannot detect the physical location of
`equipment, the identifying name of equipment is not
`permanent, and the monitored assets must be poWered-up.
`Therefore, a method for permanently identifying an asset
`by attaching an external or internal device to the asset and
`communicating With that device using existing netWork
`Wiring is desirable. Also, it is desirable to communicate With
`an asset based upon the physical location of the asset.
`Additionally, a method of determining When an asset is
`being removed or added to the netWork is desirable. It Would
`also be desirable to communicate With the device Without
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`55
`
`60
`
`65
`
`2
`requiring the device or the asset to be connected to alter
`nating current (AC) poWer. Such a device Would alloW a
`company to track its assets, locate any given asset, and count
`the total number of identi?ed assets at any given time, thus
`signi?cantly reducing its TCO of identi?ed assets.
`One method that attempted to control the hardWare theft
`aspect of TCO is disclosed in US. Pat. No. 5,406,260 issued
`to Cummings et. al, (hereby incorporated by reference)
`Which discusses a means of detecting the unauthoriZed
`removal of a netWorked device by injecting a loW current
`poWer signal into each existing communications link. A
`sensor monitors the returning current How and can thereby
`detect a removal of the equipment. This method provides a
`means to monitor the connection status of any netWorked
`electronic device thus providing an effective theft detection/
`deterrent system.
`It Would, hoWever, be desirable to provide a further means
`in Which a netWorked device may also be identi?ed by a
`unique identi?cation number using the existing netWork
`Wiring as a means of communicating this information back
`to a central location. More particularly, it is desirable to
`provide a means for identi?cation that feasibly employs
`conductors provided through an existing data communica
`tion link. In addition, it is desirable to provide an identi?
`cation system that is easily and inexpensively implemented
`in an existing netWork system.
`The theft of information is a further aspect of TCO. Today,
`the most important resources a company has are its employ
`ees and the information that they create and accumulate.
`Information that is available on a company’s internal net
`Work can range from personnel ?les and corporate business
`plans to research and development efforts related to neW
`products. Restricting access to sensitive or con?dential
`information such as personnel ?les is a high priority for all
`companies. The use of passWords and limiting access to
`certain types of information to particular computer stations
`are typical methods that companies employ to protect infor
`mation. These passive methods of protecting company infor
`mation are suf?cient to prevent technically unknoWledge
`able people from gaining access to protected information.
`HoWever, these methods are usually unable to protect infor
`mation from a technically knoWledgeable person With spe
`cialiZed electronic equipment. The existence of an unautho
`riZed device connected to the company netWork may
`indicate the presence of someone With electronic equipment
`that has the capability to defeat a company’s internal secu
`rity measures. A method of blocking communications With
`such a device connected to a netWork is desirable. Further,
`automatically blocking communications With an unautho
`riZed device is desirable. An active system that interrogates
`the devices connected to a netWork and blocks communi
`cations With unauthoriZed devices Would provide enhanced
`security for sensitive information.
`A further aspect of support costs is the cost associated
`With utiliZation of netWork bandWidth. Today, the bandWidth
`of most netWorks is being constantly increased to meet the
`increasing need to transmit large quantities of data. In order
`to provide the required bandWidth costly hardWare upgrades
`must be purchased resulting in an increase in the TCO. To
`reduce the need for hardWare upgrades the use of available
`netWork bandWidth is dedicated to data that is required for
`the operation of application programs. Using valuable net
`Work bandWidth to provide a means of identifying assets
`Would either limit the availability of bandWidth for appli
`cation programs or require the purchase of neW hardWare.
`Additionally, using netWork bandWidth for asset identi?ca
`tion Would limit the identi?cation system to operating only
`
`Chrimar Systems, Inc.
`Exhibit 2026-16
`IPR2016-00573 USPN 9,019,838
`
`

`
`US 6,650,622 B1
`
`3
`When the asset has AC power applied. Assemblies Within the
`asset Would have to be operational in order to transmit data
`over the network. Requiring poWer to be applied to every
`monitored asset Would limit the capability to identify all the
`assets connected to a netWork at any particular time.
`Therefore, it is desirable to provide a means for asset
`identi?cation that does not use existing netWork bandWidth.
`Such a device Would more fully utiliZe existing netWork
`resources Without increasing the TCO associated With net
`Work bandWidth.
`
`SUMMARY OF THE INVENTION
`In accordance With the teachings of the present invention,
`a communication system is provided for generating and
`monitoring data over pre-existing conductors betWeen asso
`ciated pieces of netWorked computer equipment. The system
`includes a communication device attached to the electronic
`equipment that transmits information to a central module by
`impressing a loW frequency signal on the pre-existing data
`lines of the remotely located equipment. A receiver in the
`central module monitors the loW frequency data on the data
`lines to determine the transmitted information of the elec
`tronic equipment. The communication device may also be
`poWered by a loW current poWer signal from the central
`module. The poWer signal to the communication device may
`also be ?uctuated to provide useful information, such as
`status information, to the communication device. Relocation
`of the electronic equipment With attached communication
`device to another location on the netWork is detected imme
`diately and may be used to update a database. This invention
`is particularly adapted to be used With an existing Ethernet
`communications link or equivalents thereof.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`Other objects and advantages of the present invention Will
`become apparent to those skilled in the art upon reading the
`folloWing detailed description and upon reference to the
`draWings in Which:
`FIG. 1 is a general block diagram that illustrates a
`netWork that includes a communication system in accor
`dance With a ?rst embodiment of the present invention;
`FIG. 2 is an exploded perspective vieW that illustrates
`installation of the central module into an existing computer
`netWork in accordance With the ?rst embodiment of the
`present invention;
`FIG. 3 is a block diagram that illustrates the ?rst embodi
`ment of the present invention;
`FIG. 4 is an interconnection diagram that illustrates a
`second embodiment of the present invention;
`FIG. 5 is a block diagram that illustrates a central module
`made in accordance With the teachings of the present inven
`tion;
`FIG. 6 is a detailed schematic diagram of the central
`module in accordance With the second embodiment of the
`present invention;
`FIG. 7 is a block diagram that illustrates a remote module
`made in accordance With the teachings of the present inven
`tion;
`FIG. 8 is a detailed schematic diagram that illustrates a
`central module in accordance With the second embodiment
`of the present invention;
`FIG. 9 is a diagram that illustrates alternate circuits for
`blocking communications in accordance With an embodi
`ment of the present invention;
`FIG. 10 is a detailed schematic diagram Which illustrates
`a remote module and a central receiver module coupled to a
`
`4
`netWork in accordance With the third embodiment of the
`present invention;
`FIG. 11 is a perspective vieW of one embodiment of the
`hardWare for the remote module;
`FIG. 12 is an exploded perspective vieW of the hardWare
`of FIG. 11;
`FIG. 13 is a cross-sectional vieW of the hardWare shoWn
`mounted to a computer;
`FIG. 14 is a perspective vieW of an alternative embodi
`ment of the hardWare for the remote module;
`FIG. 15 illustrates the installation of the hardWare of FIG.
`14 into a computer;
`FIG. 16 is a schematic representation of an electronic
`tether in accordance With the fourth embodiment;
`FIG. 17 is a cross-sectional vieW of an electronic tether
`used in connection With the fourth embodiment;
`FIG. 18 is a schematic representation of circuitry for the
`fourth embodiment;
`FIG. 19a is a block diagram that illustrates a system for
`electronically identifying an object made in accordance With
`the teachings of the present invention;
`FIG. 19b is a cross-sectional vieW of an ID sender tag
`used in connection With the system for electronically iden
`tifying an object;
`FIG. 20 is a schematic representation of circuitry used in
`a system for electronically identifying an object;
`FIG. 21 is a perspective vieW that illustrates installation of
`an ID sender tag and decoder plug; and
`FIG. 22 is a perspective vieW that illustrates an ID sender
`tag and decoder plug interconnected by a serial bus.
`
`10
`
`15
`
`25
`
`35
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENT
`
`Four embodiments of the invention are illustrated Within
`this speci?cation. The ?rst embodiment illustrates the gen
`eral teachings of the invention, Whereas the second, third,
`and fourth embodiments depict speci?c implementations of
`the teachings. Turning noW to FIGS. 1, 2 and 3, a ?rst
`embodiment of a central module and remote module 16
`system is provided therein for achieving identi?cation of
`electronic computer equipment associated With a computer
`netWork 17. Although, the ?rst embodiment depicts merely
`communicating equipment identi?cation information, the
`principles of the invention may be readily extended to
`include the communication of more general information
`such as identi?cation of the equipment processor type and
`the equipment harddrive capacity. In general, the central
`module 15 monitors remote module circuitry 16 that may be
`permanently attached to remotely located electronic Work
`stations such as personal computers 3A through 3D over the
`computer netWork 17. The communication system 15 and 16
`described herein is particularly adapted to be easily imple
`mented in conjunction With an existing computer netWork 17
`While realiZing minimal interference to the computer net
`Work. In addition to being implemented from the hub of a
`netWork to remotely located PCs, the invention can be
`applied to other elements of an office environment such as
`telephones, fax machines, robots, and printers. The inven
`tion is particularly suitable for being incorporated into a
`patchpanel. The asset aWare patchpanel Would then be
`capable of identifying the existence and location of netWork
`assets Without poWer being applied to the assets.
`Remotely located personal computers 3A through 3D are
`each connected to the computer netWork 17 so as to provide
`
`45
`
`55
`
`65
`
`Chrimar Systems, Inc.
`Exhibit 2026-17
`IPR2016-00573 USPN 9,019,838
`
`

`
`US 6,650,622 B1
`
`10
`
`15
`
`25
`
`35
`
`5
`Widespread remote user access to the computer network 17.
`The remotely located personal computers 3A through 3D are
`shoWn connected to hub 1 via data communication links 2A
`through 2D. Data communication links 2A through 2D
`include a plurality of transmit and receive data communi
`cation links for communicating information betWeen each of
`remotely located computers 3A through 3D and other com
`munication devices on the netWork such as other computers
`and ?le servers (not shoWn).
`The invention described herein is particularly suited to be
`implemented in conjunction With a computer netWork 17
`Which preferably employs a conventional Wiring approach
`of the type Which may include tWisted pair Wiring such as
`Ethernet, Token Ring, or ATM. Wiring schemes similar to
`Ethernet are commonly employed to provide data commu
`nication links for electronic computer equipment. In accor
`dance With conventional Wiring approaches, data commu
`nication links 2A—2D generally include a pair of transmit
`Wires (not shoWn) as Well as a pair of receive Wires (not
`shoWn) connected to each of personal computers 3A through
`3D. Each pair of transmit and receive Wires are internally
`coupled to an associated personal computer via tWo Wind
`ings of an internally located isolation transformer (not
`shoWn). Each pair of transmit Wires and each pair of receive
`Wires thereby form a current loop through one of the
`personal computers 3A through 3D Which is advantageously
`employed in accordance With the approach described herein.
`The central module 15 includes an isolation poWer supply
`8 (see FIG. 3) Which supplies a continuous direct current
`(DC) poWer supply to each of current loops 2A through 2D.
`The DC poWer supply has a loW current preferably on the
`order of magnitude of about 1 mA. The isolation poWer
`supply 8 includes an input terminal for receiving a loW
`voltage signal VLV Which has a magnitude of approximately
`?fteen (15) volts. The present embodiment of the invention
`sources DC current from a 15 volt source to the remote
`modules 16. HoWever, it is Within the scope of the invention
`to provide other voltage levels such as 3V dc, and 20V dc.
`Although the present embodiment sources current for the
`immediate poWer needs of the remote module, it is also
`Within the scope of the invention to supply current to charge
`a battery, capacitor bank, or other energy storage device that
`poWers the remote module. Additionally, poWering the
`remote module from some other source such as a primary
`battery, rechargeable battery or capacitor bank that receives
`energy from a source other than the central module is Within
`the scope of the invention.
`The poWer generated by isolation poWer supply 8 is
`passed through signal modulator 7 Which can slightly alter
`the voltage supplied by isolation poWer supply 8 based upon
`status data provided by the status data encoder 9. Status data
`encoder 9 receives its status data from the ?rmWare kernel
`4. Signal modulator 7 inserts this loW poWer supply across
`the transmit and receive lines or into either the transmit lines
`or the receive lines in order to supply the remote module 16
`With both status information and poWer. The scope of the
`invention includes transmitting status information as a single
`bit or as a pulse train. Types of transmitted status informa
`tion include Whether the protection circuit is active, date,
`time, and port location. It is also Within the scope of the
`invention to encode the status data using methods such as
`single bit on/off, Manchester, 4B/5B, and Frequency Shift
`Keying
`Isolation poWer supply 13 draWs poWer for the remote
`module 16 and provides status information that Was encoded
`into the poWer supply signal by signal modulator 7 Within
`the central module 15. This status information is in turn
`
`45
`
`55
`
`65
`
`6
`passed over to the ?rmWare kernel 10 of the remote module
`16 by Way of the status data reader 14.
`FirmWare kernel 10 provides a preprogrammed unique
`identi?cation number to Manchester encoder 11 in order to
`reliably traverse the data communication link 2A. The
`Manchester encoder then passes this encoded number to
`signal transmitter 12 Which sends the encoded number
`across the data communication link 2A by altering the total
`current draW of the remote module 16. Although the present
`embodiment of the invention uses Manchester encoding, the
`principles of the invention may be readily extended to other
`encoding techniques such as Frequency Shift Keying,
`4B/5B, PAM5x5, 8B/6T, Polar NRZ, and Bipolar.
`Additionally, Waveshaping the encoded signal With tech
`niques such as MLT-3 is Within the scope of the invention.
`In addition to transmitting an identi?cation number the
`?rmWare kernel 10 may also elect to send additional infor
`mation such as con?rmation of the status information or
`additional data provided by an external device 18, such as
`the computer 3A to Which the remote module 16 is attached.
`The information sent from the remote module 16 is
`received by the signal receiver 6 Within the central module
`15, decoded by Manchester decoder 5, and passed on to the
`?rmWare kernel 4. The ?rmWare kernel may noW pass this
`received information on to an external device 19, such as a
`computer responsible for asset tracking.
`Kernel 4 may optionally provide a blocking signal to
`blocking circuit 20 to deny, to an unauthoriZed computer,
`access to the netWork information via hub 1. For example,
`if someone uses a laptop to attempt to plug into the netWork,
`the central module 15 detects the absence of the proper
`identi?cation code from the laptop and, as noted before,
`kernel 4 Would issue a suitable signal to blocking circuit 20
`to prevent access to the netWork information and also
`generate an alarm. Furthermore, if the potential thief later
`disconnects protected equipment from the netWork, this
`action is also detected and an alarm can be generated.
`Although the present embodiment illustrates the blocking
`function as shorting the data lines together 131 (see FIG. 9),
`it is Within the scope of the invention to implement blocking
`by other means, such as opening both lines of the transmit
`or receive data lines 130, opening one of the data lines 132,
`and transmitting noise onto the data lines 134.
`FIGS. 4—8 illustrate a second embodiment of the inven
`tion Which generally differs from the ?rst embodiment by
`having circuitry that transmits a modulated signal directly to
`central module 15a from remote module 16a. In the ?rst
`embodiment current sourced from

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket